<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1361 to 1375.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bangalore-chapter-meet-dsci"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-november-14-2015-come-be-my-guest"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-ms-cooperation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015">
    <title>Take-away from the I&amp;J Project Workshop at the UN Internet Governance Forum 2015</title>
    <link>https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015</link>
    <description>
        &lt;b&gt;The Internet &amp; Jurisdiction Project organized the workshop “Transnational due process: A case study in multi-stakeholder cooperation” at the Internet Governance Forum convened by the United Nations on November 13, 2015.&lt;/b&gt;
        &lt;p&gt;This was published on &lt;a class="external-link" href="http://www.internetjurisdiction.net/take-away-from-the-ij-project-workshop-at-the-un-internet-governance-forum-2015/"&gt;Internet &amp;amp; Jurisdiction&lt;/a&gt; website.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The 4-day conference convened over 2000 high-level participants from states, major global Internet companies, technical Internet operators, international organizations, civil society groups and academia.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/mJvYYVohxV8" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The workshop organized by the I&amp;amp;J Project discussed how to address the tension between the cross-border nature of the Internet and a patchwork of national jurisdictions by enabling multi-stakeholder cooperation. Sunil Abraham, the Director of  CIS India, stressed the limits of traditional modes of inter-state legal cooperation on the Internet:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The MLAT system is completely broken […] both from the demand side and also from the supply side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US Cyber Coordinator of the State Department, Christopher Painter, stated the need to streamline procedures of Mutual Legal Assistance Treaties, but also highlighted the importance of pursuing in parallel more innovative approaches, such as the Internet &amp;amp; Jurisdiction process:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;MLATS are not always the right answer.  There are other answers between law enforcement channels in terms of joint investigations and there are also creative solutions that might take some of the burden off that MLAT process and I think that those are worthy of exploration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Representing the Canadian ccTLD .ca, Mark Bull reflected upon how to develop such solutions to maintain the global nature of the Internet.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;We are talking about incredibly complex issues here and I believe that complexity necessitates a multi-stakeholder process to identify solutions.  And that is what I think the beauty of the Internet &amp;amp; Jurisdiction Project is. And it’s why because of the multi-stakeholder structure, that’s why we believe it is the best and the most effective form for discussing issues this complex.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Panelist Eileen Donahoe, the Director of Global Affairs at Human Rights Watch applauded the progress the Internet &amp;amp; Jurisdiction process made since 2012:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Let me say that the work of the I&amp;amp;J Project has been relentless and it is really important. This is one of the most complex spaces in Internet governance&lt;/p&gt;
&lt;p&gt;The jurisdiction topic has become one of the most pressing Internet governance challenges, as  I&amp;amp;J Project Director and Co-Founder Bertrand de La Chapelle pointed out:&lt;/p&gt;
&lt;p class="callout"&gt;There is a real element of urgency. The jurisdiction issue is at the core of many Internet governance problems. And it has been said in many workshops here in the IGF, but also outside of it. The problem is really getting worse. The jurisdiction problem is probably one of the biggest threats to the fabric of the Internet as we know it.&lt;/p&gt;
&lt;p&gt;The objective of the workshop was to gather participants in the global Internet &amp;amp; Jurisdiction process from different stakeholder groups to report on progress and achievements. Furthermore, the workshop deepened the understanding of how to address jurisdictional tensions around the Internet and establish innovative legal cooperation mechanisms to prevent its fragmentation along national territorial boundaries.Council of Europe’s Elvana Thaci reminded participants of the importance to develop harmonized procedures across borders, as&lt;/p&gt;
&lt;p class="callout"&gt;Harmonization of substance is very difficult because the understanding of unlawfulness of content is very diverse.&lt;/p&gt;
&lt;p&gt;Facebook’s Head of Policy Development, Matt Perault, talked about the need for appropriate procedures:&lt;/p&gt;
&lt;p class="callout"&gt;I am here because I believe the I&amp;amp;J Project is devoted to figuring out how to think about mechanisms for a race to the top on the issue of jurisdiction.&lt;/p&gt;
&lt;p&gt;The pioneering Internet &amp;amp; Jurisdiction process has engaged more than 100 key entities around the world, creating a unique neutral space to build trust and catalyze operational solutions. As Will Hudson, Google’s Senior Advisor for International Policy, said:&lt;/p&gt;
&lt;p class="callout"&gt;We need to find solutions that work for all parties. It is one of the great strengths of the I&amp;amp;J Project, that it is looking at this challenge head on. We need to do things in this multi-stakeholder manner, and talk as a community because everyone has a stake in this and we cannot do this alone.&lt;/p&gt;
&lt;h3&gt;Participants&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;ANNE CARBLANC, Head of Division, Directorate for Science, Technology and Industry, OECD&lt;/li&gt;
&lt;li&gt;BYRON HOLLAND, President and CEO, CIRA (Canadian ccTLD)&lt;/li&gt;
&lt;li&gt;CHRISTOPHER PAINTER, Coordinator for Cyber Issues, US Department of State&lt;/li&gt;
&lt;li&gt;EILEEN DONAHOE, Director Global Affairs, Human Rights Watch&lt;/li&gt;
&lt;li&gt;EVANA THACI, Administrator, Council of Europe&lt;/li&gt;
&lt;li&gt;MATT PERAULT, Head of Policy Development, Facebook&lt;/li&gt;
&lt;li&gt;SUNIL ABRAHAM, Executive Director, CIS India&lt;/li&gt;
&lt;li&gt;WILL HUDSEN, Senior Advisor for International Policy, Google&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015'&gt;https://cis-india.org/internet-governance/news/take-away-from-the-i-j-project-workshop-at-the-un-internet-governance-forum-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-30T14:09:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns">
    <title>Shopping on apps raise privacy and security concerns</title>
    <link>https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;The recently concluded online Diwali sales frequently offered consumers hefty discounts on merchandise if they shopped via store app, a move that experts say increases security risks for internet users.&lt;/b&gt;
        &lt;p&gt;The article by Vivek Ananth was &lt;a class="external-link" href="http://www.thesoftcopy.in/23_11_15_shopping_on_apps_raise_concerns.html"&gt;published by the Softcopy, an IIJNM Web Publication&lt;/a&gt; on November 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“It makes the security much worse because of  increased complexity from  the user perspective,” said Sunil Abraham, executive  director at Centre  for Internet and Society.&lt;br /&gt; &lt;br /&gt; “User will have to install  multiple apps and then  worry about the security implications arising from each  app. From the  e-commerce corporation perspective it might reduce effort but for  users  this is a nightmare.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Do  apps increase security risks? &lt;br /&gt; &lt;br /&gt; The degree of risk depends on the specific app and   can only be determined after a detailed security audit, Abraham said.&lt;br /&gt; &lt;br /&gt; “Unfortunately there aren't many organisations doing   such audits and making their results available to the public,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some users who say that privacy on the  internet isn’t an option.&lt;br /&gt; &lt;br /&gt; “Once you are online your privacy is kind of gone,”   said Hasmit Trivedi of Mumbai. “I mean you are vulnerable.”&lt;br /&gt; &lt;br /&gt; “That (browsing history being used to target   advertisements) does concern me, but not to the extent that I'll stop  using  these websites,” said Sweta Rajan, a lawyer from Mumbai.&lt;br /&gt; &lt;br /&gt; “Google has done this forever," said Dinoo Muthappa.“I  don't even care if they use my search to place advertisements of what  they  think I need while browsing.”&lt;b&gt;&lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;br /&gt; Comfort  and Convenience trumps privacy&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; “I don't really shop for things I'm not comfortable   allowing the world to know. I'm ok with them using this (usage pattern  and  browsing information) for commercial reasons,” Rajan said.&lt;br /&gt; &lt;br /&gt; “We live in a world where the cost of convenience is   our privacy. Take my user preferences,” said Dinoo Muthappa, a lawyer  from  Delhi.“If it means you'll make money and somehow reflect as a  discount to me  later, that's fine,” she added.&lt;br /&gt; &lt;br /&gt; “I frankly don't have a problem with it in   principle,” said Akshara Kumar Chitoor, a lawyer from Bengaluru, about   companies mining data to target advertisements at her. “I don't think  it's very  different from how certain TV channels carry certain  advertisements because  they know the audiences.I mean,  you get Rin and  Horlicks ads on Zee and Sony but not Romedy Now or Comedy  Central.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The convenience of having it come home  when I want  and not having to face the guy who I know is ripping me  off; these guys can use  and sell my information,” Muthappa said.&lt;br /&gt; &lt;br /&gt; “With my work timings I literally do not find time  to go to a store and  shop,”Rajan said. “I buy everything online. It's very  convenient and  time saving.”&lt;br /&gt; &lt;br /&gt; “Personally, I think just browsing stuff to buy is  much easier on your  computer,” said Sreenath Unnikrishnan, a product developer  from  Singapore. “However, I do think apps are more convenient for payment. As   in your card information is normally stored and can be accessed  without having  to log in and all. I can do that on a computer too, but  it's less secure. At  least that's what I think.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/GoogleandFacebook.png" alt="Google and Facebook" class="image-inline" title="Google and Facebook" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="style24" href="https://www.google.com/policies/technologies/ads/"&gt;Google&lt;/a&gt; and &lt;a class="external-link" href="https://www.facebook.com/help/516147308587266/?helpref=hc_fnav"&gt;Facebook&lt;/a&gt; have their advertisement norms disclosed.&lt;br /&gt; &lt;br /&gt; Twitter also follows a&lt;a class="style23" href="https://support.twitter.com/articles/20170405"&gt; similar model &lt;/a&gt;using the email ids that their users have associated with their twitter  handles.&lt;br /&gt; &lt;br /&gt; “If the service is free - then as many have said  before - you are the  product, said Sunil Abraham executive director at Centre  for Internet  and Society. “Your personal information is being sold to marketers  and  advertisers. As Bruce Schneier puts it ‘surveillance is the business  model  of the Internet’".&lt;br /&gt; &lt;br /&gt; The terms and conditions are sometimes very long and  use difficult language.&lt;br /&gt; &lt;br /&gt; “Transparency and Informed Consent are principles in  most jurisdictions that have data protection law modelled on the &lt;a class="style24" href="http://ec.europa.eu/justice/data-protection/index_en.htm"&gt;EU  Data Protection Directive&lt;/a&gt;,” Abraham said.“Part of the transparency  principle is the accessibility of the language.”&lt;br /&gt; &lt;br /&gt; The user though still has an option to opt out of  the above process where their data is collected by these companies.&lt;br /&gt; Privacy policies of internet companies are legal  documents. These are  required under data protection laws. This makes them  complicated, said  Abraham. &lt;br /&gt; &lt;br /&gt; The users don’t care that their usage data is being  mined by businesses  till they have a bad experience, Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-21T14:56:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india">
    <title>The Humpty-Dumpty Censorship of Television in India</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india</link>
    <description>
        &lt;b&gt;The Modi government’s attack on Sathiyam TV is another manifestation of the Indian state’s paranoia of the medium of film and television, and consequently, the irrational controlling impulse of the law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article originally published in the Wire on September 8, 2015 was also mirrored on the website &lt;a class="external-link" href="http://notacoda.net/2015/09/09/the-humpty-dumpty-censorship-of-television-in-india/"&gt;Free Speech/Privacy/Technology&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is tempting to think of the Ministry of Information and Broadcasting’s (MIB) &lt;a href="http://www.livelaw.in/i-b-ministrys-warning-to-channel-for-comments-on-pm-modi-delhi-hc-seeks-reply/" target="_blank"&gt;attack on Sathiyam TV&lt;/a&gt; solely as another authoritarian exhibition of Prime Minister Narendra  Modi’s government’s intolerance of criticism and dissent. It certainly  is. But it is also another manifestation of the Indian state’s paranoia  of the medium of film and television, and consequently, the irrational  controlling impulse of the law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sathiyam TV’s transgressions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sathiyam’s transgressions began more than a year ago, on May 9, 2014,  when it broadcast a preacher saying of an unnamed person: “Oh Lord!  Remove this satanic person from the world!” The preacher also allegedly  claimed this “dreadful person” was threatening Christianity. This, the  MIB reticently claims, “appeared to be targeting a political leader”,  referring presumably to Prime Minister Modi, to “potentially give rise  to a communally sensitive situation and incite the public to violent  tendencies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MIB was also offended by a “senior journalist” who, on the same  day, participated in a non-religious news discussion to allegedly claim  Modi “engineered crowds at his rallies” and used “his oratorical skills  to make people believe his false statements”. According to the MIB, this  was defamatory and “appeared to malign and slander the Prime Minister  which was repugnant to (his) esteemed office”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For these two incidents, Sathiyam was served a show-cause notice on  16 December 2014 which it responded to the next day, denying the MIB’s  claims. Sathiyam was heard in-person by a committee of bureaucrats on 6  February 2015. On 12 May 2015, the MIB handed Sathiyam an official &lt;a href="http://www.scribd.com/doc/277493911/Warning-Sathiyam-TV-Channel-12th-May-2015" target="_blank"&gt;an official “Warning”&lt;/a&gt; which appears to be unsupported by law. Sathiyam moved the Delhi High Court to challenge this.&lt;/p&gt;
&lt;p&gt;As Sathiyam sought judicial protection, the MIB issued the channel a &lt;a href="http://www.catchnews.com/india-news/now-airing-the-hounding-of-a-tv-channel-for-showing-modi-in-bad-light-1441303238.html" target="_blank"&gt;second warning&lt;/a&gt; August  26, 2016 citing three more objectionable news broadcasts of: a child  being subjected to cruelty by a traditional healer in &lt;a href="http://www.ndtv.com/india-news/newborn-forced-to-walk-by-witch-doctor-in-assam-village-as-fever-cure-764554" target="_blank"&gt;Assam&lt;/a&gt;; a gun murder inside a government hospital in &lt;a href="https://www.youtube.com/watch?v=m2V4B2elMjo" target="_blank"&gt;Madhya Pradesh&lt;/a&gt;; and, a self-immolating man rushing the dais at a BJP rally in &lt;a href="https://www.youtube.com/watch?v=ECDV5AieD4g" target="_blank"&gt;Telangana&lt;/a&gt;. All three news items were carried by other news channels and websites.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governing communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most news providers use multiple media to transmit their content  and suffer from complex and confusing regulation. Cable television is  one such medium, so is the Internet; both media swiftly evolve to follow  technological change. As the law struggles to keep up, governmental  anxiety at the inability to perfectly control this vast field of speech  and expression frequently expresses itself through acts of overreach and  censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the newly-liberalised media landscape of the early 1990s, cable  television sprang up in a legal vacuum. Doordarshan, the sole  broadcaster, flourished in the Centre’s constitutionally-sanctioned  monopoly of broadcasting which was only broken by the Supreme Court in  1995. The same year, Parliament enacted the Cable Television Networks  (Regulation) Act, 1995 (“Cable TV Act”) to create a licence regime to  control cable television channels. The Cable TV Act is supplemented by  the Cable Television Network Rules, 1994 (“Cable Rules”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The state’s disquiet with communications technology is a recurring  motif in modern Indian history. When the first telegraph line was laid  in India, the colonial state was quick to recognize its potential for  transmitting subversive speech and responded with strict controls. The  fourth iteration of the telegraph law represents the colonial  government’s perfection of the architecture of control. This law is the  Indian Telegraph Act, 1885, which continues to dominate communications  governance in India today including, following a directive in 2004,  broadcasting.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Vague and arbitrary law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cable TV Act requires cable news channels such as Sathiyam to  obey a list of restrictions on content that is contained in the Cable  Rules (“&lt;a href="http://mib.nic.in/WriteReadData/documents/pc1.pdf" target="_blank"&gt;Programme Code&lt;/a&gt;“).  Failure to conform to the Programme Code can result in seizure of  equipment and imprisonment; but, more importantly, creates the momentum  necessary to invoke the broad powers of censorship to ban a programme,  channel, or even the cable operator. But the Programme Code is littered  with vague phrases and undefined terms that can mean anything the  government wants them to mean.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By its first warning of May 12, 2015, the MIB claimed Sathiyam  violated four rules in the Programme Code. These include rule 6(1)(c)  which bans visuals or words “which promote communal attitudes”; rule  6(1)(d) which bans “deliberate, false and suggestive innuendos and  half-truths”; rule 6(1)(e) which bans anything “which promotes  anti-national attitudes”; and, rule 6(1)(i) which bans anything that  “criticises, maligns or slanders any…person or…groups, segments of  social, public and moral life of the country” &lt;i&gt;(sic).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rest of the Programme Code is no less imprecise. It proscribes  content that “offends against good taste” and “reflects a slandering,  ironical and snobbish attitude” against communities. On the face of it,  several provisions of the Programme Code travel beyond the permissible  restrictions on free speech listed in Article 19(2) of the Constitution  to question their validity. The fiasco of implementing the vague  provisions of the erstwhile section 66A of the Information Technology  Act, 2000 is a recent reminder of the dangers presented by  poorly-drafted censorship law – which is why it was struck down by the  Supreme Court for infringing the right to free speech. The Programme  Code is an older creation, it has simply evaded scrutiny for two  decades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The arbitrariness of the Programme Code is amplified manifold by the  authorities responsible for interpreting and implementing it. An  Inter-Ministerial Committee (IMC) of bureaucrats, supposedly a  recommendatory body, interprets the Programme Code before the MIB takes  action against channels. This is an executive power of censorship that  must survive legal and constitutional scrutiny, but has never been  subjected to it. Curiously, the courts have shied away from a proper  analysis of the Programme Code and the IMC.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Judicial challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a single judge of the Delhi High Court in the &lt;a href="http://indiankanoon.org/doc/132453/" target="_blank"&gt;&lt;i&gt;Star India&lt;/i&gt;&lt;/a&gt; case (2011) was asked to examine the legitimacy of the IMC as well as  four separate clauses of the Programme Code including rule 6(1)(i),  which has been invoked against Sathiyam. But the judge neatly  sidestepped the issues. This feat of judicial adroitness was made  possible by the crass indecency of the content in question, which could  be reasonably restricted. Since the show clearly attracted at least one  ground of legitimate censorship, the judge saw no cause to examine the  other provisions of the Programme Code or even the composition of the  IMC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This judicial restraint has proved detrimental. In May 2013, another  single judge of the Delhi High Court, who was asked by Comedy Central to  adjudge the validity of the IMC’s decision-making process, relied on &lt;i&gt;Star India&lt;/i&gt; (2011) to uphold the MIB’s action against the channel. The channel’s  appeal to the Supreme Court is currently pending. If the Supreme Court  decides to examine the validity of the IMC, the Delhi High Court may put  aside Sathiyam’s petition to wait for legal clarity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it happens, in the &lt;a href="http://indiankanoon.org/doc/110813550/"&gt;&lt;i&gt;Shreya Singhal&lt;/i&gt;&lt;/a&gt; case (2015) that struck down section 66A of the IT Act, the Supreme  Court has an excellent precedent to follow to demand clarity and  precision from the Programme Code, perhaps even strike it down, as well  as due process from the MIB. On the accusation of defaming the Prime  Minister, probably the only clearly stated objection by the MIB, the  Supreme Court’s past law is clear: public servants cannot, for  non-personal acts, claim defamation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Censorship by blunt force&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond the IMC’s advisories and warnings, the Cable TV Act contains  two broad powers of censorship. The first empowerment in section 19  enables a government official to ban any programme or channel if it  fails to comply with the Programme Code or, “if it is likely to promote,  on grounds of religion, race, language, caste or community or any other  ground whatsoever, disharmony or feelings of enmity, hatred or ill-will  between different religious, racial, linguistic or regional groups or  castes or communities or which is likely to disturb the public  tranquility.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second empowerment is much wider. Section 20 of the Cable TV Act  permits the Central Government to ban an entire cable television  operator, as opposed to a single channel or programmes within channels,  if it “thinks it necessary or expedient so to do in public interest”. No  reasons need be given and no grounds need be considered. Such a blunt  use of force creates an overwhelming power of censorship. It is not a  coincidence that section 20 resembles some provisions of  nineteenth-century telegraph laws, which were designed to enable the  colonial state to control the flow of information to its native  subjects.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A manual for television bans&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.frontline.in/arts-and-culture/cinema/cut-and-thrust/article5185915.ece" target="_blank"&gt;Film&lt;/a&gt; and television have &lt;a href="http://thebigindianpicture.com/2013/03/the-heart-of-censorship/" target="_blank"&gt;always&lt;/a&gt; attracted political attention and state censorship. In 1970, &lt;a href="http://indiankanoon.org/doc/1719619/" target="_blank"&gt;Justice Hidayatullah&lt;/a&gt; of the Supreme Court explained why: “It has been almost universally  recognised that the treatment of motion pictures must be different from  that of other forms of art and expression. This arises from the instant  appeal of the motion picture… The motion picture is able to stir up  emotions more deeply than any other product of art.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this historical narrative of censorship, television regulation is relatively new. &lt;a href="http://www.indiantelevision.com/television/programming/tv-channels/regulations/ib-ministry-dictates-channels-to-follow-the-programme" target="_blank"&gt;Past governments&lt;/a&gt; have also been quick to threaten censorship for attacking an incumbent  Prime Minister. There seems to be a pan-governmental consensus that  senior political leaders ought to be beyond reproach, irrespective of  their words and deeds.&lt;/p&gt;
&lt;p&gt;But on what grounds could the state justify these bans? Lord Atkins’ celebrated war-time dissent in &lt;a href="https://en.wikipedia.org/wiki/Liversidge_v_Anderson" target="_blank"&gt;&lt;i&gt;Liversidge&lt;/i&gt;&lt;/a&gt; (1941) offers an unlikely answer:&lt;/p&gt;
&lt;p&gt;“When I use a word,’ Humpty Dumpty said in rather a scornful tone,  ‘it means just what I choose it to mean – neither more nor less.’”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india'&gt;https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-11-29T08:37:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy">
    <title>The Short-lived Adventure of India’s Encryption Policy</title>
    <link>https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy</link>
    <description>
        &lt;b&gt;Written for the Berkeley Information Privacy Law Association (BIPLA). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;During his recent visit to Silicon Valley, Indian Prime Minister Narendra Modi &lt;a href="http://www.thehindu.com/news/resources/full-text-of-narendra-modis-speech-at-san-jose/article7694680.ece" target="_blank"&gt;said&lt;/a&gt; his government was “giving the highest importance to data privacy and  security, intellectual property rights and cyber security”. But a  proposed &lt;a href="http://www.scribd.com/doc/282239916/DRAFT-NATIONAL-ENCRYPTION-POLICY" target="_blank"&gt;national encryption policy&lt;/a&gt; circulated in September 2015 would have achieved the opposite effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy was comically short-lived. After its poorly-drafted provisions invited ridicule, it was swiftly &lt;a href="http://www.cnn.com/2015/09/23/asia/india-withdraws-encryption-policy/" target="_blank"&gt;withdrawn&lt;/a&gt;.  But the government has promised to return with a fresh attempt to  regulate encryption soon. The incident highlights the worrying assault  on &lt;a href="http://www.frontline.in/cover-story/india-privacy-in-peril/article4849211.ece?homepage=true" target="_blank"&gt;communications privacy&lt;/a&gt; and &lt;a href="https://www.washingtonpost.com/world/asia_pacific/indias-modi-wants-to-woo-silicon-valley-but-censorship-and-privacy-fears-grow-at-home/2015/09/23/2ab28f86-6174-11e5-8475-781cc9851652_story.html" target="_blank"&gt;free speech&lt;/a&gt; in India, a concern compounded by the enormous scale of the telecommunications and Internet market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with only around &lt;a href="http://www.livemint.com/Politics/BvW1QKrvU0zKeH23fvKAoK/India-Internet-userbase-crosses-350-million-milestone-in-Jun.html" target="_blank"&gt;26 percent&lt;/a&gt; of its population online, India is already the world’s &lt;a href="https://en.wikipedia.org/wiki/List_of_countries_by_number_of_Internet_users" target="_blank"&gt;second-largest&lt;/a&gt; Internet user, recently overtaking the United States. The number of  Internet users in India is set to grow exponentially, spurred by  ambitious governmental schemes to build a ‘&lt;a href="http://www.digitalindia.gov.in/" target="_blank"&gt;Digital India&lt;/a&gt;’ and a country-wide &lt;a href="http://www.wsj.com/articles/SB10001424052702304870304577490442561089140" target="_blank"&gt;fiber-optic backbone&lt;/a&gt;. There will be a corresponding &lt;a href="http://www.nytimes.com/2015/09/28/technology/india-replaces-china-as-next-big-frontier-for-us-tech-companies.html?_r=0" target="_blank"&gt;increase&lt;/a&gt; in the use of the Internet for communicating and conducting commerce.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Encryption on the Internet&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Encryption protects the security of  Internet users from invasions of privacy, theft of data, and other  attacks. By applying an algorithmic cipher (key), ordinary data  (plaintext) is encoded into an unintelligible form (ciphertext), which  is decrypted using the key. The ciphertext can be intercepted but will  remain unintelligible without the key. The key is secret.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several methods of encryption. &lt;a href="https://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank"&gt;SSL/TLS&lt;/a&gt;,  a family of encryption protocols, is commonly used by major websites.  But while some companies encrypt sensitive data, such as passwords and  financial information, during its &lt;a href="https://www.schneier.com/blog/archives/2010/06/data_at_rest_vs.html" target="_blank"&gt;transit&lt;/a&gt; through the Internet, most data at rest on servers is largely &lt;a href="http://www.wired.com/2014/04/https/" target="_blank"&gt;unencrypted&lt;/a&gt;. For instance, &lt;a href="http://www.forbes.com/sites/hollieslade/2014/05/19/the-only-email-system-the-nsa-cant-access/"&gt;email providers&lt;/a&gt; regularly store plaintext messages on their servers. As a result, governments simply demand and receive &lt;a href="https://www.schneier.com/blog/archives/2015/07/the_risks_of_ma.html" target="_blank"&gt;backdoor&lt;/a&gt; access to information directly from the companies that provide these services. However, governments have long insisted on &lt;a href="https://www.eff.org/issues/calea" target="_blank"&gt;blanket backdoor access&lt;/a&gt; to all communications data, both encrypted and unencrypted, and whether at rest or in transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, proper &lt;a href="http://www.wired.com/2014/11/hacker-lexicon-end-to-end-encryption/" target="_blank"&gt;end-to-end encryption&lt;/a&gt; – full encryption from the sender to recipient, where the service  provider simply passes on the ciphertext without storing it, and deletes  the &lt;a href="https://www.privacyinternational.org/node/53" target="_blank"&gt;metadata&lt;/a&gt; – will defeat backdoors and protect privacy, but may not be &lt;a href="http://www.thenation.com/article/privacy-and-profit-motive/" target="_blank"&gt;profitable&lt;/a&gt;. End-to-end encryption alarms the &lt;a href="https://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course" target="_blank"&gt;surveillance establishment&lt;/a&gt;, which is why British Prime Minister David Cameron wants to &lt;a href="http://www.theguardian.com/commentisfree/2015/jan/13/cameron-ban-encryption-digital-britain-online-shopping-banking-messaging-terror" target="_blank"&gt;ban&lt;/a&gt; it, and many in the US government want Silicon Valley companies to &lt;a href="http://www.nytimes.com/2015/09/08/us/politics/apple-and-other-tech-companies-tangle-with-us-over-access-to-data.html" target="_blank"&gt;stop using it&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of relying on a company to secure  communications, the surest way to achieve end-to-end encryption is for  the sender to encrypt the message before it leaves her computer. Since  only the sender and intended recipient have the key, even if the data is  intercepted in transit or obtained through a backdoor, only the  ciphertext will be visible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost all of human history,  encryption relied on a single shared key; that is, both the sender and  recipient used a pre-determined key. But, like all secrets, the more who  know it, the less secure the key becomes. From the 1970s onwards,  revolutionary advances in cryptography enabled the generation of a pair  of dissimilar keys, one public and one private, which are uniquely and  mathematically linked. This is asymmetric or &lt;a href="https://en.wikipedia.org/wiki/Public-key_cryptography" target="_blank"&gt;public key cryptography&lt;/a&gt;, where the private key remains an exclusive secret. It offers the strongest &lt;a href="http://www.newyorker.com/tech/elements/hard-to-crack-the-governments-encryption-conundrum" target="_blank"&gt;protection&lt;/a&gt; for communications privacy because it returns &lt;a href="http://www.wired.com/2015/09/apple-fighting-privacy-imessage-still-problems/" target="_blank"&gt;autonomy&lt;/a&gt; to the individual and is immune to backdoors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those using public key encryption, Edward Snowden’s revelation that the NSA had &lt;a href="http://www.newyorker.com/tech/elements/how-the-n-s-a-cracked-the-web" target="_blank"&gt;cracked&lt;/a&gt; several encryption protocols including SSL/TLS was worrying. &lt;a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html" target="_blank"&gt;Brute-force decryption&lt;/a&gt; (the use of supercomputers to mathematically attack keys) questions the  integrity of public key encryption. But, since the difficulty of  code-breaking is directly proportional to &lt;a href="https://en.wikipedia.org/wiki/Key_size" target="_blank"&gt;key size&lt;/a&gt;, notionally, generating longer keys will thwart the NSA, for now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The crypto-wars in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where does India’s withdrawn encryption  policy lie in this landscape of encryption and surveillance? It is  difficult to say. Because it was so badly drafted, understanding the  policy was a challenge. It could have been a ham-handed response to  commercial end-to-end encryption, which many major providers such as &lt;a href="http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.html" target="_blank"&gt;Apple&lt;/a&gt; and &lt;a href="http://www.wired.com/2014/11/whatsapp-encrypted-messaging/" target="_blank"&gt;WhatsApp&lt;/a&gt; are adopting following consumer demand. But curiously, this did not  appear to be the case, because the government later exempted &lt;a href="http://indianexpress.com/article/explained/whatsapp-might-be-out-but-the-encryption-policy-is-still-ambiguous/" target="_blank"&gt;WhatsApp&lt;/a&gt; and other “mass use encryption products”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian establishment has a history of battling commercial encryption. From 2008, it fought &lt;a href="https://www.schneier.com/blog/archives/2008/05/blackberry_givi_1.html" target="_blank"&gt;Blackberry&lt;/a&gt; for backdoor access to its encrypted communications, coming close to &lt;a href="http://www.bbc.com/news/technology-10951607" target="_blank"&gt;banning&lt;/a&gt; the service, which &lt;a href="http://www.theregister.co.uk/2012/02/21/rim_india_bbn_server/" target="_blank"&gt;dissipated&lt;/a&gt; only once the company lost its market share. There have been similar  attempts to force Voice over Internet Protocol providers to fall in  line, including &lt;a href="http://timesofindia.indiatimes.com/india/Spooks-want-govt-to-block-Skype/articleshow/5082066.cms" target="_blank"&gt;Skype&lt;/a&gt; and &lt;a href="http://www.bbc.com/news/technology-11137647" target="_blank"&gt;Google&lt;/a&gt;. And there is a new thrust underway to regulate &lt;a href="http://www.trai.gov.in/WriteReaddata/ConsultationPaper/Document/OTT-CP-27032015.pdf" target="_blank"&gt;over-the-top&lt;/a&gt; content providers, including US companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy could represent a new phase in India’s &lt;a href="http://arstechnica.co.uk/tech-policy/2015/09/india-joins-war-on-crypto-wants-everyone-to-keep-plaintext-copies-of-all-encrypted-data-for-90-days/" target="_blank"&gt;crypto-wars&lt;/a&gt;.  The government, emboldened by the sheer scale of the country’s market,  might press an unyielding demand for communications backdoors. The  policy made no bones of this desire: it sought to bind communications  companies by mandatory contracts, regulate key-size and algorithms,  compel surrender of encryption products including “working copies” of  software (the key generation mechanism), and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The motives of regulation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy’s deeply intrusive provisions manifest a &lt;a href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/" target="_blank"&gt;long-standing effort&lt;/a&gt; of the Indian state to dominate communications technology unimpeded by  privacy concerns. From wiretaps to Internet metadata, intrusive  surveillance is not judicially warranted, does not require the  demonstration of probable cause, suffers no external oversight, and is  secret. These shortcomings are enabling the creation of a sophisticated &lt;a href="http://www.thehoot.org/media-watch/digital-media/turning-india-into-a-surveillance-state-i-7149" target="_blank"&gt;surveillance state&lt;/a&gt; that sits ill with India’s constitutional values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those values are being steadily besieged.  India’s Supreme Court is entertaining a surge of clamorous litigation  to check an increasingly intrusive state. Only a few months ago, the  Attorney-General – the government’s foremost lawyer – argued in court  that Indians &lt;a href="http://thewire.in/2015/08/02/the-battle-for-a-right-to-privacy-still-has-a-long-way-to-go-7685/" target="_blank"&gt;did not have&lt;/a&gt; a right to privacy, relying on 1950s case law which permitted invasive  surveillance. Encryption which can inexpensively lock the state out of  private communications alarms the Indian government, which is why it has  skirmished with commercially-available encryption in the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the conflict over encryption is fueled by irregular laws. Telecoms licensing regulations restrict &lt;a href="http://dot.gov.in/sites/default/files/Internet%20Service%20Guideline%2024-08-07.doc" target="_blank"&gt;Internet Service Providers&lt;/a&gt; to 40-bit symmetric keys, a primitively low standard; higher encryption  requires permission and presumably surrender of the shared key to the  government. &lt;a href="http://www.sebi.gov.in/cms/sebi_data/commondocs/anncir2_p.pdf" target="_blank"&gt;Securities trading&lt;/a&gt; on the Internet requires 128-bit SSL/TLS encryption while the country’s &lt;a href="https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8992" target="_blank"&gt;central bank&lt;/a&gt; is pushing for end-to-end encryption for mobile banking. Seen in this  light, the policy could simply be an attempt to rationalize an uneven  field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Encryption and freedom&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps the government was trying to restrict the use of public key encryption and Internet anonymization services, such as &lt;a href="https://www.torproject.org/" target="_blank"&gt;Tor&lt;/a&gt; or &lt;a href="https://geti2p.net/en/" target="_blank"&gt;I2P&lt;/a&gt;, by individuals. India’s telecoms minister &lt;a href="http://indianexpress.com/article/india/india-others/government-withdraws-draft-national-encryption-policy-after-furore/" target="_blank"&gt;stated&lt;/a&gt;:  “The purport of this encryption policy relates only to those who  encrypt.” This was not particularly illuminating. If the government  wants to pre-empt terrorism – a legitimate duty, this approach is flawed  since regardless of the law’s command arguably no terrorist will  disclose her key to the government. Besides, since there are &lt;a href="http://geography.oii.ox.ac.uk/?page=tor" target="_blank"&gt;very few&lt;/a&gt; Internet anonymizers in India who are anyway &lt;a href="https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html" target="_blank"&gt;targeted&lt;/a&gt; for special &lt;a href="http://www.cnet.com/news/nsa-likely-targets-anybody-whos-tor-curious/" target="_blank"&gt;monitoring&lt;/a&gt;, it would be more productive for the surveillance establishment to maintain the status quo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This leaves harmless encrypters –  businesses, journalists, whistle blowers, and innocent privacy  enthusiasts. For this group, impediments to encryption interferes with  their ability to freely communicate. There is a proportionate link  between encryption and the freedom of speech and expression, a fact  acknowledged by &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/OpinionIndex.aspx" target="_blank"&gt;Special Rapporteur&lt;/a&gt; David Kaye of the UN Human Rights Council, where &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/Pages/MembersByGroup.aspx" target="_blank"&gt;India&lt;/a&gt; is a participating member. Kaye &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc" target="_blank"&gt;notes&lt;/a&gt;:  “Encryption and anonymity are especially useful for the development and  sharing of opinions, which often occur through online correspondence  such as e-mail, text messaging, and other online interactions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is because encryption affords privacy which promotes free speech, a relationship &lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf" target="_blank"&gt;reiterated&lt;/a&gt; by the previous UN Special Rapporteur, Frank La Rue. On the other hand, surveillance has a “&lt;a href="http://scholarship.law.wm.edu/cgi/viewcontent.cgi?article=2010&amp;amp;context=facpubs" target="_blank"&gt;chilling effect&lt;/a&gt;” on speech. In 1962, Justice Subba Rao’s &lt;a href="http://liiofindia.org/in/cases/cen/INSC/1962/377.html" target="_blank"&gt;famous dissent&lt;/a&gt; in the Indian Supreme Court presciently connected privacy and free speech:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;The act of surveillance is certainly a  restriction on the [freedom of speech]. It cannot be suggested that the  said freedom…will sustain only the mechanics of speech and expression.  An illustration will make our point clear. A visitor, whether a wife,  son or friend, is allowed to be received by a prisoner in the presence  of a guard. The prisoner can speak with the visitor; but, can it be  suggested that he is fully enjoying the said freedom? It is impossible  for him to express his real and intimate thoughts to the visitor as  fully as he would like. To extend the analogy to the present case is to  treat the man under surveillance as a prisoner within the confines of  our country and the authorities enforcing surveillance as guards. So  understood, it must be held that the petitioner’s freedom under [the  right to free speech under the Indian] Constitution is also infringed.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; (1964) 1 SCR 332, pr. 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps the policy expressed the  government’s discomfort at individual encrypters escaping surveillance,  like free agents evading the state’s control. How should the law respond  to this problem? Daniel Solove &lt;a href="http://yalepress.yale.edu/book.asp?isbn=9780300172317" target="_blank"&gt;says&lt;/a&gt; the security of the state need not compromise individual privacy. On the other hand, as Ronald Dworkin &lt;a href="http://www.hup.harvard.edu/catalog.php?isbn=9780674867116" target="_blank"&gt;influentially maintained&lt;/a&gt;, the freedoms of the individual precede the interests of the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security and trade interests&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, even when assessed from the  perspective of India’s security imperatives, the policy would have had  harmful consequences. It required users of encryption, including  businesses and consumers, to store plaintext versions of their  communications for ninety days to surrender to the government upon  demand. This outrageously ill-conceived provision would have created  real ‘&lt;a href="https://en.wikipedia.org/wiki/Honeypot_%28computing%29" target="_blank"&gt;honeypots&lt;/a&gt;’ (originally, honeypots are &lt;a href="http://time.com/3094404/defcon-hackers-robocalls-honeypot/" target="_blank"&gt;decoy&lt;/a&gt; servers to lure hackers) of unencrypted data, ripe for theft. Note that India does not have a data breach law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy’s demand for encryption  companies to register their products and give working copies of their  software and encryption mechanisms to the Indian government would have  flown in the face of trade secrecy and intellectual property protection.  The policy’s hurried withdrawal was a &lt;a href="http://www.reuters.com/article/2015/09/22/us-india-encryption-law-idUSKCN0RM1CO20150922" target="_blank"&gt;public relations&lt;/a&gt; exercise on the eve of Prime Minister Modi’s visit to Silicon Valley. It was &lt;a href="http://www.zdnet.com/article/indian-pm-modi-visits-us-tech-chiefs-in-wake-of-draconian-encryption-policy-debacle/" target="_blank"&gt;successful&lt;/a&gt;. Modi encountered no &lt;a href="https://www.hrw.org/mk/node/281554" target="_blank"&gt;criticism&lt;/a&gt; of his government’s &lt;a href="http://thewire.in/2015/08/02/the-battle-for-a-right-to-privacy-still-has-a-long-way-to-go-7685/" target="_blank"&gt;visceral opposition&lt;/a&gt; to privacy, even though the policy would have severely disrupted the  business practices of US communications providers operating in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Encryption invites a convergence of state interests between India and US as well: both countries want to &lt;a href="https://www.eff.org/document/crypto-wars-governments-working-undermine-encryption" target="_blank"&gt;control&lt;/a&gt; it. Last month’s &lt;a href="http://www.state.gov/r/pa/prs/ps/2015/09/247192.htm" target="_blank"&gt;joint statement&lt;/a&gt; from the US-India Strategic and Commercial &lt;a href="http://www.state.gov/p/sca/ci/in/strategicdialgue/" target="_blank"&gt;Dialogue&lt;/a&gt; pledges “further cooperation on internet and cyber issues”. This innocuous statement masks a &lt;a href="http://www.state.gov/r/pa/prs/ps/2014/09/232330.htm" target="_blank"&gt;robust&lt;/a&gt; information-gathering and -sharing regime. There is no guarantee  against the sharing of any encryption mechanisms or intercepted  communications by India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has promised to return with a &lt;a href="http://indianexpress.com/article/india/india-others/government-withdraws-draft-national-encryption-policy-after-furore/" target="_blank"&gt;reworked&lt;/a&gt; proposal. It would be in India’s interest for this to be preceded by a  broad-based national discussion on encryption and its links to free  speech, privacy, security, and commerce.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to read the post published on &lt;a class="external-link" href="http://notacoda.net/2015/10/10/the-short-lived-adventure-of-indias-encryption-policy/"&gt;Free Speech / Privacy / Technology website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy'&gt;https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2015-11-29T09:03:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications">
    <title>Predictive Policing: What is it, How it works, and its Legal Implications</title>
    <link>https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications</link>
    <description>
        &lt;b&gt;This article reviews literature surrounding big data and predictive policing and provides an analysis of the legal implications of using predictive policing techniques in the Indian context.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For the longest time, humans have been obsessed with prediction. Perhaps the most well-known oracle in history, Pythia, the infallible Oracle of Delphi was 	said to predict future events in hysterical outbursts on the seventh day of the month, inspired by the god Apollo himself. This fascination with informing 	ourselves about future events has hardly subsided in us humans. What has changed however is the methods we employ to do so. The development of Big data 	technologies for one, has seen radical applications into many parts of life as we know it, including enhancing our ability to make accurate predictions 	about the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One notable application of Big data into prediction caters to another basic need since the dawn of human civilisation, the need to protect our communities 	and cities. The word 'police' itself originates from the Greek word '&lt;i&gt;polis'&lt;/i&gt;, which means city. The melding of these two concepts prediction and 	policing has come together in the practice of Predictive policing, which is the application of computer modelling to historical crime data and metadata to 	predict future criminal activity&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;b&gt;. &lt;/b&gt;In the subsequent sections, I will attempt an 	introduction of predictive policing and explain some of the main methods within the domain of predictive policing. Because of the disruptive nature of 	these technologies, it will also be prudent to expand on the implications predictive technologies have for justice, privacy protections and protections 	against discrimination among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In introducing the concept of predictive policing, my first step is to give a short explanation about current predictive analytics techniques, because 	these techniques are the ones which are applied into a law enforcement context as predictive policing.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is predictive analysis&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Facilitated by the availability of big data, predictive analytics uses algorithms to recognise data patterns and predict future outcomes&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;. Predictive analytics encompasses data mining, predictive modeling, machine learning, and forecasting&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;. Predictive analytics also relies heavily on machine learning and artificial intelligence approaches	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. The aim of such analysis is to identify relationships among variables that may not be immediately 	apparent using hypothesis-driven methods.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; In the mainstream media, one of the most infamous stories about the use of predictive analysis comes from USA, regarding a department store Target and their data analytics practices	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;. Target mined data from purchasing patterns of people who signed onto their baby registry. From this they 	were able to predict approximately when customers may be due and target advertisements accordingly. In the noted story, they were so successful that they 	predicted pregnancy before the pregnant girl's father knew she was pregnant. &lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Examples of predictive analytics&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Predicting the success of a movie based on its online ratings&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Many universities, sometimes in partnership with other firms use predictive analytics to provide course recommendations to students, track student 	performance, personalize curriculum to individual students and foster networking between students.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Predictive Analysis of Corporate Bond Indices Returns&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Relationship between predictive analytics and predictive policing&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The same techniques used in many of the predictive methods mentioned above find application into some predictive policing methods. However two important 	points need to be raised:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, predictive analytics is actually a subset of predictive policing. This is because while the steps in creating a predictive model, of defining a target variable, exposing your model to training data, selecting appropriate features and finally running predictive analysis	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; maybe the same in a policing context, there are other methods which may be used to predict crime, but 	which do not rely on data mining. These techniques may instead use other methods, such as some of those detailed below along with data about historical 	crime to generate predictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her article "Policing by Numbers: Big Data and the Fourth Amendment"&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;, Joh categorises 3 main 	applications of Big data into policing. These are Predictive Policing, Domain Awareness systems and Genetic Data Banks. Genetic data banks refer to 	maintaining large databases of DNA that was collected as part of the justice system. Issues arise when the DNA collected is repurposed in order to conduct 	familial searches, instead of being used for corroborating identity. Familial searches may have disproportionate impacts on minority races. Domain Awareness systems use various computer software and other digital surveillance tools such as Geographical Information Systems	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; or more illicit ones such as Black Rooms&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; to "help police create a software-enhanced picture of the present, using thousands of data points from multiple sources within a city"	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;. I believe Joh was very accurate in separating Predictive Policing from Domain Awareness systems, 	especially when it comes to analysing the implications of the various applications of Big data into policing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such an analysis of the implications of using predictive policing methods, the issues surrounding predictive technologies often get conflated with 	larger issues about the application of big data into law enforcement. That opens the debate up to questions about overly intrusive evidence gathering and 	mass surveillance systems, which though used along with predictive technology, are not themselves predictive in nature. In this article, I aim to 	concentrate on the specific implications that arise due to predictive methods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One important point regarding the impact of predictive policing is how the insights that predictive policing methods offer are used. There is much support 	for the idea that predictive policing does not replace policing methods, but actually augments them. The RAND report specifically cites one myth about 	predictive policing as "the computer will do everything for you&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;". In reality police officers need to 	act on the recommendations provided by the technologies.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is Predictive policing?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Predictive policing is the "application of analytical techniques-particularly quantitative techniques-to identify likely targets for police intervention 	and prevent crime or solve past crimes by making statistical predictions".&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; It is important to note that 	the use of data and statistics to inform policing is not new. Indeed, even twenty years ago, before the deluge of big data we have today, law enforcement 	regimes such as the New York Police Department (NYPD) were already using crime data in a major way. In order to keep track of crime trends, NYPD used the 	software CompStat&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; to map "crime statistics along with other indicators of problems, such as the 	locations of crime victims and gun arrests"&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;. The senior officers used the information provided by CompStat to monitor trends of crimes on a daily basis and such monitoring became an instrumental way to track the performance of police agencies&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;. CompStat has since seen application in many other jurisdictions	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is new is the amount of data available for collection, as well as the ease with which organisations can analyse and draw insightful results from 	that data. Specifically, new technologies allow for far more rigorous interrogation of data and wide-ranging applications, including adding greater 	accuracy to the prediction of future incidence of crime.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Predictive Policing methods&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Some methods of predictive policing involve application of known standard statistical methods, while other methods involve modifying these standard 	techniques. Predictive techniques that forecast future criminal activities can be framed around six analytic categories. They all may overlap in the sense 	that multiple techniques are used to create actual predictive policing software and in fact it is similar theories of criminology which undergird many of 	these methods, but the categorisation in such a way helps clarify the concept of predictive policing. The basis for the categorisation below comes from a RAND Corporation report entitled 'Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations'	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;, which is a comprehensive and detailed contribution to scholarship in this nascent area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hot spot analysis: Methods involving hot spot analysis attempt to "predict areas of increased crime risk based on historical crime data"&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;. The premise behind such methods lies in the adage that "crime tends to be lumpy"	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. Hot Spot analysis seeks to map out these previous incidences of crime in order to inform potential 	future crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regression methods: A regression aims to find relationships between independent variables (factors that may influence criminal activity) and certain 	variables that one aims to predict. Hence, this method would track more variables than just crime history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data mining techniques: Data mining attempts to recognise patterns in data and use it to make predictions about the future. One important variant in the 	various types of data mining methods used in policing are different types of algorithms that are used to mine data in different ways. These are dependent 	on the nature of the data the predictive model was trained on and will be used to interrogate in the future. Two broad categories of algorithms commonly 	used are clustering algorithms and classification algorithms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Clustering algorithms "form a class of data mining approaches that seek to group data into clusters with similar attributes"	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;. One example of clustering algorithms is spatial clustering algorithms, which use geospatial crime 	incident data to predict future hot spots for crime&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Classification algorithms "seek to establish rules assigning a class or label to events"&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;. These 	algorithms use training data sets "to learn the patterns that determine the class of an observation"&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; The patterns identified by the algorithm will be applied to future data, and where applicable, the algorithm will recognise similar patterns in the data. 	This can be used to make predictions about future criminal activity for example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Near-repeat methods: Near-repeat methods work off the assumption that future crimes will take place close to timing and location of current crimes. Hence, 	it could be postulated that areas of high crime will experience more crime in the near future&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;. This involves the use of a 'self-exciting' algorithm, very similar to algorithms modelling earthquake aftershocks	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;. The premise undergirding such methods is very similar to that of hot spot analysis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Spatiotemporal analysis&lt;b&gt;: &lt;/b&gt;Using "environmental and temporal features of the crime location"	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; as the basis for predicting future crime. By combining the spatiotemporal features of the crime area 	with crime incident data, police could use the resultant information to predict the location and time of future crimes. Examples of factors that may be 	considered include timing of crimes, weather, distance from highways, time from payday and many more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Risk terrain analysis: Analyses other factors that are useful in predicting crimes. Examples of such factors include "the social, physical, and behavioural 	factors that make certain areas more likely to be affected by crime"&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various methods listed above are used, often together, to predict the where and when a crime may take place or even potential victims. The unifying thread 	which relates these methods is their dependence on historical crime data.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Examples of predictive policing:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Most uses of predictive policing that have been studied and reviewed in scholarly work come from the USA, though I will detail one case study from 	Derbyshire, UK. Below is a collation of various methods that are a practical application of the methods raised above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hot Spot analysis in Sacramento: In February 2011, Sacramento Police Department began using hot spot analysis along with research on optimal patrol 	time to act as a sufficient deterrent to inform how they patrol high-risk areas. This policy was aimed at preventing serious crimes by patrolling these 	predicted hot spots. In places where there was such patrolling, serious crimes reduced by a quarter with no significant increases such crimes in 	surrounding areas&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data Mining and Hot Spot Mapping in Derbyshire, UK: The Safer Derbyshire Partnership, a group of law enforcement agencies and municipal authorities 	sought to identify juvenile crime hotspots&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;. They used MapInfo software to combine "multiple discrete data sets to create detailed maps and visualisations of criminal activity, including temporal and spatial hotspots"	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;. This information informed law enforcement about how to optimally deploy their resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regression models in Pittsburgh: Researchers used reports from Pittsburgh Bureau of Police about violent crimes and "leading indicator"	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt; crimes, crimes that were relatively minor but which could be a sign of potential future violent 	offences. The researcher ran analysis of areas with violent crimes, which were used as the dependent variable in analysing whether violent crimes in 	certain areas could be predicted by the leading indicator data. From the 93 significant violent crime areas that were studied, 19 areas were successfully 	predicted by the leading indicator data.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Risk terrain modelling analysis in Morris County, New Jersey: Police in Morris County, used risk terrain analysis to tackle violent crimes and 	burglaries. They considered five inputs in their model: "past burglaries, the address of individuals recently arrested for property crimes, proximity to major highways, the geographic concentration of young men and the location of apartment complexes and hotels."	&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt; The Morris County law enforcement officials linked the significant reductions in violent and property 	crime to their use of risk terrain modelling&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Near-repeat &amp;amp; hot spot analysis used by Santa Cruz Police Department: Uses PredPol software that applies the Mohler's algorithm	&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt; to a database with five years' worth of crime data to assess the likelihood of future crime occurring 	in the geographic areas within the city. Before going on shift, officers receive information identifying 15 such areas with the highest probability of 	crime&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;. The initiative has been cited as being very successful at reducing burglaries, and was used in 	Los Angeles and Richmond, Virginia&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data Mining and Spatiotemporal analysis to predict future criminal activities in Chicago: Officers in Chicago Police Department made visits to 	people their software predicted were likely to be involved in violent crimes&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt;, guided by an 	algorithm-generated "Heat List"&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt;. Some of the inputs used in the predictions include some types of 	arrest records, gun ownership, social networks&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt; (police analysis of social networking is also a rising trend in predictive policing&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;) and generally type of people you are acquainted with	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt; among others, but the full list of the factors are not public. The list sends police officers (or 	sometimes mails letters) to peoples' homes to offer social services or deliver warnings about the consequences for offending. Based in part on the 	information provided by the algorithm, officers may provide people on the Heat List information about vocational training programs or warnings about how 	Federal Law provides harsher punishments for reoffending&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Predictive policing in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this section, I map out some of the developments in the field of predictive policing within India. On the whole, predictive policing is still very new 	in India, with Jharkhand being the only state that appears to already have concrete plans in place to introduce predictive policing.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jharkhand Police&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Jharkhand police began developing their IT infrastructure such as a Geographic Information System (GIS) and Server room when they received funding for 	Rs. 18.5 crore from the Ministry of Home Affairs&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;. The Open Group on E-governance (OGE), founded as a 	collaboration between the Jharkhand Police and National Informatics Centre&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;, is now a multi-disciplinary 	group which takes on different projects related to IT&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;. With regards to predictive policing, some 	members of OGE began development in 2013 of data mining software which will scan online records that are digitised. The emerging crime trends "can be a 	building block in the predictive policing project that the state police want to try."&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Jharkhand Police was also reported in 2012 to be in the final stages of forming a partnership with IIM-Ranchi&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;. It was alleged the Jharkhand police aimed to tap into IIM's advanced business analytics skills	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;, skills that can be very useful in a predictive policing context. Mr Pradhan suggested that 	"predictive policing was based on intelligence-based patrol and rapid response"&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; and that it could go a 	long way to dealing with the threat of Naxalism in Jharkhand&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in Jharkhand, the emphasis appears to be targeted at developing a massive Domain Awareness system, collecting data and creating new ways to 	present that data to officers on the ground, instead of architecting and using predictive policing software. For example, the Jharkhand police now have in 	place "a Naxal Information System, Crime Criminal Information System (to be integrated with the CCTNS) and a GIS that supplies customised maps that are vital to operations against Maoist groups"&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;. The Jharkhand police's "Crime Analytics Dashboard"	&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; shows the incidence of crime according to type, location and presents it in an accessible portal, 	providing up-to-date information and undoubtedly raises the situational awareness of the officers. Arguably, the domain awareness systems that are taking 	shape in Jharkhand would pave the way for predictive policing methods to be applied in the future. These systems and hot spot maps seem to be the start of 	a new age of policing in Jharkhand.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive Policing Research&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One promising idea for predictive policing in India comes from the research conducted by Lavanya Gupta and others entitled "Predicting Crime Rates for 	Predictive Policing"&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;, which was a submission for the Gandhian Young Technological Innovation Award. The 	research uses regression modelling to predict future crime rates. Drawing from First Information Reports (FIRs) of violent crimes (murder, rape, kidnapping 	etc.) from Chandigarh Police, the team attempted "to extrapolate annual crime rate trends developed through time series models. This approach also involves correlating past crime trends with factors that will influence the future scope of crime, in particular demographic and macro-economic variables"	&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;. The researchers used early crime data as the training data for their model, which after some testing, 	eventually turned out to have an accuracy of around 88.2%.&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt; On the face of it, ideas like this could be 	the starting point for the introduction of predictive policing into India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rest of India's law enforcement bodies do not appear to be lagging behind. In the 44&lt;sup&gt;th&lt;/sup&gt; All India police science congress, held in 	Gandhinagar, Gujarat in March this year, one of the Themes for discussion was the "Role of Preventive Forensics and latest developments in Voice 	Identification, Tele-forensics and Cyber Forensics"&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;.Mr A K Singh, (Additional Director General of 	Police, Administration) the chairman of the event also said in an interview that there was to be a round-table DGs (Director General of Police) held at the 	conference to discuss predictive policing&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;. Perhaps predictive policing in India may not be that far 	away from reality.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CCTNS and the building blocks of Predictive policing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Home Affairs conceived of a Crime and Criminals Tracking and Network System (CCTNS) as part of national e-Governance plans. According to 	the website of the National Crime Records Bureau (NCRB), CCTNS aims to develop "a nationwide networked infrastructure for evolution of IT-enabled state-of-the-art tracking system around 'investigation of crime and detection of criminals' in real time"	&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The plans for predictive policing seem in the works, but first steps that are needed in India across police forces involve digitizing data collection by 	the police, as well as connecting law enforcement agencies. The NCRB's website described the current possibility of exchange of information between 	neighbouring police stations, districts or states as being "next to impossible"&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;. The aim of CCTNS is 	precisely to address this gap and integrate and connect the segregated law enforcement arms of the state in India, which would be a foundational step in 	any initiatives to apply predictive methods.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What are the implications of using predictive policing? Lessons from USA&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Despite the moves by law enforcement agencies to adopt predictive policing, one reality is that the implications of predictive policing methods are far 	from clear. This section will examine these implications on the carriage of justice and its use in law, as well as how it impacts privacy concerns for the 	individual. It frames the existing debates surrounding these issues with predictive policing, and aims to apply these principles into an Indian context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Justice, Privacy &amp;amp; IV Amendment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two key concerns about how predictive policing methods may be used by law enforcement relate to how insights from predictive policing methods are acted 	upon and how courts interpret them. In the USA, this issue may finds its place under the scope of IV Amendment jurisprudence. The IV amendment states that 	all citizens are "secure from unreasonable searches and seizures of property by the government"&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;. In 	this sense, the IV amendment forms the basis for search and surveillance law in the USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A central aspect of the IV Amendment jurisprudence is drawn from &lt;i&gt;United States v. Katz&lt;/i&gt;. In &lt;i&gt;Katz&lt;/i&gt;, the FBI attached a microphone to the 	outside of a public phone booth to record the conversations of Charles Katz, who was making phone calls related to illegal gambling. The court ruled that 	such actions constituted a search within the auspices of the 4&lt;sup&gt;th&lt;/sup&gt; amendment. The ruling affirmed constitutional protection of all areas where 	someone has a "reasonable expectation of privacy"&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later cases have provided useful tests for situations where government surveillance tactics may or may not be lawful, depending on whether it violates 	one's reasonable expectation of privacy. For example, in &lt;i&gt;United States v. Knotts&lt;/i&gt;, the court held that "police use of an electronic beeper to 	follow a suspect surreptitiously did not constitute a Fourth Amendment search"&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt;. In fact, some argue 	that that the Supreme Court's reasoning in such cases suggests " any 'scientific enhancement' of the senses used by the police to watch activity falls 	outside of the Fourth Amendment's protections if the activity takes place in public"&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;. This reasoning is 	based on the third party doctrine which holds that "if you voluntarily provide information to a third party, the IV Amendment does not preclude the 	government from accessing it without a warrant"&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;. The clearest exposition of this reasoning was in Smith 	v. Maryland, where the presiding judges noted that "this Court consistently has held that a person has no legitimate expectation of privacy in information 	he voluntarily turns over to third parties"&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the third party has seen some challenge in recent time. In &lt;i&gt;United States v. Jones&lt;/i&gt;, it was ruled that the government's warrantless GPS 	tracking of his vehicle 24 hours a day for 28 days violated his Fourth Amendment rights&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;. Though the 	majority ruling was that warrantless GPS tracking constituted a search, it was in a concurring opinion written by Justice Sonya Sotomayor that such 	intrusive warrantless surveillance was said to infringe one's reasonable expectation of privacy. As Newell reflected on Sotomayor's opinion,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Justice Sotomayor stated that the time had come for Fourth Amendment jurisprudence to discard the premise that legitimate expectations of privacy could 	only be found in situations of near or complete secrecy. Sotomayor argued that people should be able to maintain reasonable expectations of privacy in some 	information voluntarily disclosed to third parties"&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She said that the court's current reasoning on what constitutes reasonable expectations of privacy in information disclosed to third parties, such as email 	or phone records or even purchase histories, is "ill-suited to the digital age, in which people reveal a great deal of information about themselves to 	third parties in the course of carrying out mundane tasks"&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive policing vs. Mass surveillance and Domain Awareness Systems&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, there is an important distinction to be drawn between these cases and evidence from predictive policing. This has to do with the difference in 	nature of the evidence collection. Arguably, from Jones and others, what we see is that use of mass surveillance and domain awareness systems, drawing from 	Joh's categorisation of domain awareness systems as being distinct from predictive policing mentioned above, could potentially encroach on one's reasonable 	expectation of privacy. However, I think that predictive policing, and the possible implications for justice associated with it, its predictive harms, are 	quite distinct from what has been heard by courts thus far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reason for distinct risks between predictive harms and privacy harms originating from information gathering is related to the nature of predictive 	policing technologies, and how they are used. It is highly unlikely that the evidence submitted by the State to indict an offender will be mainly 	predictive in nature. For example, would it be possible to convict an accused person solely on the premise that he was predicted to be highly likely to commit a crime, and that subsequently he did? The legal standard of proving guilt beyond a reasonable doubt	&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt; can hardly be met solely on predictive evidence for a multitude of reasons. Predictive policing 	methods could at most, be said to inform police about the risk of someone committing a crime or of crime happening at a certain location, as demonstrated 	above.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Predictive policing and Criminal Procedure&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;It may therefore pay to analyse how predictive policing may be used across the various processes within the criminal justice system. In fact, in an 	analysis of the various stages of criminal procedure, from opening an investigation to gathering evidence, followed by arrest, trial, conviction and 	sentencing, we see that as the individual gets subject to more serious incursions or sanctions by the state, it takes a higher standard of certainty about 	wrongdoing and a higher burden of proof, in order to legitimize that particular action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, at more advanced stages of the criminal justice process such as seeking arrest warrants or trial, it is very unlikely that predictive policing on 	its own can have a tangible impact, because the nature of predictive evidence is probability based. It aims to calculate the risk of future crime occurring 	based on statistical analysis of past crime data&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt;. While extremely useful, probabilities on their own 	will not come remotely close meet the legal standards of proving 'guilt beyond reasonable doubt'. It may be at the earlier stages of the criminal justice 	process that evidence predictive policing might see more widespread application, in terms of applying for search warrants and searching suspicious people 	while on patrol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, in the law enforcement context, prediction as a concept is not new to justice. Both courts and law enforcement officials already make predictions 	about future likelihood of crimes. In the case of issuing warrants, the IV amendment makes provisions that law enforcement officials show that the potential search is based "upon probable cause"&lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt; in order for a judge to grant a warrant. In	&lt;i&gt;US v. Brinegar&lt;/i&gt;, probable cause was defined as existing "where the facts and circumstances within the officers' knowledge, and of which they have reasonably trustworthy information, are sufficient in themselves to warrant a belief by a man of reasonable caution that a crime is being committed"	&lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt;. Again, this legal standard seems too high for predictive evidence meet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the police also have an important role to play in preventing crimes by looking out for potential crimes while on patrol or while doing 	surveillance. When the police stop a civilian on the road to search him, reasonable suspicion must be established. This standard of reasonable suspicion 	was defined in most clearly in &lt;i&gt;Terry v. Ohio&lt;/i&gt;, which required police to "be able to point to specific and articulable facts which, taken together 	with rational inferences from those facts, reasonably warrant that intrusion"&lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;. Therefore, "reasonable 	suspicion that 'criminal activity may be afoot' is at base a prediction that the facts and circumstances warrant the reasonable prediction that a crime is 	occurring or will occur"&lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt;. Despite the assertion that "there are as of yet no reported cases on 	predictive policing in the Fourth Amendment context"&lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt;, examining the impact of predictive policing on the doctrine of reasonable suspicion could be very instructive in understanding the implications for justice and privacy	&lt;a href="#_ftn82" name="_ftnref82"&gt;[82]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive Policing and Reasonable Suspicion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ferguson's insightful contribution to this area of scholarship involves the identification of existing areas where prediction already takes place in 	policing, and analogising them into a predictive policing context&lt;a href="#_ftn83" name="_ftnref83"&gt;[83]&lt;/a&gt;. These three areas are: responding to 	tips, profiling, and high crime areas (hot spots).&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Tips&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Tips are pieces of information shared with the police by members of the public. Often tips, either anonymous or from known police informants, may predict 	future actions of certain people, and require the police to act on this information. The precedent for understanding the role of tips in probable cause 	comes from &lt;i&gt;Illinois v. Gates&lt;/i&gt;&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt;. It was held that "an informant's 'veracity,' 'reliability,' and 	'basis of knowledge'-remain 'highly relevant in determining the value'"&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt; of the said tip. Anonymous tips need to be detailed, timely and individualised enough&lt;a href="#_ftn86" name="_ftnref86"&gt;[86]&lt;/a&gt; to justify reasonable suspicion	&lt;a href="#_ftn87" name="_ftnref87"&gt;[87]&lt;/a&gt;. And when the informant is known to be reliable, then his prior reliability may justify reasonable 	suspicion despite lacking a basis in knowledge&lt;a href="#_ftn88" name="_ftnref88"&gt;[88]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ferguson argues that whereas predictive policing cannot provide individualised tips, it is possible to consider reliable tips about certain areas as a 	parallel to predictive policing&lt;a href="#_ftn89" name="_ftnref89"&gt;[89]&lt;/a&gt;. And since the courts had shown a preference for reliability even in the face of a weak basis in knowledge, it is possible to see the reasonable suspicion standard change in its application&lt;a href="#_ftn90" name="_ftnref90"&gt;[90]&lt;/a&gt;. It also implies that IV protections may be different in places where crime is predicted to occur	&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Profiling&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Despite the negative connotations and controversial overtones at the mere sound of the word, profiling is already a method commonly used by law 	enforcement. For example, after a crime has been committed and general features of the suspect identified by witnesses, police often stop civilians who fit 	this description. Another example of profiling is common in combating drug trafficking&lt;a href="#_ftn92" name="_ftnref92"&gt;[92]&lt;/a&gt;, where agents 	keep track of travellers at airports to watch for suspicious behaviour. Based on their experience of common traits which distinguish drug traffickers from regular travellers (a profile), agents may search travellers if they fit the profile&lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt;. In the case of	&lt;i&gt;United States v. Sokolow&lt;/i&gt;&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt;, the courts "recognized that a drug courier profile is not an irrelevant or inappropriate consideration that, taken in the totality of circumstances, can be considered in a reasonable suspicion determination"	&lt;a href="#_ftn95" name="_ftnref95"&gt;[95]&lt;/a&gt;. Similar lines of thinking could be employed in observing people exchanging small amounts of money in 	an area known for high levels of drug activity, conceiving predictive actions as a form of profile&lt;a href="#_ftn96" name="_ftnref96"&gt;[96]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is valid to consider predictive policing as a form of profiling&lt;a href="#_ftn97" name="_ftnref97"&gt;[97]&lt;/a&gt;, but Ferguson argues that the 	predictive policing context means this 'new form' of profiling could change IV analysis. The premise behind such an argument lies in the fact that a 	prediction made by some algorithm about potential high risk of crime in a certain area, could be taken in conjunction observations of ordinarily innocuous events. Read in the totality of circumstances, these two threads may justify individual reasonable suspicion	&lt;a href="#_ftn98" name="_ftnref98"&gt;[98]&lt;/a&gt;. For example, a man looking into cars at a parking lot may not by itself justify reasonable suspicion, 	but taken together with a prediction of high risk of car theft at that locality, it may well justify reasonable suspicion. It is this impact of predictive 	policing, which influences the analysis of reasonable suspicion in a totality of circumstances that may represent new implications for courts looking at IV 	amendment protections.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Profiling, Predictive Policing and Discrimination&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The above sections have already brought up the point that law enforcement agencies already utilize profiling methods in their operations. Also, as the 	sections on how predictive analytics works and on methods of predictive policing make clear, predictive policing definitely incorporates the development of 	profiles for predicting future criminal activity. Concerns about predictive models generate potentially discriminatory predictions therefore are very 	serious, and need addressing. Potential discrimination may be either overt, though far less likely, or unintended. A valuable case study of which sheds 	light on such discriminatory data mining practices can be found in US Labour law. It was shown how predictive models could be discriminatory at various stages, from conceptualising the model and training it with training data, to eventually selecting inappropriate features to search for	&lt;a href="#_ftn99" name="_ftnref99"&gt;[99]&lt;/a&gt;. It is also possible for data scientists to (intentionally or not) use proxies for identifiers like 	race, income level, health condition and religion. Barocas and Selbst argue that "the current distribution of relevant attributes-attributes that can and should be taken into consideration in apportioning opportunities fairly-are demonstrably correlated with sensitive attributes"	&lt;a href="#_ftn100" name="_ftnref100"&gt;[100]&lt;/a&gt;. Hence, what may result is unintended discrimination, as predictive models and their subjective and 	implicit biases are reflected in predicted decisions, or that the discrimination is not even accounted for in the first place. While I have not found any 	case law where courts have examined such situations in a criminal context, at the very least, law enforcement agencies need to be aware of these 	possibilities and guard against any forms of discriminatory profiling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Ferguson argues that "the precision of the technology may in fact provide more protection for citizens in broadly defined high crime areas"	&lt;a href="#_ftn101" name="_ftnref101"&gt;[101]&lt;/a&gt;. This is because the label of a 'high-crime area' may no longer apply to large areas but instead to 	very specific areas of criminal activity. This implies that previously defined areas of high crime, like entire neighbourhoods may not be scrutinised in 	such detail. Instead, police now may be more precise in locating and policing areas of high crime, such as an individual street corner or a particular 	block of flats instead of an entire locality.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Hot Spots&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Courts have also considered the existence of notoriously 'high-crime areas as part of considering reasonable suspicion&lt;a href="#_ftn102" name="_ftnref102"&gt;[102]&lt;/a&gt;. This was seen in &lt;i&gt;Illinois v. Wardlow&lt;/i&gt; &lt;a href="#_ftn103" name="_ftnref103"&gt;[103]&lt;/a&gt;, where the "high crime nature of an area can be considered in evaluating the officer's objective 	suspicion"&lt;a href="#_ftn104" name="_ftnref104"&gt;[104]&lt;/a&gt;. Many cases have since applied this reasoning without scrutinising the predictive value 	of such a label. In fact, Ferguson asserts that such labelling has questionable evidential value&lt;a href="#_ftn105" name="_ftnref105"&gt;[105]&lt;/a&gt;. He 	uses the facts of the &lt;i&gt;Wardlow &lt;/i&gt;case itself to challenge the 'high crime area' factor. Ferguson cites the reasoning of one of the judges in the 	case:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While the area in question-Chicago's District 11-was a low-income area known for violent crimes, how that information factored into a predictive judgment 	about a man holding a bag in the afternoon is not immediately clear."&lt;a href="#_ftn106" name="_ftnref106"&gt;[106]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Especially because "the most basic models of predictive policing rely on past crimes"&lt;a href="#_ftn107" name="_ftnref107"&gt;[107]&lt;/a&gt;, it is likely 	that the predictive policing methods like hot spot or spatiotemporal analysis and risk terrain modelling may help to gather or build data models about high 	crime areas. Furthermore, the mathematical rigour of the predictive modelling could help clarify the term 'high crime area'. As Ferguson argues, "courts may no longer need to rely on the generalized high crime area terminology when more particularized and more relevant information is available"	&lt;a href="#_ftn108" name="_ftnref108"&gt;[108]&lt;/a&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Summary&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Ferguson synthesises four themes to which encapsulate reasonable suspicion analysis:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Predictive information is not enough on its own. Instead, it is "considered relevant to the totality of circumstances, but must be corroborated by 	direct police observation"&lt;a href="#_ftn109" name="_ftnref109"&gt;[109]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The prediction must also "be particularized to a person, a profile, or a place, in a way that directly connects the suspected crime to the suspected 	person, profile, or place"&lt;a href="#_ftn110" name="_ftnref110"&gt;[110]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;It must also be detailed enough to distinguish a person or place from others not the focus of the prediction	&lt;a href="#_ftn111" name="_ftnref111"&gt;[111]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Finally, predicted information becomes less valuable over time. Hence it must be acted on quickly or be lost	&lt;a href="#_ftn112" name="_ftnref112"&gt;[112]&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 style="text-align: justify; "&gt;Conclusions from America&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The main conclusion to draw from the analysis of the parallels between existing predictions in IV amendment law and predictive policing is that "predictive policing will impact the reasonable suspicion calculus by becoming a factor within the totality of circumstances test"&lt;a href="#_ftn113" name="_ftnref113"&gt;[113]&lt;/a&gt;. Naturally, it reaffirms the imperative for predictive techniques to collect reliable data	&lt;a href="#_ftn114" name="_ftnref114"&gt;[114]&lt;/a&gt; and analyse it transparently&lt;a href="#_ftn115" name="_ftnref115"&gt;[115]&lt;/a&gt;. Moreover, in 	order for courts to evaluate the reliability of the data and the processes used (since predictive methods become part of the reasonable suspicion 	calculus), courts need to be able to analyse the predictive process. This has implications for the how hearings may be conducted, for how legal 	adjudicators may require training and many more. Another important concern is that the model of predictive information and police corroboration or direct 	observation&lt;a href="#_ftn116" name="_ftnref116"&gt;[116]&lt;/a&gt; may mean that in areas which were predicted to have low risk of crime, the reasonable 	suspicion doctrine works against law enforcement. There may be less effort paid to patrolling these other areas as a result of predictions.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Implications for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While there have been no cases directly involving predictive policing methods, it would be prudent to examine the parts of Indian law which would inform 	the calculus on the lawfulness of using predictive policing methods. A useful lens to examine this might be found in the observation that prediction is not 	in itself a novel concept in justice, and is already used by courts and law enforcement in numerous circumstances.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure in Non-Warrant Contexts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most logical way to begin analysing the legal implications of predictive policing in India may probably involve identifying parallels between American 	and Indian criminal procedure, specifically searching for instances where 'reasonable suspicion' or some analogous requirement exists for justifying police 	searches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In non-warrant scenarios, we find conditions for officers to conduct such a warrantless search in Section 165 of the Criminal Procedure Code (Cr PC). For 	clarity purposes I have stated section 165 (1) in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Whenever an officer in charge of a police station or a police officer making an investigation &lt;b&gt;has reasonable grounds&lt;/b&gt; for believing that 	anything necessary for the purposes of an investigation into any offence which he is authorised to investigate may be found in any place with the limits of 	the police station of which he is in charge, or to which he is attached, and that such thing cannot in his opinion be otherwise obtained without undue 	delay, such officer may, after recording in writing the grounds of his belief and specifying in such writing, so far as possible, the thing for which search is to be made, search, or cause search to be made, for such thing in any place within the limits of such station."	&lt;a href="#_ftn117" name="_ftnref117"&gt;[117]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, India differs from the USA in that its Cr PC allows for police to arrest individuals without a warrant as well. As observed in	&lt;i&gt;Gulab Chand Upadhyaya vs State Of U.P&lt;/i&gt;, "Section 41 Cr PC gives the power to the police to arrest without warrant in cognizable offences, in cases enumerated in that Section. One such case is of receipt of a 'reasonable complaint' or 'credible information' or 'reasonable suspicion'"	&lt;a href="#_ftn118" name="_ftnref118"&gt;[118]&lt;/a&gt; Like above, I have stated section 41 (1) and subsection (a) in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"41. When police may arrest without warrant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indiankanoon.org/doc/507354/"&gt;(1)&lt;/a&gt; Any police officer may without an order from a Magistrate and without a warrant, arrest any person-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indiankanoon.org/doc/1315149/"&gt;(a)&lt;/a&gt; who has been concerned in any cognizable offence, or against whom a	&lt;b&gt;reasonable complaint has been made, or credible information has been received, or a reasonable suspicion exists&lt;/b&gt;, of his having been so 	concerned"&lt;a href="#_ftn119" name="_ftnref119"&gt;[119]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In analysing the above sections of Indian criminal procedure from a predictive policing angle, one may find both similarities and differences between the 	proposed American approach and possible Indian approaches to interpreting or incorporating predictive policing evidence.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Similarity of 'reasonable suspicion' requirement&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;For one, the requirement for "reasonable grounds" or "reasonable suspicion" seems to be analogous to the American doctrine of reasonable suspicion. This 	suggests that the concepts used in forming reasonable suspicion, for the police to "be able to point to specific and articulable facts which, taken 	together with rational inferences from those facts, reasonably warrant that intrusion"&lt;a href="#_ftn120" name="_ftnref120"&gt;[120]&lt;/a&gt; may also be 	useful in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One case which sheds light on an Indian interpretation of reasonable suspicion or grounds is	&lt;i&gt;State of Punjab v. Balbir Singh&lt;a href="#_ftn121" name="_ftnref121"&gt;&lt;b&gt;[121]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;. In that case, the court observes a 	requirement for "reason to believe that such an offence under Chapter IV has been committed and, therefore, an arrest or search was necessary as 	contemplated under these provisions"&lt;a href="#_ftn122" name="_ftnref122"&gt;[122]&lt;/a&gt; in the context of Section 41 and 42 in The Narcotic Drugs and 	Psychotropic Substances Act, 1985&lt;a href="#_ftn123" name="_ftnref123"&gt;[123]&lt;/a&gt;. In examining the requirement of having "reason to believe", the court draws on &lt;i&gt;Partap Singh (Dr)&lt;/i&gt; v.	&lt;i&gt;Director of Enforcement, Foreign Exchange Regulation Act&lt;a href="#_ftn124" name="_ftnref124"&gt;&lt;b&gt;[124]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;, where the judge 	observed that "the expression 'reason to believe' is not synonymous with subjective satisfaction of the officer. The belief must be held in good faith; it 	cannot be merely a pretence….."&lt;a href="#_ftn125" name="_ftnref125"&gt;[125]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of this, the judge in &lt;i&gt;Balbir Singh &lt;/i&gt;remarked that "whether there was such reason to believe and whether the officer empowered acted in a bona fide manner, depends upon the facts and circumstances of the case and will have a bearing in appreciation of the evidence"	&lt;a href="#_ftn126" name="_ftnref126"&gt;[126]&lt;/a&gt;. The standard considered by the court in &lt;i&gt;Balbir Singh &lt;/i&gt;and &lt;i&gt;Partap Singh&lt;/i&gt; is 	different from the 'reasonable suspicion' or 'reasonable grounds' standard as per Section 41 and 165 of Cr PC. But I think the discussion can help to 	inform our analysis of the idea of reasonableness in law enforcement actions. Of importance was the court requirement of something more than mere 	"pretence" as well as a belief held in good faith. This could suggest that in fact the reasoning in American jurisprudence about reasonable suspicion might 	be at least somewhat similar to how Indian courts view reasonable suspicion or grounds in the context of predictive policing, and therefore how we could 	similarly conjecture that predictive evidence could form part of the reasonable suspicion calculus in India as well.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Difference in judicial treatment of illegally obtained evidence - Indian lack of exclusionary rules&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;However, the apparent similarity of how police in America and India may act in non-warrant situations - guided by the idea of reasonable suspicion - is 	only veneered by linguistic parallels. Despite the existence of such conditions which govern the searches without a warrant, I believe that Indian courts 	currently may provide far less protection against unlawful use of predictive technologies. The main premise behind this argument is that Indian courts 	refuse to exclude evidence that was obtained in breaches of the conditions of sections of the Cr PC. What exists in place of evidentiary safeguards is a 	line of cases in which courts routinely admit unlawfully or illegally obtained evidence. Without protections against unlawfully gathered evidence being 	considered relevant by courts, any regulations on search or conditions to be met before a search is lawful become ineffective. Evidence may simply enter 	the courtroom through a backdoor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the USA, this is by and large, not the case. Although there are exceptions to these rules, exclusionary rules are set out to prevent admission of 	evidence which violates the constitution&lt;a href="#_ftn127" name="_ftnref127"&gt;[127]&lt;/a&gt;. "The exclusionary rule applies to evidence gained from an unreasonable search or seizure in violation of the Fourth Amendment "&lt;a href="#_ftn128" name="_ftnref128"&gt;[128]&lt;/a&gt;. Mapp v. Ohio	&lt;a href="#_ftn129" name="_ftnref129"&gt;[129]&lt;/a&gt; set the precedent for excluding unconstitutionally gathered evidence, where the court ruled that "all evidence obtained by searches and seizures in violation of the Federal Constitution is inadmissible in a criminal trial in a state court"	&lt;a href="#_ftn130" name="_ftnref130"&gt;[130]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any such evidence which then leads law enforcement to collect new information may also be excluded, as part of the "fruit of the poisonous tree" doctrine&lt;a href="#_ftn131" name="_ftnref131"&gt;[131]&lt;/a&gt;, established in Silverthorne Lumber Co. v. United States	&lt;a href="#_ftn132" name="_ftnref132"&gt;[132]&lt;/a&gt;. The doctrine is a metaphor which suggests that if the source of certain evidence is tainted, so is 'fruit' or derivatives from that unconstitutional evidence. One such application was in	&lt;i&gt;Beck v. Ohio&lt;a href="#_ftn133" name="_ftnref133"&gt;&lt;b&gt;[133]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;, where the courts overturned a petitioner's conviction 	because the evidence used to convict him was obtained via an unlawful arrest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However in India's context, there is very little protection against the admission and use of unlawfully gathered evidence. In fact, there are a line of 	cases which lay out the extent of consideration given to unlawfully gathered evidence - both cases that specifically deal with the rules as per the Indian 	Cr PC as well as cases from other contexts - which follow and develop this line of reasoning of allowing illegally obtained evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One case to pay attention to is &lt;i&gt;State of Maharastra v. Natwarlal Damodardas Soni&lt;/i&gt; - in this case, the Anti-Corruption Bureau searched the house of 	the accused after receiving certain information as a tip. The police "had powers under the Code of Criminal Procedure to search and seize this gold if they 	had reason to believe that a cognizable offence had been committed in respect thereof"&lt;a href="#_ftn134" name="_ftnref134"&gt;[134]&lt;/a&gt;. Justice 	Sarkaria, in delivering his judgement, observed that for argument's sake, even if the search was illegal, "then also, it will not affect the validity of the seizure and further investigation"&lt;a href="#_ftn135" name="_ftnref135"&gt;[135]&lt;/a&gt;. The judge drew reasoning from	&lt;i&gt;Radhakishan v. State of U.P&lt;/i&gt;&lt;a href="#_ftn136" name="_ftnref136"&gt;[136]&lt;/a&gt;. This which was a case involving a postman who had certain 	postal items that were undelivered recovered from his house. As the judge in &lt;i&gt;Radhakishan&lt;/i&gt; noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"So far as the alleged illegality of the search is concerned, it is sufficient to say that even assuming that the search was illegal the seizure of the 	articles is not vitiated. It may be that where the provisions of Sections 103 and 165 of the Code of Criminal Procedure, are contravened the search could 	be resisted by the person whose premises are sought to be searched. It may also be that because of the illegality of the search the court may be inclined to examine carefully the evidence regarding the seizure. But beyond these two consequences no further consequence ensues."	&lt;a href="#_ftn137" name="_ftnref137"&gt;[137]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Shyam Lal Sharma&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;a href="#_ftn138" name="_ftnref138"&gt;&lt;b&gt;[138]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; was also drawn upon, where it was held that "even if the 	search is illegal being in contravention with the requirements of Section 165 of the Criminal Procedure Code, 1898, that provision ceases to have any 	application to the subsequent steps in the investigation"&lt;a href="#_ftn139" name="_ftnref139"&gt;[139]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in &lt;i&gt;Gulab Chand &lt;/i&gt;&lt;i&gt;Upadhyay&lt;/i&gt;, mentioned above, the presiding judge contended that even "if arrest is made, it does not require any, much 	less strong, reasons to be recorded or reported by the police. Thus so long as the information or suspicion of cognizable offence is "reasonable" or 	"credible", the police officer is not accountable for the discretion of arresting or no arresting"&lt;a href="#_ftn140" name="_ftnref140"&gt;[140]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more complete articulation of the receptiveness of Indian courts to admit illegally gathered evidence can be seen in the aforementioned	&lt;i&gt;Balbir Singh. &lt;/i&gt;The judgement aimed to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"dispose of one of the contentions that failure to comply with the provisions of Cr PC in respect of search and seizure even up to that stage would also 	vitiate the trial. This aspect has been considered in a number of cases and it has been held that the violation of the provisions particularly that of 	Sections 100, 102, 103 or 165 Cr PC strictly per se does not vitiate the prosecution case. If there is such violation, what the courts have to see is 	whether any prejudice was caused to the accused and in appreciating the evidence and other relevant factors, the courts should bear in mind that there was 	such a violation and from that point of view evaluate the evidence on record."&lt;a href="#_ftn141" name="_ftnref141"&gt;[141]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judges then consulted a series of authorities on the failure to comply with provisions of the Cr PC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;i&gt;State of Punjab&lt;/i&gt; v. &lt;i&gt;Wassan Singh&lt;/i&gt;&lt;a href="#_ftn142" name="_ftnref142"&gt;[142]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; "irregularity in a search cannot vitiate the seizure of the articles"&lt;a href="#_ftn143" name="_ftnref143"&gt;[143]&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Sunder Singh&lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;&lt;a href="#_ftn144" name="_ftnref144"&gt;[144]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; 'irregularity 	cannot vitiate the trial unless the accused has been prejudiced by the defect and it is also held that if reliable local witnesses are not available the 	search would not be vitiated."&lt;a href="#_ftn145" name="_ftnref145"&gt;[145]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Matajog Dobey&lt;/i&gt; v.&lt;i&gt;H.C. Bhari&lt;/i&gt;&lt;a href="#_ftn146" name="_ftnref146"&gt;[146]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; "when the 	salutory provisions have not been complied with, it may, however, affect the weight of the evidence in support of the search or may furnish a reason for 	disbelieving the evidence produced by the prosecution unless the prosecution properly explains such circumstance which made it impossible for it to comply 	with these provisions."&lt;a href="#_ftn147" name="_ftnref147"&gt;[147]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;R&lt;/i&gt; v. &lt;i&gt;Sang&lt;/i&gt;&lt;a href="#_ftn148" name="_ftnref148"&gt;[148]&lt;/a&gt;: "reiterated the same principle that if 	evidence was admissible it matters not how it was obtained."&lt;a href="#_ftn149" name="_ftnref149"&gt;[149]&lt;/a&gt; Lord Diplock, one of the Lords 	adjudicating the case, observed that "however much the judge may dislike the way in which a particular piece of evidence was obtained before proceedings were commenced, if it is admissible evidence probative of the accused's guilt "it is no part of his judicial function to exclude it for this reason".	&lt;a href="#_ftn150" name="_ftnref150"&gt;[150]&lt;/a&gt; As the judge in &lt;i&gt;Balbir Singh&lt;/i&gt; quoted from Lord Diplock, a judge "has no discretion to 	refuse to admit relevant admissible evidence on the ground that it was obtained by improper or unfair means. The court is not concerned with how it was 	obtained."&lt;a href="#_ftn151" name="_ftnref151"&gt;[151]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The vast body of case law presented above provides observers with a clear image of the courts willingness to admit and consider illegally obtained 	evidence. The lack of safeguards against admission of unlawful evidence are important from the standpoint of preventing the excessive or unlawful use of 	predictive policing methods. The affronts to justice and privacy, as well as the risks of profiling, seem to become magnified when law enforcement use 	predictive methods more than just to augment their policing techniques but to replace some of them. The efficacy and expediency offered by using predictive 	policing needs to be balanced against the competing interest of ensuring rule of law and due process. In the Indian context, it seems courts sparsely 	consider this competing interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, weighing in on which approach is better depends on a multitude of criteria like context, practicality, societal norms and many more. It also 	draws on existing debates in administrative law about the role of courts, which may emphasise protecting individuals and preventing excessive state power (red light theory) or emphasise efficiency in the governing process with courts assisting the state to achieve policy objectives (green light theory)	&lt;a href="#_ftn152" name="_ftnref152"&gt;[152]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A practical response may be that India should aim to embrace both elements and balance them appropriately, although what an appropriate balance again may vary. There are some who claim that this balance already exists in India. Evidence for such a claim may come from	&lt;i&gt;R.M. Malkani v. State of Maharashtra&lt;/i&gt;&lt;a href="#_ftn153" name="_ftnref153"&gt;[153]&lt;/a&gt;, where the court considered whether an illegally tape-recorded conversation&lt;i&gt; &lt;/i&gt;could be admissible. In its reasoning, the court drew from &lt;i&gt;Kuruma, Son of Kanju v. R.&lt;/i&gt; &lt;a href="#_ftn154" name="_ftnref154"&gt;[154]&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;noting that&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"&lt;/i&gt; if evidence was admissible it matters not how it was obtained. There is of course always a word of caution. It is that the Judge has a discretion to 	disallow evidence in a criminal case if the strict rules of admissibility would operate unfairly against the accused. That caution is the golden rule in 	criminal jurisprudence"&lt;a href="#_ftn155" name="_ftnref155"&gt;[155]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this discretion exists at least principally in India, in practice the cases presented above show that judges rarely exercise that discretion to 	prevent or bar the admission of illegally obtained evidence or evidence that was obtained in a manner that infringed the provisions governing search or 	arrest in the Cr PC. Indeed, the concern is that perhaps the necessary safeguards required to keep law enforcement practices, including predictive policing 	techniques, in check would be better served by a greater focus on reconsidering the legality of unlawfully gathered evidence. If not, evidence which should 	otherwise be inadmissible may find its way into consideration by existing legal backdoors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Risk of discriminatory predictive analysis&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Regarding the risk of discriminatory profiling, Article 15 of India's Constitution&lt;a href="#_ftn156" name="_ftnref156"&gt;[156]&lt;/a&gt; states that "the State shall not discriminate against any citizen on grounds only of religion, race, caste, sex, place of birth or any of them"	&lt;a href="#_ftn157" name="_ftnref157"&gt;[157]&lt;/a&gt;. The existence of constitutional protection for such forms of discrimination suggests that India 	will be able to guard against discriminatory predictive policing. However, as mentioned before, predictive analytics often discriminates institutionally, 	"whereby unconscious implicit biases and inertia within society's institutions account for a large part of the disparate effects observed, rather than 	intentional choices"&lt;a href="#_ftn158" name="_ftnref158"&gt;[158]&lt;/a&gt;. As in most jurisdictions, preventing these forms of discrimination are much 	harder. Especially in a jurisdiction whose courts are already receptive to allowing admission of illegally obtained evidence, the risk of discriminatory 	data mining or prejudiced algorithms being used by police becomes magnified. Because the discrimination may be unintentional, it may be even harder for 	evidence from discriminatory predictive methods to be scrutinised or when applicable, dismissed by the courts.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;One thing which is eminently clear from the analysis of possible interpretations of predictive evidence is that Indian Courts have had no experience with 	any predictive policing cases, because the technology itself is still at a nascent stage. There is in fact a long way to go before predictive policing will 	become used on a scale similar to that of USA for example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, even in places where predictive policing is used much more prominently, there is no precedent to observe how courts may view predictive policing. 	Ferguson's method of locating analogous situations to predictive policing which courts have already considered is one notable approach, but even this does 	not provide complete answer. One of his main conclusions that predictive policing will affect the reasonable suspicion calculus, or in India's case, 	contribute to 'reasonable grounds' in some ways, is perhaps the most valid one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, what provides more cause for concern in India's context are the limited protections against use of unlawfully gathered evidence. The lack of 	'exclusionary rules' unlike those present in the US amplifies the various risks of predictive policing because individuals have little means of redress in 	such situations where predictive policing may be used unjustly against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet, the promise of predictive policing remains undeniably attractive for India. The successes predictive policing methods seem to have had In the US and 	UK coupled with the more efficient allocation of law enforcement's resources as a consequence of adapting predictive policing evidence this point. The 	government recognises this and seems to be laying the foundation and basic digital infrastructure required to utilize predictive policing optimally. One 	ought also to ask whether it is the even within the court's purview to decide what kind of policing methods are to be permissible through evaluating the 	nature of evidence. There is a case to be made for the legislative arm of the state to provide direction on how predictive policing is to be used in India. 	Perhaps the law must also evolve with the changes in technology, especially if courts are to scrutinise the predictive policing methods themselves.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Joh, Elizabeth E. "Policing by Numbers: Big Data and the Fourth Amendment." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, 			February 1, 2014. http://papers.ssrn.com/abstract=2403028. 			&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big Data for All: Privacy and User Control in the Age of Analytics." Northwestern Journal of Technology and 			Intellectual Property 11, no. 5 (April 17, 2013): 239.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Datta, Rajbir Singh. "Predictive Analytics: The Use and Constitutionality of Technology in Combating Homegrown Terrorist Threats." SSRN Scholarly 			Paper. Rochester, NY: Social Science Research Network, May 1, 2013. http://papers.ssrn.com/abstract=2320160.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Johnson, Jeffrey Alan. "Ethics of Data Mining and Predictive Analytics in Higher Education." SSRN Scholarly Paper. Rochester, NY: Social Science 			Research Network, May 8, 2013. http://papers.ssrn.com/abstract=2156058.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Duhigg, Charles. "How Companies Learn Your Secrets." The New York Times, February 16, 2012. 			http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Lijaya, A, M Pranav, P B Sarath Babu, and V R Nithin. "Predicting Movie Success Based on IMDB Data." International Journal of Data Mining 			Techniques and Applications 3 (June 2014): 365-68.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[9] Johnson, Jeffrey Alan. "Ethics of Data Mining and Predictive Analytics in Higher Education." SSRN Scholarly Paper. Rochester, NY: Social 			Science Research Network, May 8, 2013. http://papers.ssrn.com/abstract=2156058.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Sangvinatsos, Antonios A. "Explanatory and Predictive Analysis of Corporate Bond Indices Returns." SSRN Scholarly Paper. Rochester, NY: Social 			Science Research Network, June 1, 2005. http://papers.ssrn.com/abstract=891641.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Barocas, Solon, and Andrew D. Selbst. "Big Data's Disparate Impact." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, February 			13, 2015. http://papers.ssrn.com/abstract=2477899.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Joh, supra note 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; US Environmental Protection Agency. "How We Use Data in the Mid-Atlantic Region." US EPA. Accessed November 6, 2015. 			http://archive.epa.gov/reg3esd1/data/web/html/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; See &lt;a href="http://web.archive.org/web/20060603014844/http:/blog.wired.com/27BStroke6/att_klein_wired.pdf"&gt;here&lt;/a&gt; for details of blackroom.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Joh, supra note 1, at pg 48.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Perry, Walter L., Brian McInnis, Carter C. Price, Susan Smith and John S. Hollywood. Predictive Policing: The Role of Crime Forecasting in Law 			Enforcement Operations. Santa Monica, CA: RAND Corporation, 2013. http://www.rand.org/pubs/research_reports/RR233. Also available in print form.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Ibid, at pg 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Chan, Sewell. "Why Did Crime Fall in New York City?" City Room. Accessed November 6, 2015. 			http://cityroom.blogs.nytimes.com/2007/08/13/why-did-crime-fall-in-new-york-city/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Bureau of Justice Assistance. "COMPSTAT: ITS ORIGINS, EVOLUTION, AND FUTURE IN LAW ENFORCEMENT AGENCIES," 2013. 			http://www.policeforum.org/assets/docs/Free_Online_Documents/Compstat/compstat%20-%20its%20origins%20evolution%20and%20future%20in%20law%20enforcement%20agencies%202013.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; 1996 internal NYPD article "Managing for Results: Building a Police Organization that Dramatically Reduces Crime, Disorder, and Fear."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Bratton, William. "Crime by the Numbers." The New York Times, February 17, 2010. http://www.nytimes.com/2010/02/17/opinion/17bratton.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; RAND CORP, supra note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; RAND CORP, supra note 16, at pg 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Joh, supra note 1, at pg 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; RAND CORP, supra note 16, pg 38.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; RAND CORP, supra note 16, at pg 39.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; RAND CORP, supra note 16, at pg 41.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Data-Smart City Solutions. "Dr. George Mohler: Mathematician and Crime Fighter." Data-Smart City Solutions, May 8, 2013. 			http://datasmart.ash.harvard.edu/news/article/dr.-george-mohler-mathematician-and-crime-fighter-166.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; RAND CORP, supra note 16, at pg 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Joh, supra note 1, at pg 45.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Ouellette, Danielle. "Dispatch - A Hot Spots Experiment: Sacramento Police Department," June 2012. 			http://cops.usdoj.gov/html/dispatch/06-2012/hot-spots-and-sacramento-pd.asp.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Pitney Bowes Business Insight. "The Safer Derbyshire Partnership." Derbyshire, 2013. 			http://www.mapinfo.com/wp-content/uploads/2013/05/safer-derbyshire-casestudy.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Daniel B Neill, Wilpen L. Gorr. "Detecting and Preventing Emerging Epidemics of Crime," 2007.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; RAND CORP, supra note 16, at pg 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Joh, supra note 1, at pg 46.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Paul, Jeffery S, and Thomas M. Joiner. "Integration of Centralized Intelligence with Geographic Information Systems: A Countywide Initiative." 			Geography and Public Safety 3, no. 1 (October 2011): 5-7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Mohler, supra note 30.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Moses, B., Lyria, &amp;amp; Chan, J. (2014). Using Big Data for Legal and Law Enforcement 			&lt;br /&gt; Decisions: Testing the New Tools (SSRN Scholarly Paper No. ID 2513564). Rochester, NY: Social Science Research Network. Retrieved from 			http://papers.ssrn.com/abstract=2513564&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Gorner, Jeremy. "Chicago Police Use Heat List as Strategy to Prevent Violence." Chicago Tribune. August 21, 2013. 			http://articles.chicagotribune.com/2013-08-21/news/ct-met-heat-list-20130821_1_chicago-police-commander-andrew-papachristos-heat-list.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Stroud, Matt. "The Minority Report: Chicago's New Police Computer Predicts Crimes, but Is It Racist?" The Verge. Accessed November 13, 2015. 			http://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Moser, Whet. "The Small Social Networks at the Heart of Chicago Violence." Chicago Magazine, December 9, 2013. 			http://www.chicagomag.com/city-life/December-2013/The-Small-Social-Networks-at-the-Heart-of-Chicago-Violence/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Lester, Aaron. "Police Clicking into Crimes Using New Software." Boston Globe, March 18, 2013. 			https://www.bostonglobe.com/business/2013/03/17/police-intelligence-one-click-away/DzzDbrwdiNkjNMA1159ybM/story.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Stanley, Jay. "Chicago Police 'Heat List' Renews Old Fears About Government Flagging and Tagging." American Civil Liberties Union, February 25, 			2014. https://www.aclu.org/blog/chicago-police-heat-list-renews-old-fears-about-government-flagging-and-tagging.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Rieke, Aaron, David Robinson, and Harlan Yu. "Civil Rights, Big Data, and Our Algorithmic Future," September 2014. 			https://bigdata.fairness.io/wp-content/uploads/2015/04/2015-04-20-Civil-Rights-Big-Data-and-Our-Algorithmic-Future-v1.2.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Edmond, Deepu Sebastian. "Jhakhand's Digital Leap." Indian Express, September 15, 2013. 			http://www.jhpolice.gov.in/news/jhakhands-digital-leap-indian-express-15092013-18219-1379316969.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Jharkhand Police. "Jharkhand Police IT Vision 2020 - Effective Shared Open E-Governance." 2012. http://jhpolice.gov.in/vision2020. See slide 2&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Edmond, supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Edmond, supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; Kumar, Raj. "Enter, the Future of Policing - Cops to Team up with IIM Analysts to Predict &amp;amp; Prevent Incidents." The Telegraph. August 28, 2012. 			http://www.telegraphindia.com/1120828/jsp/jharkhand/story_15905662.jsp#.VkXwxvnhDWK.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; See supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; See &lt;a href="http://dashboard.jhpolice.gov.in/"&gt;here&lt;/a&gt; for Jharkhand Police crime dashboard.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Lavanya Gupta, and Selva Priya. "Predicting Crime Rates for Predictive Policing." Gandhian Young Technological Innovation Award, December 29, 2014. 			http://gyti.techpedia.in/project-detail/predicting-crime-rates-for-predictive-policing/3545.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Gupta, Lavanya. "Minority Report: Minority Report." Accessed November 13, 2015. http://cmuws2014.blogspot.in/2015/01/minority-report.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; See supra note 59.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; See &lt;a href="http://bprd.nic.in/showfile.asp?lid=1224"&gt;here&lt;/a&gt; for details about 44th All India Police Science Congress.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; India, Press Trust of. "Police Science Congress in Gujarat to Have DRDO Exhibition." Business Standard India, March 10, 2015. 			http://www.business-standard.com/article/pti-stories/police-science-congress-in-gujarat-to-have-drdo-exhibition-115031001310_1.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; National Crime Records Bureau. "About Crime and Criminal Tracking Network &amp;amp; Systems - CCTNS." Accessed November 13, 2015. 			http://ncrb.gov.in/cctns.htm.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; Ibid. (See index page)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; U.S. Const. amend. IV, available &lt;a href="https://www.law.cornell.edu/constitution/fourth_amendment"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; United States v Katz, 389 U.S. 347 (1967) , see &lt;a href="https://supreme.justia.com/cases/federal/us/389/347/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; See supra note 1, at pg 60.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; See supra note 1, at pg 60.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Villasenor, John. "What You Need to Know about the Third-Party Doctrine." The Atlantic, December 30, 2013. 			http://www.theatlantic.com/technology/archive/2013/12/what-you-need-to-know-about-the-third-party-doctrine/282721/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Smith v Maryland, 442 U.S. 735 (1979), see &lt;a href="https://supreme.justia.com/cases/federal/us/442/735/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; United States v Jones, 565 U.S. ___ (2012), see &lt;a href="https://supreme.justia.com/cases/federal/us/565/10-1259/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Newell, Bryce Clayton. "Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, 			and Access to Government Information." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, October 16, 2013. 			http://papers.ssrn.com/abstract=2341182, at pg 24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; See supra note 72.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; Dahyabhai Chhaganbhai Thakker vs State Of Gujarat, 1964 AIR 1563&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; See supra note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; See supra note 66.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Brinegar v. United States, 338 U.S. 160 (1949), see &lt;a href="https://supreme.justia.com/cases/federal/us/338/160/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; Terry v. Ohio, 392 U.S. 1 (1968), see &lt;a href="https://supreme.justia.com/cases/federal/us/392/1/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Ferguson, Andrew Guthrie. "Big Data and Predictive Reasonable Suspicion." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, 			April 4, 2014. http://papers.ssrn.com/abstract=2394683, at pg 287. See also supra note 79.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; See supra note 80, at pg 289.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; Illinois v. Gates, 462 U.S. 213 (1983). See &lt;a href="https://supreme.justia.com/cases/federal/us/462/213/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; See Alabama v. White, 496 U.S. 325 (1990). See &lt;a href="https://supreme.justia.com/cases/federal/us/496/325/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; See supra note 80, at pg 291.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; See supra note 80, at pg 293.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; See supra note 80, at pg 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Larissa Cespedes-Yaffar, Shayona Dhanak, and Amy Stephenson. "U.S. v. Mendenhall, U.S. v. Sokolow, and the Drug Courier Profile Evidence 			Controversy." Accessed July 6, 2015. http://courses2.cit.cornell.edu/sociallaw/student_projects/drugcourier.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; United States v. Sokolow, 490 U.S. 1 (1989), see &lt;a href="https://supreme.justia.com/cases/federal/us/490/1/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; See supra note 80, at pg 295.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; See supra note 80, at pg 297.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; See supra note 80, at pg 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; See supra note 80, at pg 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;&lt;sup&gt;&lt;sup&gt;[101]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; See supra note 80, at pg 300.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; Illinois v. Wardlow, 528 U.S. 119 (2000), see &lt;a href="https://supreme.justia.com/cases/federal/us/528/119/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; See supra note 80, at pg 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn107"&gt;
&lt;p&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; See supra note 1, at pg 42.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn108"&gt;
&lt;p&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn109"&gt;
&lt;p&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn110"&gt;
&lt;p&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn111"&gt;
&lt;p&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn112"&gt;
&lt;p&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn113"&gt;
&lt;p&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; See supra note 80, at pg 312.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn114"&gt;
&lt;p&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; See supra note 80, at pg 317.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn115"&gt;
&lt;p&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; See supra note 80, at pg 319.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn116"&gt;
&lt;p&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; See supra note 80, at pg 321.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn117"&gt;
&lt;p&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; Section 165 Indian Criminal Procedure Code, see &lt;a href="http://indiankanoon.org/doc/996365/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn118"&gt;
&lt;p&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; Gulab Chand Upadhyaya vs State Of U.P, 2002 CriLJ 2907&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn119"&gt;
&lt;p&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; Section 41 Indian Criminal Procedure Code&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn120"&gt;
&lt;p&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt; See supra note 79&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn121"&gt;
&lt;p&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; State of Punjab v. Balbir Singh. (1994) 3 SCC 299&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn122"&gt;
&lt;p&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn123"&gt;
&lt;p&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; Section 41 and 42 in The Narcotic Drugs and Psychotropic Substances Act 1985, see &lt;a href="http://indiankanoon.org/doc/1727139/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn124"&gt;
&lt;p&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; &lt;i&gt;Partap Singh (Dr)&lt;/i&gt; v. &lt;i&gt;Director of Enforcement, Foreign Exchange Regulation Act. &lt;/i&gt;(1985) 3 SCC 72 : 1985 SCC (Cri) 312 : 1985 SCC (Tax) 352 : AIR 1985 SC 989&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn125"&gt;
&lt;p&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; Ibid, at SCC pg 77-78.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn126"&gt;
&lt;p&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; See supra note 121, at pg 313.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn127"&gt;
&lt;p&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; Carlson, Mr David. "Exclusionary Rule." LII / Legal Information Institute, June 10, 2009. https://www.law.cornell.edu/wex/exclusionary_rule.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn128"&gt;
&lt;p&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn129"&gt;
&lt;p&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; Mapp v Ohio, 367 U.S. 643 (1961), see &lt;a href="https://supreme.justia.com/cases/federal/us/367/643/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn130"&gt;
&lt;p&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn131"&gt;
&lt;p&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; Busby, John C. "Fruit of the Poisonous Tree." LII / Legal Information Institute, September 21, 2009. 			https://www.law.cornell.edu/wex/fruit_of_the_poisonous_tree.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn132"&gt;
&lt;p&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; Silverthorne Lumber Co., Inc. v. United States, 251 U.S. 385 (1920), see			&lt;a href="https://supreme.justia.com/cases/federal/us/251/385/case.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn133"&gt;
&lt;p&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; Beck v. Ohio, 379 U.S. 89 (1964), see &lt;a href="https://supreme.justia.com/cases/federal/us/379/89/case.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn134"&gt;
&lt;p&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; State of Maharashtra v. Natwarlal Damodardas Soni, (1980) 4 SCC 669, at 673.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn135"&gt;
&lt;p&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn136"&gt;
&lt;p&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; Radhakishan v. State of U.P. [AIR 1963 SC 822 : 1963 Supp 1 SCR 408, 411, 412 : (1963) 1 Cri LJ 809]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn137"&gt;
&lt;p&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; Ibid, at SCR pg 411-12.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn138"&gt;
&lt;p&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; &lt;i&gt;Shyam Lal Sharma&lt;/i&gt; v. &lt;i&gt;State of M.P&lt;/i&gt;. (1972) 1 SCC 764 : 1974 SCC (Cri) 470 : AIR 1972 SC 886&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn139"&gt;
&lt;p&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; See supra note 135, at page 674.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn140"&gt;
&lt;p&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; See supra note 119, at para. 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn141"&gt;
&lt;p&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn142"&gt;
&lt;p&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; State of Punjab v. Wassan Singh, (1981) 2 SCC 1 : 1981 SCC (Cri) 292&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn143"&gt;
&lt;p&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn144"&gt;
&lt;p&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; Sunder Singh v. State of U.P, AIR 1956 SC 411 : 1956 Cri LJ 801&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn145"&gt;
&lt;p&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn146"&gt;
&lt;p&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; Matajog Dobey v.H.C. Bhari, AIR 1956 SC 44 : (1955) 2 SCR 925 : 1956 Cri LJ 140&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn147"&gt;
&lt;p&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn148"&gt;
&lt;p&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; R v. Sang, (1979) 2 All ER 1222, 1230-31&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn149"&gt;
&lt;p&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn150"&gt;
&lt;p&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn151"&gt;
&lt;p&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn152"&gt;
&lt;p&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; Harlow, Carol, and Richard Rawlings. &lt;i&gt;Law and Administration&lt;/i&gt;. 3rd ed. Law in Context. Cambridge University Press, 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn153"&gt;
&lt;p&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; &lt;i&gt;R.M. Malkani v. State of Maharashtra,&lt;/i&gt; (1973) 1 SCC 471&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn154"&gt;
&lt;p&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; Kuruma, Son of Kanju v. R., (1955) AC 197&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn155"&gt;
&lt;p&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; See supra note 154, at 477.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn156"&gt;
&lt;p&gt;&lt;a href="#_ftnref156" name="_ftn156"&gt;[156]&lt;/a&gt; Indian Const. Art 15, see &lt;a href="http://indiankanoon.org/doc/609295/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn157"&gt;
&lt;p&gt;&lt;a href="#_ftnref157" name="_ftn157"&gt;[157]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn158"&gt;
&lt;p&gt;&lt;a href="#_ftnref158" name="_ftn158"&gt;[158]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications'&gt;https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rohan George</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-11-24T16:31:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance">
    <title>Policy Brief: Oversight Mechanisms for Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/oversight-mechanisms-for-surveillance" class="internal-link"&gt;&lt;b&gt;Download the PDF &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Across jurisdictions, the need for effective and relevant oversight mechanisms (coupled with legislative safeguards) for state surveillance has been highlighted by civil society, academia, citizens and other key stakeholders.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;A key part of oversight of state surveillance is accountability of intelligence agencies. This has been recognized at the international level. Indeed, the Organization for Economic Co-operation and Development, The United Nations, the Organization for Security and Cooperation in Europe, the Parliamentary Assembly of the Council of Europe, and the Inter-Parliamentary Union have all recognized that intelligence agencies need to be subject to democratic accountability.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Since 2013, the need for oversight has received particular attention in light of the information disclosed through the 'Snowden Revelations'. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Some countries such as the US, Canada, and the UK have regulatory  mechanisms for the oversight of state surveillance and the intelligence  community, while many other countries – India included - have piecemeal  oversight mechanisms in place. The existence of regulatory mechanisms  for state surveillance does not necessarily equate to effective  oversight – and piecemeal mechanisms – depending on how they are  implemented, could be more effective than comprehensive mechanisms. This  policy brief seeks to explore the purpose of oversight mechanisms for  state surveillance, different forms of mechanisms, and what makes a  mechanism effective and comprehensive. The brief also reviews different  oversight mechanisms from the US, UK, and Canada and provides  recommendations for ways in which India can strengthen its present  oversight mechanisms for state surveillance and the intelligence  community.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is the purpose and what are the different components of an oversight mechanism for State Surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance, developed through a global consultation with civil society groups, industry, and international experts recommends that public oversight mechanisms for state surveillance should be established to ensure transparency and accountability of Communications Surveillance. To achieve this, mechanisms should have the authority to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Access all potentially relevant information about State actions, including, where appropriate, access to secret or classified information;&lt;/li&gt;
&lt;li&gt;Assess whether the State is making legitimate use of its lawful capabilities;&lt;/li&gt;
&lt;li&gt;Evaluate whether the State has been comprehensively and accurately publishing information about the use and scope of Communications Surveillance techniques and powers in accordance with its Transparency obligations publish periodic reports and other information relevant to Communications Surveillance;&lt;/li&gt;
&lt;li&gt;Make public determinations as to the lawfulness of those actions, including the extent to which they comply with these Principles&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What can inform oversight mechanisms for state surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The development of effective oversight mechanisms for state surveillance can be informed by a number of factors including:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Rapidly changing technology – how can mechanisms adapt, account for, and evaluate perpetually changing intelligence capabilities?&lt;/li&gt;
&lt;li&gt;Expanding surveillance powers – how can mechanisms evaluate and rationalize the use of expanding agency powers?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tensions around secrecy, national interest, and individual rights – how can mechanisms respect, recognize, and uphold multiple competing interests and needs including an agency's need for secrecy, the government's need to protect national security, and the citizens need to have their constitutional and fundamental rights upheld?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The structure, purpose, and goals of specific intelligence agencies and circumstances– how can mechanisms be sensitive and attuned to the structure, purpose, and functions of differing intelligence agencies and circumstances? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These factors lead to further questions around:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;The purpose of an oversight mechanism: Is an oversight mechanism meant to ensure effectiveness of an agency? Perform general reviews of agency performance? Supervise the actions of an agency? Hold an agency accountable for misconduct?&lt;/li&gt;
&lt;li&gt;The structure of an oversight mechanism: Is it internal? External? A combination of both? How many oversight mechanisms that agencies should be held accountable to?&lt;/li&gt;
&lt;li&gt;The functions of an oversight mechanism: Is an oversight mechanism meant to inspect? Evaluate? Investigate? Report?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The powers of an oversight mechanism: The extent of access that an oversight mechanism needs and should have to the internal workings of security agencies and law enforcement to carry out due diligence? The extent of legal backing that an oversight mechanism should have to hold agencies legally accountable.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What oversight mechanisms for State Surveillance exist in India?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India the oversight 'ecosystem' for state surveillance is comprised of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Review committee&lt;/b&gt;: Under the Indian Telegraph Act 1885 and the Rules issued thereunder (Rule 419A), a Central Review Committee that consists of the Cabinet Secretary, Secretary of Legal Affairs to the Government of India, Secretary of Department of Telecommunications to the Government of India is responsible for meeting on a bi-monthly basis and reviewing the legality of interception directions. The review committee has the power to revoke the directions and order the destruction of intercepted material.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; This review committee is also responsible for evaluating interception, monitoring, and decryption orders issued under section 69 of the Information Technology Act 2000.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; and orders for the monitoring and collection of traffic data under section 69B of the Information Technology Act 2000.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Authorizing Authorities&lt;/b&gt;: The Secretary in the Ministry of Home Affairs of the Central Government is responsible for authorizing requests for the interception, monitoring, and decryption of communications issued by central agencies.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; The Secretary in charge of the Home Department is responsible for authorizing requests for the interception, monitoring, and decryption of communications from state level agencies and law enforcement.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; The Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology is responsible for authorizing requests for the monitoring and collection of traffic data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; Any officer not below the rank of Joint Secretary to the Government of India, who has been authorised by the Union Home Secretary or the State Home Secretary in this behalf, may authorize the interception of communications in case of an emergency.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; A Commissioner of Police, District Superintendent of Police or Magistrate may issue requests for stored data to any postal or telegraph authority.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Administrative authorities&lt;/b&gt;: India does not have an oversight mechanism for intelligence agencies, but agencies do report to different authorities. For example: The Intelligence Bureau reports to the Home Minister, the Research and Anaylsis Wing is under the Cabinet Secretariat and reports to the Prime Minister, the Joint Intelligence Committee (JIC), National Technical Research Organisation (NTRO) and Aviation Research Centre (ARC) report to the National Security Adviser; and the National Security Council Secretariat under the NSA which serves the National Security Council.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that though India has a Right to Information Act, but most of the security agencies are exempt from the purview of the Act&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; as is disclosure of any information that falls under the purview of the Official Secrets Act 1923.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; [Note: There is no point in listing out all the exceptions given in section 8 and other sections as well. I think the point is sufficiently made when we say that security agencies are exempt from the purview of the Act.] The Official Secrets Act does not provide a definition of an 'official secret' and instead protects information: pertaining to national Security, defence of the country, affecting friendly relations with foreign states, etc.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;Information in India is designated as classified in accordance to the Manual of Departmental Security Instruction which is circulated by the Ministry of Home Affairs. According to the Public Records Rules 1997, “classified records" means the files relating to the public records classified as top-secret, confidential and restricted in accordance with the procedure laid down in the Manual of Departmental Security Instruction circulated by the Ministry of Home affairs from time to time;”&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Bi-annually officers evaluate and de-classify classified information and share the same with the national archives.&lt;a href="#fn18" name="fr18"&gt;[18] &lt;/a&gt;In response to questions raised in the Lok Sabha on the 5th of May 2015 regarding if the Official Secrets Act, 1923 will be reviewed, the number of classified files stored with the Government under the Act, and if the Government has any plans to declassify some of the files – the Ministry of Home Affairs clarified that a committee consisting of Secretaries of the Ministry of Home Affairs, the Department of Personnel and Training, and the Department of Legal Affairs has been established to examine the provisions of the Official Secrets Act, 1923 particularly in light of the Right to Information Act, 2005. The Ministry of Home Affairs also clarified that the classification and declassification of files is done by each Government Department as per the Manual of Departmental Security Instructions, 1994 and thus there is no 'central database of the total number of classified files'.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How can India's oversight mechanism for state surveillance be clarified?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though these mechanisms establish a basic framework for an oversight mechanism for state surveillance in India, there are aspects of this framework that could be clarified and there are ways in which the framework could be strengthened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aspects of the present review committee that could be clarified:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Powers of the review committee: Beyond having the authority to declare that orders for interception, monitoring, decryption, and collection of traffic data are not within the scope of the law and order for destruction of any collected information – what powers does the review committee have? Does the committee have the power to compel agencies to produce additional or supporting evidence? Does the committee have the power to compel information from the authorizing authority?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obligations of the review committee: The review committee is required to 'record its findings' as to whether the interception orders issued are in accordance with the law. Is there a standard set of questions/information that must be addressed by the committee when reviewing an order? Does the committee only review the content of the order or do they also review the implementation of the order? Beyond recording its findings, are there any additional reporting obligations that the review committee must fulfill?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accountability of the review committee: Does the review committee answer to a higher authority? Do they have to submit their findings to other branches of the government – such as Parliament? Is there a mechanism to ensure that the review committee does indeed meet every two months and review all orders issued under the relevant sections of the Indian Telegraph Act 1885 and the Information Technology Act 2008?&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Proposed oversight mechanisms in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Oversight mechanisms can help with avoiding breaches of national security by ensuring efficiency and effectiveness in the functioning of security agencies. The need for the oversight of state surveillance is not new in India. In 1999 the Union Government constituted a Committee with the mandate of reviewing the events leading up to Pakistani aggression in Kargil and to recommend measures towards ensuring national security. Though the Kargil Committee was addressing surveillance from the perspective of  gathering information on external forces, there are parellels in the lessons learned for state surveillance. Among other findings, in their Report the Committee found a number of limitations in the system for collection, reporting, collation, and assessment of intelligence. The Committee also found that there was a lack of oversight for the intelligence community in India – resulting in no mechanisms for tasking the agencies, monitoring their performance and overall functioning, and evaluating the quality of the work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Committee also noted that such a mechanism is a standard feature in jurisdictions across the world. The Committee emphasized this need from an economic perspective – that without oversight – the Government and the nation has no way of evaluating whether or not they are receiving value for their money. The Committee recommended a review of the intelligence system with the objective of solving such deficiencies.&lt;a href="#fn20" name="fr20"&gt;[20] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2000 a Group of Ministers was established to review the security and intelligence apparatus of the country. In their report issued to the Prime Minister, the Group of Ministers recommended the establishment of an Intelligence Coordination Group for the purpose of providing oversight of intelligence agencies at the Central level. Specifically the Intelligence Coordination Group would be responsible for:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Allocation of resources to the intelligence agencies&lt;/li&gt;
&lt;li&gt;Consideration of annual reviews on the quality of inputs&lt;/li&gt;
&lt;li&gt;Approve the annual tasking for intelligence collection&lt;/li&gt;
&lt;li&gt;Oversee the functions of intelligence agencies&lt;/li&gt;
&lt;li&gt;Examine national estimates and forecasts&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Past critiques of the Indian surveillance regime have included the fact that intelligence agencies do not come under the purview of any overseeing mechanism including Parliament, the Right to Information Act 2005, or the General Comptroller of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Manish Tewari, who at the time was a Member of Parliament from Ludhiana, introduced the Private Member's Bill - “The Intelligence Services (Powers and Regulation) Bill” proposed stand alone statutory regulation of intelligence agencies. In doing so it sought to establish an oversight mechanism for intelligence agencies within and outside of India. The Bill was never introduced into Parliament.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; Broadly, the Bill sought to establish: a National Intelligence and Security Oversight Committee which would oversee the functionings of intelligence agencies and would submit an annual report to the Prime Minister, a National Intelligence Tribunal for the purpose of investigating complaints against intelligence agencies, an Intelligence Ombudsman for overseeing and ensuring the efficient functioning of agencies, and a legislative framework regulating intelligence agencies.&lt;a href="#fn23" name="fr23"&gt;[23] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Proposed policy in India has also explored the possibility of coupling surveillance regulation and oversight with private regulation and oversight. In 2011 the Right to Privacy Bill was drafted by the Department of Personnel and Training. The Bill proposed to establish a “Central Communication Interception Review Committee” for the purposes of reviewing orders for interception issued under the Telegraph Act. The Bill also sought to establish an authorization process for surveillance undertaken by following a person, through CCTV's, or other electronic means.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;In contrast, the 2012 Report of the Group of Experts on Privacy, which provided recommendations for a privacy framework for India, recommended that the Privacy Commissioner should exercise broad oversight functions with respect to interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2012 report by the Institute for Defence Studies and Analyses titled “A Case for Intelligence Reforms in India” highlights at least four 'gaps' in intelligence that have resulted in breaches of national security including: zero intelligence, inadequate intelligence, inaccurate intelligence, and excessive intelligence – particularly in light of additional technical inputs and open source inputs.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; In some cases, an oversight mechanism could help in remediating some of these gaps. Returning to the 2012 IDSA Report, the Report recommends the following steps towards an oversight mechanism for Indian intelligence:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Establishing an Intelligence Coordination Group (ICG) that will exercise oversight functions for the intelligence community at the Central level. This could include overseeing functions of the agencies, quality of work, and finances. &lt;/li&gt;
&lt;li&gt;Enacting legislation defining the mandates, functions, and duties of intelligence agencies.&lt;/li&gt;
&lt;li&gt;Holding intelligence agencies accountable to the Comptroller &amp;amp; Auditor General to ensure financial accountability. &lt;/li&gt;
&lt;li&gt;Establishing a Minister for National Security &amp;amp; Intelligence for exercising administrative authority over intelligence agencies. &lt;/li&gt;
&lt;li&gt;Establishing a Parliamentary Accountability Committee for oversight of intelligence agencies through parliament. &lt;/li&gt;
&lt;li&gt;Defining the extent to which intelligence agencies can be held accountable to reply to requests pertaining to violations of privacy and other human rights issued under the Right to Information Act.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Highlighting the importance of accountable surveillance frameworks, in 2015 the external affairs ministry director general of India Santosh Jha stated at the UN General Assembly that the global community needs to "to create frameworks so that Internet surveillance practices motivated by security concerns are conducted within a truly transparent and accountable framework.”&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In what ways can India's mechanisms for state surveillance be strengthened?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Building upon the recommendations from the Kargil Committee, the Report from the Group of Ministers, the Report of the Group of Experts on Privacy, the Draft Privacy Bill 2011, and the IDSA report, ways in which the framework for oversight of state surveillance in India could be strengthened include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Oversight to enhance public understanding, debate, accountability, and democratic governance: State surveillance is unique in that it is enabled with the objective of protecting a nations security. Yet, to do so it requires citizens of a nation to trust the actions taken by intelligence agencies and to allow for possible access into their personal lives and possible activities that might infringe on their constitutional rights (such as freedom of expression) for a larger outcome of security. Because of this, oversight mechanisms for state surveillance must balance securing national security while submitting itself to some form of accountability to the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Independence of oversight mechanisms: Given the Indian context, it is particularly important that an oversight mechanism for surveillance powers and the intelligence community is capable of addressing and being independent from political interference. Indeed, the majority of cases regarding illegal interceptions that have reached the public sphere pertain to the surveillance of political figures and political turf wars.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;Furthermore, though the current Review Committee established in the Indian Telegraph Act does not have a member from the Ministry of Home Affairs (the Ministry responsible for authorizing interception requests), it is unclear how independent this committee is from the authorizing Ministry. To ensure non-biased oversight, it is important that oversight mechanisms are independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legislative regulation of intelligence agencies: Currently, intelligence agencies are provided surveillance powers through the Information Technology Act and the Telegraph Act, but beyond the National Intelligence Agency Act which establishes the National Intelligence Agency, there is no legal mechanism creating, regulating and overseeing intelligence agencies using these powers. In the 'surveillance ecosystem' this creates a policy vacuum, where an agency is enabled through law with a surveillance power and provided a procedure to follow, but is not held legally accountable for the effective, ethical, and legal use of the power. To ensure legal accountability of the use of surveillance techniques, it is important that intelligence are created through legislation that includes oversight provisions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Comprehensive oversight of all intrusive measures: Currently the Review Committee established under the Telegraph Act is responsible for the evaluation of orders for the interception, monitoring, decryption, and collection of traffic data. The Review Committee is not responsible for reviewing the implementation or effectiveness of such orders and is not responsible for reviewing orders for access to stored information or other forms of electronic surveillance. This situation is a result of 1. Present oversight mechanisms not having comprehensive mandates 2. Different laws in India enabling different levels of access and not providing a harmonized oversight mechanism and 3.Indian law not formally addressing and regulating emerging surveillance technologies and techniques. To ensure effectiveness, it is important for oversight mechanisms to be comprehensive in mandate and scope.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establishment of a tribunal or redress mechanism: India currently does not have a specified means for individuals to seek redress for unlawful surveillance or surveillance that they feel has violated their rights. Thus, individuals must take any complaint to the courts. The downsides of such a system include the fact that the judiciary might not be able to make determinations regarding the violation, the court system in India is overwhelmed and thus due process is slow, and given the sensitive nature of the topic – courts might not have the ability to immediately access relevant documentation. To ensure redress, it is important that a tribunal or a redress mechanism with appropriate powers is established to address complaints or violations pertaining to surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Annual reporting by security agencies, law enforcement, and service providers: Information regarding orders for surveillance and the implementation of the same is not disclosed by the government or by service providers in India.&lt;a href="#fn29" name="fr29"&gt;[29] &lt;/a&gt; Indeed, service providers by law are required to maintain the confidentiality of orders for the interception, monitoring, or decryption of communications and monitoring or collection of traffic data. At the minimum, an oversight mechanism should receive annual reports from security agencies, law enforcement, and service providers with respect to the surveillance undertaken. Edited versions of these Reports could be shared with Parliament and the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Consistent and mandatory reviews of relevant legislation: Though committees have been established to review various legislation and policy pertaining to state surveillance, the time frame for these reviews is not clearly defined by law. These reviews should take place on a consistent and publicly stated time frame. Furthermore, legislation enabling surveillance in India do not require review and assessment for relevance, adequacy, necessity, and proportionality after a certain period of time. Mandating that legislation regulating surveillance is subject to review on a consistent is important in ensuring that the provisions are relevant, proportionate, adequate, and necessary. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency of classification and declassification process and centralization of de-classified records: Currently, the Ministry of Home Affairs establishes the process that government departments must follow for classifying and de-classifying information. This process is not publicly available and de-classified information is stored only with the respective department. For transparency purposes, it is important that the process for classification of records be made public and the practice of classification of information  take place in exceptional cases. Furthermore, de-classified records should be stored centrally and made easily accessible to the public. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Executive and administrative orders regarding establishing of agencies and surveillance projects should be in the public domain: Intelligence agencies and surveillance projects in India are typically enabled through executive orders. For example, NATGRID was established via an executive order, but this order is not publicly available. As a form of transparency and accountability to the public, it is important that if executive orders establish an agency or  a surveillance project, these are made available to the public to the extent possible.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight of surveillance should incorporate privacy and cyber/national security: Increasingly issues of surveillance, privacy, and cyber security are interlinked. Any move to establish an oversight mechanism for surveillance and the intelligence committee must incorporate and take into consideration privacy and cyber security. This could mean that an oversight mechanism for surveillance in India works closely with CERT-IN and a potential privacy commissioner or that the oversight mechanism contains internal expertise in these areas to ensure that they are adequately considered. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight by design: Just like the concept of privacy by design promotes the ideal that principles of privacy are built into devices, processes, services, organizations, and regulation from the outset – oversight mechanisms for state surveillance should also be built in from the outset of surveillance projects and enabling legislation. In the past, this has not been the practice in India– the National Intelligence Grid was an intelligence system that sought to link twenty one databases together – making such information easily and readily accessible to security agencies – but the oversight of such a system was never defined.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; Similarly, the Centralized Monitoring System was conceptualized to automate and internalize the process of intercepting communications by allowing security agencies to intercept communications directly and bypass the service provider.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; Despite amending the Telecom Licenses to provide for the technical components of this project, oversight of the project or of security agencies directly accessing information has yet to be defined.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Examples of oversight mechanisms for State Surveillance: US, UK, Canada and United States&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;United States&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the United States the oversight 'ecosystem' for state surveillance is made up of:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Foreign Intelligence Surveillance Court&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Foreign Intelligence Surveillance Court (FISA) is the predominant oversight mechanism for state surveillance and oversees and authorizes the actions of the Federal Bureau of Investigation and the National Security Agency.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; The court was established by the enactment of the Foreign Intelligence Surveillance Act 1978 and is governed by Rules of Procedure, the current Rules being formulated in 2010.&lt;a href="#fn34" name="fr34"&gt;[34] &lt;/a&gt;The Court is empowered to ensure compliance with the orders that it issues and the government is obligated to inform the Court if orders are breached.&lt;a href="#fn35" name="fr35"&gt;[35] &lt;/a&gt;FISA allows for individuals who receive an order from the Court to challenge the same,&lt;a href="#fn36" name="fr36"&gt;[36] &lt;/a&gt;and public filings are available on the Court's website.&lt;a href="#fn37" name="fr37"&gt;[37] &lt;/a&gt;Additionally, organizations, including the American Civil Liberties Union&lt;a href="#fn38" name="fr38"&gt;[38] &lt;/a&gt;and the Electronic Frontier Foundation, have filed motions with the Court for release of records. &lt;a href="#fn39" name="fr39"&gt;[39] &lt;/a&gt;Similarly, Google has approached the Court for the ability to publish aggregate information regarding FISA orders that the company recieves.&lt;a href="#fn40" name="fr40"&gt;[40] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government Accountability Office &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Government Accountability Office (GAO) is an independent office that works for Congress and conducts audits, investigates, provides recommendations, and issues legal decisions and opinions with regard to federal government spending of taxpayer's money by the government and associated agencies including the Defence Department, the FBI, and Homeland Security.&lt;a href="#fn41" name="fr41"&gt;[41] &lt;/a&gt;The head of the GAO is the Comptroller General of the United States and is appointed by the President. The GAO will initiate an investigation if requested by congressional committees or subcommittees or if required under public law or committee reports. The GOA has reviewed topics relating to Homeland Security, Information Security, Justice and Law Enforcement, National Defense, and Telecommunications.&lt;a href="#fn42" name="fr42"&gt;[42] &lt;/a&gt;For example, in June 2015 the GOA completed an investigation and report on 'Foreign Terrorist Organization Process and U.S Agency Enforcement Actions” &lt;a href="#fn43" name="fr43"&gt;[43] &lt;/a&gt;and an investigation on “Cyber Security: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies”.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S. Senate Select Committee on Intelligence is a standing committee of the U.S Senate with the mandate to review intelligence activities and programs and ensure that these are inline with the Constitution and other relevant laws. The Committee is also responsible for submitting to Senate appropriate proposals for legislation, and for reporting to Senate on intelligence activities and programs.&lt;a href="#fn45" name="fr45"&gt;[45] &lt;/a&gt;The House Permanent Select Committee holds similar jurisdiction. The House Permanent Select Committee is committed to secrecy and cannot disclose classified information excepted authorized to do so. Such an obligation does not exist for the Senate Select Committee on Intelligence and the committee can disclose classified information publicly on its own.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and Civil Liberties Oversight Board&lt;/b&gt; (PCLOB)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Civil Liberties Oversight Board was established by the Implementing Recommendations of the 9/11 Commission Act of 2007 and is located within the executive branch.&lt;a href="#fn47" name="fr47"&gt;[47] &lt;/a&gt;The objective of the PCLOB is to ensure that the Federal Government's actions to combat terrorism are balanced against privacy and civil liberties. Towards this, the Board has the mandate to review and analyse ant-terrorism measures the executive takes and ensure that such actions are balanced with privacy and civil liberties, and to ensure that privacy and civil liberties are liberties are adequately considered in the development and implementation of anti-terrorism laws, regulations and policies.&lt;a href="#fn48" name="fr48"&gt;[48] &lt;/a&gt;The Board is responsible for developing principles to guide why, whether, when, and how the United States conducts surveillance for authorized purposes. Additionally, officers of eight federal agencies must submit reports to the PCLOB regarding the reviews that they have undertaken, the number and content of the complaints, and a summary of how each complaint was handled. In order to fulfill its mandate, the Board is authorized to access all relevant records, reports, audits, reviews, documents, papers, recommendations, and classified information. The Board may also interview and take statements from necessary personnel. The Board may request the Attorney General to subpoena on the Board's behalf individuals outside of the executive branch.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the extent possible, the Reports of the Board are made public. Examples of recommendations that the Board has made in the 2015 Report include: End the NSA”s bulk telephone records program, add additional privacy safeguards to the bulk telephone records program, enable the FISC to hear independent views on novel and significant matters, expand opportunities for appellate review of FISC decisions, take advantage of existing opportunities for outside legal and technical input in FISC matters, publicly release new and past FISC and DISCR decisions that involve novel legal, technical, or compliance questions, publicly report on the operation of the FISC Special Advocate Program, Permit Companies to Disclose Information about their receipt of FISA production orders and disclose more detailed statistics on surveillance, inform the PCLOB of FISA activities and provide relevant congressional reports and FISC decisions, begin to develop principles for transparency, disclose the scope of surveillance authorities affecting US Citizens.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Wiretap Report &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Wiretap Report is an annual compilation of information provided by federal and state officials regarding applications for interception orders of wire, oral, or electronic communications, data address offenses under investigation, types and locations of interception devices, and costs and duration of authorized intercepts.&lt;a href="#fn51" name="fr51"&gt;[51] &lt;/a&gt;When submitting information for the report a judge will include the name and jurisdiction of the prosecuting official who applied for the order, the criminal offense under investigation, the type of intercept device used, the physical location of the device, and the duration of the intercept. Prosecutors provide information related to the cost of the intercept, the number of days the intercept device was in operation, the number of persons whose communications were intercepted, the number of intercepts, and the number of incriminating intercepts recorded. Results of the interception orders such as arrest, trials, convictions, and the number of motions to suppress evidence are also noted in the prosecutor reports. The Report is submitted to Congress and is legally required under Title III of the Omnibus Crime Control and Safe Streets Act of 1968. The report is issued by the Administrative Office of the United States Courts.&lt;a href="#fn52" name="fr52"&gt;[52] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence and Security Committee (ISC) of Parliament &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Security Committee was established by the Intelligence Services Act 1994. Members are appointed by the Prime Minster and the Committee reports directly to the same. Additionally, the Committee submits annual reports to Parliament. Towards this, the Committee can take evidence from cabinet ministers, senior officials, and from the public.&lt;a href="#fn53" name="fr53"&gt;[53] &lt;/a&gt;The most recent report of the Committee is the 2015 “Report on Privacy and Security”.&lt;a href="#fn54" name="fr54"&gt;[54] &lt;/a&gt;Members of the Committee are subject to the Official Secrets Act 1989 and have access to classified material when carrying out investigations.&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Joint Intelligence Committee (JIC)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This Joint Intelligence Committee is located in the Cabinet office and is broadly responsible for overseeing national intelligence organizations and providing advice to the Cabinet on issues related to security, defense, and foreign affairs. The JIC is overseen by the Intelligence and Security Committee.&lt;a href="#fn56" name="fr56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Interception of Communications Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Interception of Communications Commissioner is appointed by the Prime Minster under the Regulation of Investigatory Powers Act 2000 for the purpose of reviewing surveillance conducted by intelligence agencies, police forces, and other public authorities.  Specifically, the Commissioner inspects the interception of communications, the acquisition and disclosure of communications data, the interception of communications in prisons, and the unintentional electronic interception.&lt;a href="#fn57" name="fr57"&gt;[57] &lt;/a&gt;The Commissioner submits an annual report to the Prime Minister. The Reports of the Commissioner are publicly available.&lt;a href="#fn58" name="fr58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence Services Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Services Commissioner is an independent body appointed by the Prime Minister that is legally empowered through the Regulation of Investigatory Powers Act (RIPA) 2000. The Commissioner provides independent oversight on the use of surveillance by UK intelligence services.&lt;a href="#fn59" name="fr59"&gt;[59] &lt;/a&gt;Specifically, the Commissioner is responsible for reviewing authorized interception orders and the actions and performance of the intelligence services.&lt;a href="#fn60" name="fr60"&gt;[60]&lt;/a&gt; The Commissioner is also responsible for providing assistance to the Investigatory Powers Tribunal, submitting annual reports to the Prime Minister on the discharge of its functions, and advising the Home Office on the need of extending the Terrorism Prevention and Investigation Measures regime.&lt;a href="#fn61" name="fr61"&gt;[61] &lt;/a&gt;Towards these the Commissioner conducts in-depth audits on the orders for interception to ensure that the surveillance is within the scope of the law, that the surveillance was necessary for a legally established reason, that the surveillance was proportionate, that the information accessed was justified by the privacy invaded, and that the surveillance authorized by the appropriate official. The Commissioner also conducts 'site visits' to ensure that orders are being implemented as per the law.&lt;a href="#fn62" name="fr62"&gt;[62] &lt;/a&gt;As a note, the Intelligence Services Commissioner does not undertake any subject that is related to the Interception of Communications Commissioner. The Commissioner has access to any information that he feels is necessary to carry out his investigations. The Reports of the Intelligence Service Commissioner are publicly available.&lt;a href="#fn63" name="fr63"&gt;[63] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Investigatory Powers Tribunal &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Investigatory Powers Tribunal is a court which investigates complaints of unlawful surveillance by public authorities or intelligence/law enforcement agencies.&lt;a href="#fn64" name="fr64"&gt;[64]&lt;/a&gt; The Tribunal was established under the Regulation of Investigatory Powers Act 2000 and has a range of oversight functions to ensure that public authorities act and agencies are in compliance with the Human Rights Act 1998.&lt;a href="#fn65" name="fr65"&gt;[65]&lt;/a&gt; The Tribunal specifically is an avenue of redress for anyone who believes that they have been a victim of unlawful surveillance under RIPA or wider human rights infringements under the Human Rights Act 1998.  The Tribunal can provide seven possible outcomes for any application including 'found in favor of complainant, no determination in favour of complainant, frivolous or vexatious, out of time, out of jurisdiction, withdrawn, or no valid complaint.&lt;a href="#fn66" name="fr66"&gt;[66] &lt;/a&gt;The Tribunal has the authority to receive and consider evidence in any form, even if inadmissible in an ordinary court.&lt;a href="#fn67" name="fr67"&gt;[67]&lt;/a&gt; Where possible, cases are available on the Tribunal's website.  Decisions by the Tribunal cannot be appealed, but can be challenged in the European Court of Human Rights.&lt;a href="#fn68" name="fr68"&gt;[68] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canada&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In Canada the oversight 'ecosystem' for state surveillance includes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Intelligence Review Committee &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Security Intelligence Review Committee is an independent body that is accountable to the Parliament of Canada and reports on the Canadian Security Intelligence Service.&lt;a href="#fn69" name="fr69"&gt;[69]&lt;/a&gt; Members of the Security Intelligence Review Committee are appointed by the Prime Minister of Canada. The committee conducts reviews on a pro-active basis and investigates complaints. Committee members have access to classified information to conduct reviews. The Committee submits an annual report to Parliament and an edited version is publicly available. The 2014 Report was titled “Lifting the Shroud of Secrecy”&lt;a href="#fn70" name="fr70"&gt;[70] &lt;/a&gt;and includes reviews of the CSIS's activities, reports on complaints and subsequent investigations, and provides recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Communications Security Establishment Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Communications Security Commissioner conducts independent reviews of Communications Security Establishment (CSE) activities to evaluate if they are within the scope of Canadian law.&lt;a href="#fn71" name="fr71"&gt;[71] &lt;/a&gt;The Commissioner submits a report to Parliament on an annual basis and has a number of powers including the power to subpoena documents and personnel.&lt;a href="#fn72" name="fr72"&gt;[72]&lt;/a&gt; If the Commissioner believes that the CSE has not complied with the law – it must report this to the Attorney General of Canada and to the Minister of National Defence. The Commissioner may also receive information from persons bound to secrecy if they deem it to be in the public interest to disclose such information.&lt;a href="#fn73" name="fr73"&gt;[73] &lt;/a&gt;The Commissioner is also responsible for verifying that the CSE does not surveil Canadians and for promoting measures to protect the privacy of Canadians.&lt;a href="#fn74" name="fr74"&gt;[74] &lt;/a&gt;When conducting a review, the Commissioner has the ability to examine records, receive briefings, interview relevant personnel, assess the veracity of information, listen to intercepted voice recordings, observe CSE operators and analysts to verify their work, examine CSI electronic tools, systems and databases to ensure compliance with the law.&lt;a href="#fn75" name="fr75"&gt;[75] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Privacy Commissioner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Office of the Privacy Commissioner of Canada (OPC) oversees the implementation of and compliance with the Privacy Act and the Personal information and Electronic Documents Act.&lt;a href="#fn76" name="fr76"&gt;[76] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The OPC is an independent body that has the authority to investigate complaints regarding the handling of personal information by government and private companies, but can only comment on the activities of security and intelligence agencies. For example, in 2014 the OPC issued the report “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber Surveillance”&lt;a href="#fn77" name="fr77"&gt;[77]&lt;/a&gt; The OPC can also provide testimony to Parliament and other government bodies.&lt;a href="#fn78" name="fr78"&gt;[78] &lt;/a&gt;For example, the OPC has made appearances before the Senate Standing Committee of National Security and Defense on Bill C-51.&lt;a href="#fn79" name="fr79"&gt;[79]&lt;/a&gt; The OPC cannot conduct joint audits or investigations with other bodies.&lt;a href="#fn80" name="fr80"&gt;[80]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Interception Reports&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Criminal Code of Canada, regional governments must issue annual interception reports. The reports must include number of individuals affected by interceptions, average duration of the interception, type of crimes investigated, numbers of cases brought to court, and number of individuals notified that interception had taken place.&lt;a href="#fn81" name="fr81"&gt;[81] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The presence of multiple and robust oversight mechanisms for state surveillance does not necessarily correlate to effective oversight. The oversight mechanisms in the UK, Canada, and the U.S have been criticised. For example, Canada . For example, the Canadian regime has been characterized as becoming weaker it has removed one of its key over sight mechanisms – the Inspector General of the Canadian Security Intelligence Service which was responsible for certifying that the Service was in compliance with law.&lt;a href="#fn82" name="fr82"&gt;[82] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other weaknesses in the Canadian regime that have been highlighted include the fact that different oversight bodies do not have the authority to share information with each other, and transparency reports do not include many new forms of surveillance.&lt;a href="#fn83" name="fr83"&gt;[83]&lt;/a&gt; Oversight mechanisms in the U.S on the other hand have been criticized as being opaque&lt;a href="#fn84" name="fr84"&gt;[84] &lt;/a&gt;or as lacking the needed political support to be effective.&lt;a href="#fn85" name="fr85"&gt;[85]&lt;/a&gt; The UK oversight mechanism has been criticized for not having judicial authorization of surveillance requests, have opaque laws, and for not having a strong right of redress for affected individuals.&lt;a href="#fn86" name="fr86"&gt;[86] &lt;/a&gt;These critiques demonstrate that there are a number of factors that must come together for an oversight mechanism to be effective. Public transparency and accountability to decision making bodies such as Parliament or Congress can ensure effectiveness of oversight mechanisms, and are steps towards providing the public with means to debate in an informed manner issues related to state surveillance and allows different bodies within the government the ability to hold the state accountable for its actions.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;.[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. For example, “Public Oversight” is one of the thirteen Necessary and  Proportionate principles on state communications surveillance developed  by civil society and academia globally, that should be incorporated by  states into communication surveillance regimes. The principles can be  accessed here: https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Hans Born and Ian Leigh, “Making Intelligence Accountable. Legal Standards and Best Practice for Oversight of Intelligence Agencies.” Pg. 13. 2005. Available at: http://www.prsindia.org/theprsblog/wp-content/uploads/2010/07/making-intelligence.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. For example, this point was made in the context of the UK. For more  information see: Nick Clegg, 'Edward Snowden's revelations made it  clear: security oversight must be fit for the internet age,”. The  Guardian. March 3rd 2014. Available at: &lt;a href="http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age"&gt;http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age&lt;/a&gt;. Accessed: July 27, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. International Principles on the Application of Human Rights to  Communications Surveillance. Available at:  https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Sub Rules (16) and (17) of Rule 419A, Indian Telegraph Rules, 1951.  Available at:http://www.dot.gov.in/sites/default/files/march2007.pdf  Note: This review committee is responsible for overseeing interception  orders issued under the Indian Telegraph Act and the Information  Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Information Technology Procedure and Safeguards for Interception,  Monitoring, and Decryption of Information Rules 2009. Definition q.  Available at: &lt;a href="http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf"&gt;http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Information Technology (Procedure and safeguard for Monitoring and  Collecting Traffic Data or Information Rules, 2009). Definition (n).  Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].  Definition (d) and section 3 of the Information Technology (Procedure  and safeguard for Monitoring and Collecting Traffic Data or Information  Rules, 2009). Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Rule 1, of the 419A Rules, Indian Telegraph Act 1885. Available  at:http://www.dot.gov.in/sites/default/files/march2007.pdf This  authority is responsible for authorizing interception requests issued  under the Indian Telegraph Act and the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Section 92, CrPc. Available at: http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Press Information Bureau GOI. Reconstitution of Cabinet Committees. June 19th 2014. Available at: &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747"&gt;http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Press Information Bureau, Government of India. Home minister proposes  radical restructuring of security architecture. Available at: &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;http://www.pib.nic.in/newsite/erelease.aspx?relid=56395&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Section 24 read with Schedule II of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Section 8 of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Abhimanyu Ghosh. “Open Government and the Right to Information”. Legal Services India. Available at: &lt;a href="http://www.legalservicesindia.com/articles/og.htm"&gt;http://www.legalservicesindia.com/articles/og.htm&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Public Record Rules 1997. Section 2. Definition c. Available at: &lt;a href="http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html"&gt;http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Times of India. Classified information is reviewed after 25-30 years. April 13th 2015. Available at: &lt;a href="http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms"&gt;http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms&lt;/a&gt;. Accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Government of India. Ministry of Home Affairs. Lok Sabha Starred Question No 557. Available at: &lt;a href="http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf"&gt;http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. The Kargil Committee report Executive Summanry. Available at: http://fas.org/news/india/2000/25indi1.htm. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. PIB Releases. Group of Ministers Report on Reforming the National Security System”. Available at: &lt;a href="http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html"&gt;http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Observer Research Foundation. “Manish Tewari introduces Bill on  Intelligence Agencies Reform. August 5th 2011. Available at: &lt;a href="http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327"&gt;http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Intelligence Services (Powers and Regulation) Bill, 2011. Available at: &lt;a href="http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf"&gt;http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. The Privacy Bill 2011. Available at: https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].  The Report of Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Institute for Defence Studies and Analyses. “A Case for Intelligence Reforms in India”. Available at: &lt;a href="http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html"&gt;http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. India Calls for Transparency in internet Surveillance. NDTV. July 3rd 2015. Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945"&gt;http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945&lt;/a&gt;. Accessed: July 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Lovisha Aggarwal. “Analysis of News Items and Cases on Surveillance and  Digital Evidence in India”. Available at:  http://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Rule 25 (4) of the Information Technology (Procedures and Safeguards for  the Interception, Monitoring, and Decryption of Information Rules)  2011. Available at:  http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Ministry of Home Affairs, GOI. National Intelligence Grid. Available at: &lt;a href="http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf"&gt;http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. Press Information Bureau, Government of India. Centralised System to Monitor Communications Rajya Sabha. Available at: &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;http://pib.nic.in/newsite/erelease.aspx?relid=54679&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Department of Telecommunications. Amendemnt to the UAS License agreement  regarding Central Monitoring System. June 2013. Available at:  http://cis-india.org/internet-governance/blog/uas-license-agreement-amendment&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. Rules of Procedure 2010. Available at: http://www.fisc.uscourts.gov/sites/default/files/FISC%20Rules%20of%20Procedure.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. United States Foreign Intelligence Court. Honorable Patrick J. Leahy. 2013. Available at: http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Public Filings – U.S Foreign Intelligence Surveillance Court. Available at: http://www.fisc.uscourts.gov/public-filings&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. ACLU. FISC Public Access Motion – ACLU Motion for Release of Court Records Interpreting Section 215 of the Patriot Act. Available at: https://www.aclu.org/legal-document/fisc-public-access-motion-aclu-motion-release-court-records-interpreting-section-215&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court Washington DC. In Re motion for consent to disclosure of court records or, in the alternative a determination of the effect of the Court's rules on statutory access rights. Available at: https://www.eff.org/files/filenode/misc-13-01-opinion-order.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Google  Official Blog. Shedding some light on Foreign Intelligence Surveillance Act (FISA) requests. February 3rd 2014. Available at: http://googleblog.blogspot.in/2014/02/shedding-some-light-on-foreign.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. U.S Government Accountability Office. Available at: http://www.gao.gov/key_issues/overview#t=1. Last accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Report to Congressional Requesters. Combating Terrorism: Foreign Terrorist Organization Designation Proces and U.S Agency Enforcement Actions. Available at: http://www.gao.gov/assets/680/671028.pdf. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. United States Government Accountability Office. Cybersecurity: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies. Available: http://www.gao.gov/assets/680/670935.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Committee Legislation. Available at: http://ballotpedia.org/United_States_Senate_Committee_on_Intelligence_(Select)#Committee_legislation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn47"&gt;47&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statistics-reports/analysisreports/wiretap-reports&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statisticsreports/&lt;br /&gt;analysis-reports/wiretap-reports/faqs-wiretap-reports#faq-What-information-does-the-AO-receive-from-prosecutors?. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Transcripts and Public Evidence. Available at: http://isc.independent.gov.uk/public-evidence. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Special Reports. Available at http://isc.independent.gov.uk/committee-reports/special-reports. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;]. Hugh Segal. The U.K. has legislative oversight of surveillance. Why not Canada. The Globe and Mail. June 12th 2013. Available at: http://www.theglobeandmail.com/globe-debate/uk-haslegislative-oversight-of-surveillance-why-not-canada/article12489071/. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;]. The Joint Intelligence Committee home page. For more information see: https://www.gov.uk/government/organisations/national-security/groups/joint-intelligence-committee&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr56" name="fn56"&gt;56&lt;/a&gt;]. Interception of Communications Commissioner's Office. RIPA. Available at: http://www.iocco-uk.info/sections.asp?sectionID=2&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr57" name="fn57"&gt;57&lt;/a&gt;]. Interception of Communications Commissioner's Office. Reports. Available at: http://www.iocco-uk.info/sections.asp?sectionID=1&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr58" name="fn58"&gt;58&lt;/a&gt;]. The Intelligence Services Commissioner's Office Homepage. For more information see: http://intelligencecommissioner.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr59" name="fn59"&gt;59&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr60" name="fn60"&gt;60&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr61" name="fn61"&gt;61&lt;/a&gt;]. The Intelligence Services Commissioner's Office. What we do. Available at: http://intelligencecommissioner.com/content.asp?id=5. Last Accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr62" name="fn62"&gt;62&lt;/a&gt;]. The Intelligence Services Commissioner's Office. Intelligence Services Commissioner's Annual Reports. Available at: http://intelligencecommissioner.com/content.asp?id=19. Last&lt;br /&gt;accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr63" name="fn63"&gt;63&lt;/a&gt;]. The Investigatory Powers Tribunal Homepage. Available at: http://www.ipt-uk.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr64" name="fn64"&gt;64&lt;/a&gt;]. The Investigatory Powers Tribunal – Functions – Key role. Available at: http://www.ipt-uk.com/section.aspx?pageid=1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr65" name="fn65"&gt;65&lt;/a&gt;]. Investigatory Powers Tribunal. Functions – Decisions available to the Tribunal. Available at: http://www.ipt-uk.com/section.aspx?pageid=4. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr66" name="fn66"&gt;66&lt;/a&gt;]. Investigator Powers Tribunal. Operation - Available at: http://www.ipt-uk.com/section.aspx?pageid=7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr67" name="fn67"&gt;67&lt;/a&gt;]. Investigatory Powers Tribunal. Operation- Differences to the ordinary court system. Available at: http://www.ipt-uk.com/section.aspx?pageid=7. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr68" name="fn68"&gt;68&lt;/a&gt;]. Security Intelligence Review Committee – Homepage. Available at: http://www.sirc-csars.gc.ca/index-eng.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr69" name="fn69"&gt;69&lt;/a&gt;]. SIRC Annual Report 2013-2014: Lifting the Shroud of Secrecy. Available at: http://www.sirccsars. gc.ca/anrran/2013-2014/index-eng.html. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr70" name="fn70"&gt;70&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr71" name="fn71"&gt;71&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr72" name="fn72"&gt;72&lt;/a&gt;]. The Office of the Communications Security Establishment – Mandate. Available at: http://www.ocsecbccst.gc.ca/mandate/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr73" name="fn73"&gt;73&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr74" name="fn74"&gt;74&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr75" name="fn75"&gt;75&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Homepage. Available at: https://www.priv.gc.ca/index_e.ASP&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr76" name="fn76"&gt;76&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Reports and Publications. Special Report to Parliament “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber-Surveillance. January 28th 2014. Available at: https://www.priv.gc.ca/information/srrs/201314/sr_cic_e.asp&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr77" name="fn77"&gt;77&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Available at: https://www.priv.gc.ca/index_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr78" name="fn78"&gt;78&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Appearance before the Senate Standing Commitee National Security and Defence on Bill C-51, the Anti-Terrorism Act, 2015. Available at: https://www.priv.gc.ca/parl/2015/parl_20150423_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr79" name="fn79"&gt;79&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Special Report to Parliament. January 8th 2014. Available at: https://www.priv.gc.ca/information/sr-rs/201314/sr_cic_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr80" name="fn80"&gt;80&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr81" name="fn81"&gt;81&lt;/a&gt;]. Patrick Baud. The Elimination of the Inspector General of the Canadian Security Intelligence Serive. May 2013. Ryerson University. Available at; http://www.academia.edu/4731993/The_Elimination_of_the_Inspector_General_of_the_Canadian_Security_Intelligence_Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr82" name="fn82"&gt;82&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr83" name="fn83"&gt;83&lt;/a&gt;]. Glenn Greenwald. Fisa court oversight: a look inside a secret and empty process. The Guardian. June 19th 2013. Available at: http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy, Nadia Kayyali. Privacy and Civil Liberties Oversight Board to NSA: Why is Bulk Collection of Telelphone Records Still Happening? February 2105. Available at :https://www.eff.org/deeplinks/2015/02/privacy-and-civil-liberties-oversight-board-nsa-whybulk-collection-telephone. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr84" name="fn84"&gt;84&lt;/a&gt;]. Scott Shance. The Troubled Life of the Privacy and Civil Liberties Oversight Board. August 9th 2012. The Caucus. Available at: http://thecaucus.blogs.nytimes.com/2012/08/09/thetroubled-life-of-the-privacy-and-civil-liberties-oversight-board/?_r=0. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr85" name="fn85"&gt;85&lt;/a&gt;]. The Open Rights Group. Don't Spy on Us. Reforming Surveillance in the UK. September 2014. Available at: https://www.openrightsgroup.org/assets/files/pdfs/reports/DSOU_Reforming_surveillance_old.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr86" name="fn86"&gt;86&lt;/a&gt;].&lt;/p&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance'&gt;https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-11-24T06:09:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital">
    <title>WhatsApps with fireworks, apps with diyas: Why Diwali needs to go beyond digital </title>
    <link>https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital</link>
    <description>
        &lt;b&gt;The idea of a 'digital' Diwali reduces our social relationships to a ledger of give and take. The last fortnight, I have been bombarded with advertisements selling the idea of a “Digital Diwali”. We have become so used to the idea that everything that is digital is modern, better and more efficient.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital/"&gt;published in the Indian Express&lt;/a&gt; on November 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I have WhatsApp messages with  exploding fireworks, singing greeting cards that chant mystic sounding  messages, an app that turns my smartphone into a flickering diya,  another app that remotely controls the imitation LED candles on my  windows, an invitation to Skype in for a puja at a friend’s house 3,000  km away, and the surfeit of last minute shopping deals, each one  offering a dhamaka of discounts.&lt;br /&gt;&lt;br /&gt;However, to me, the digitality  of Diwali is beyond the surface level of seductive screens and one-click  shopping, or messages of love and apps of light. Think of Diwali as  sharing the fundamental logic that governs the digital — the logic of  counting. As we explode with joy this festive season, we count our  blessings, our loved ones, the gifts and presents that we exchange. If  we are on the new Fitbit trend, we count the calories we consume and  burn as we make our way through parties where it is important to see and  be seen, compare and contrast, connect with all the people who could be  thought of as friends, followers, connectors, or connections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  there is no denying that there is a sociality that the festival brings  in, there is also a cruel algebra of counting that comes along with it.  It is no surprise that as we celebrate the victory of good over evil and  right over wrong, we also simultaneously bow our heads to the goddess  of wealth in this season.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Look  beyond the glossy surface of Diwali festivities, and you realise that it  is exactly like the digital. Digital is about counting. It is right  there in the name — digits refers to numbers. Or digits refer to fingers  — these counting appendages which we can manipulate and flex in order  to achieve desired results. At the core of digital systems is the logic  of counting, and counting, as anybody will tell us, is not a benign  process. What gets counted, gets accounted for, thus producing a ledger  of give and take which often becomes the measure of our social  relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I remember, as a  child, my mother meticulously making a note of every gift or envelope  filled with money that ever came our way from the relatives, so that  there would be precise and exact reciprocation. I am certain that there  is now an app which can keep a track of these exchanges. I am not  suggesting that these occasions of gifting are merely mercenary, but  they are embodiments of finely calibrated values and worth of  relationships defined by proximity, intimacy, hierarchy and distance.  The digital produces and works on a similar algorithm, which is often as  inscrutable and opaque as the unspoken codes of the Diwali ledger.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  is something else that happens with counting. The only things that can  have value are things that have value. I don’t know which ledger counts  the coming together of my very distributed family for an evening of  chatting, talking, sharing lives and laughter. I don’t know how anybody  would reciprocate that one late night when a cousin came to our home and  spent hours with my younger brother making a rangoli to surprise the  rest of us. I have no idea how they will ever reciprocate gifts that one  of the younger kids made at school for all the members of the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diwali  is about the things, but like the digital system, these are things that  cannot be counted. And within the digital system, things that cannot be  counted are things that get discounted. They become unimportant. They  become noise, or rubbish. Our social networks are counting systems that  might notice the low frequency of my connections with my extended family  but they cannot quantify the joy I hear in the voice of my grandmother  when I call her from a different time-zone to catch up with her. Digital  systems can only deal with things with value and not their worth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I  do want to remind myself that there is more to this occasion than  merely counting. And for once, I want to go beyond the digital, where my  memories of the past and the expectations of the future are not shaped  by the digital systems of counting and quantifying. Instead, I want  Diwali to be analogue. I shall still be mediating my collectivity with  the promises of connectivity, but I want to think of this moment as  beyond the logics and logistics of counting that codify our social  transactions and take such a central location in our personal  functioning. This Diwali, I am rooting for a post-digital Diwali, that  accounts for all those things that cannot be counted, but are sometimes  the only things that really count.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital'&gt;https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-23T13:27:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015">
    <title>Summary Report Internet Governance Forum 2015 </title>
    <link>https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015</link>
    <description>
        &lt;b&gt;Centre for Internet and Society (CIS), India participated in the Internet Governance Forum (IGF) held at Poeta Ronaldo Cunha Lima Conference Center, Joao Pessoa in Brazil from 10 November 2015 to 13 November 2015. The theme of IGF 2015 was ‘Evolution of Internet Governance: Empowering Sustainable Development’. Sunil Abraham, Pranesh Prakash &amp; Jyoti Panday from CIS actively engaged and made substantive contributions to several key issues affecting internet governance at the IGF 2015. The issue-wise detail of their engagement is set out below. &lt;/b&gt;
        
&lt;p align="center" style="text-align: left;"&gt;&lt;strong&gt;INTERNET
GOVERNANCE&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
I. The
Multi-stakeholder Advisory Group to the IGF organised a discussion on
&lt;em&gt;&lt;strong&gt;Sustainable
Development Goals (SDGs) and Internet Economy&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
the Main Meeting Hall from 9:00 am to 12:30 pm on 11 November, 2015.
The
discussions at this session focused on the importance of Internet
Economy enabling policies and eco-system for the fulfilment of
different SDGs. Several concerns relating to internet
entrepreneurship, effective ICT capacity building, protection of
intellectual property within and across borders were availability of
local applications and content were addressed. The panel also
discussed the need to identify SDGs where internet based technologies
could make the most effective contribution.  Sunil
Abraham contributed to the panel discussions by addressing the issue
of development and promotion of local content and applications. List
of speakers included:&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Lenni
	Montiel, Assistant-Secretary-General for Development, United Nations&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO LIRNEasia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sergio
	Quiroga da Cunha, Head of Latin America, Ericsson&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Raúl
	L. Katz, Adjunct Professor, Division of Finance and Economics,
	Columbia Institute of Tele-information&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jimson
	Olufuye, Chairman, Africa ICT Alliance (AfICTA)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lydia
	Brito, Director of the Office in Montevideo, UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Rudiantara, Minister of Communication &amp;amp; Information Technology,
	Indonesia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Daniel
	Sepulveda, Deputy Assistant Secretary, U.S. Coordinator for
	International and Communications Policy at the U.S. Department of
	State &amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Deputy
	Minister Department of Telecommunications and Postal Services for
	the republic of South Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, Executive Director, Centre for Internet and Society, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Junaid Ahmed Palak, Information and Communication Technology
	Minister of Bangladesh&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jari
	Arkko, Chairman, IETF&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Rabello, President, Rio Film Trade Association&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gary
	Fowlie, Head of Member State Relations &amp;amp; Intergovernmental
	Organizations, ITU&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;igf&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;2015-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;main&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;sessions&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Internet
economy and Sustainable Development here
&lt;a href="https://www.youtube.com/watch?v=D6obkLehVE8"&gt;https://www.youtube.com/watch?v=D6obkLehVE8&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;II.
Public
Knowledge organised a workshop on &lt;em&gt;&lt;strong&gt;The
Benefits and Challenges of the Free Flow of Data &lt;/strong&gt;&lt;/em&gt;at
Workshop Room
5 from 11:00 am to 12:00 pm on 12 November, 2015. The discussions in
the workshop focused on the benefits and challenges of the free flow
of data and also the concerns relating to data flow restrictions
including ways to address
them. Sunil
Abraham contributed to the panel discussions by addressing the issue
of jurisdiction of data on the internet. The
panel for the workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Vint
	Cerf, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lawrence
	Strickling, U.S. Department of Commerce, NTIA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Richard
	Leaning, European Cyber Crime Centre (EC3), Europol&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Marietje
	Schaake, European Parliament&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nasser
	Kettani, Microsoft&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshops&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link https://www.youtube.com/watch?v=KtjnHkOn7EQ&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;III.
Article
19 and
Privacy International organised a workshop on &lt;em&gt;&lt;strong&gt;Encryption
and Anonymity: Rights and Risks&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 1 from 11:00 am to 12:30 pm on 12 November, 2015.
The
workshop fostered a discussion about the latest challenges to
protection of anonymity and encryption and ways in which law
enforcement demands could be met while ensuring that individuals
still enjoyed strong encryption and unfettered access to anonymity
tools. Pranesh
Prakash contributed to the panel discussions by addressing concerns
about existing south Asian regulatory framework on encryption and
anonymity and emphasizing the need for pervasive encryption. The
panel for this workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	David
	Kaye, UN Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Juan
	Diego Castañeda, Fundación Karisma, Colombia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Edison
	Lanza, Organisation of American States Special Rapporteur&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Ted
	Hardie, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Elvana
	Thaci, Council of Europe&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Professor
	Chris Marsden, Oxford Internet Institute&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alexandrine
	Pirlot de Corbion, Privacy International&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&lt;a name="_Hlt435412531"&gt;&lt;/a&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;worksh&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;o&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;ps&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here https://www.youtube.com/watch?v=hUrBP4PsfJo&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;IV.
Chalmers
&amp;amp; Associates organised a session on &lt;em&gt;&lt;strong&gt;A
Dialogue on Zero Rating and Network Neutrality&lt;/strong&gt;&lt;/em&gt;
at the Main Meeting Hall from 2:00 pm to 4:00 pm on 12 November,
2015. The Dialogue provided access to expert insight on zero-rating
and a full spectrum of diverse
views on this issue. The Dialogue also explored alternative
approaches to zero rating such as use of community networks. Pranesh
Prakash provided
a
detailed explanation of harms and benefits related to different
approaches to zero-rating. The
panellists for this session were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Jochai
	Ben-Avie, Senior Global Policy Manager, Mozilla, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Igor
	Vilas Boas de Freitas, Commissioner, ANATEL, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dušan
	Caf, Chairman, Electronic Communications Council, Republic of
	Slovenia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Elaluf-Calderwood, Research Fellow, London School of Economics,
	UK/Peru&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Belinda
	Exelby, Director, Institutional Relations, GSMA, UK&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO, LIRNEasia, Sri Lanka&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Anka
	Kovacs, Director, Internet Democracy Project, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Kevin
	Martin, VP, Mobile and Global Access Policy, Facebook, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, Policy Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Steve
	Song, Founder, Village Telco, South Africa/Canada&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dhanaraj
	Thakur, Research Manager, Alliance for Affordable Internet, USA/West
	Indies&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Yoo, Professor of Law, Communication, and Computer &amp;amp; Information
	Science, University of Pennsylvania, USA&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http://www.intgovforum.org/cms/igf2015-main-sessions&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;V.
The
Internet &amp;amp; Jurisdiction Project organised a workshop on
&lt;em&gt;&lt;strong&gt;Transnational
Due Process: A Case Study in MS Cooperation&lt;/strong&gt;&lt;/em&gt;
at Workshop Room
4 from 11:00 am to 12:00 pm on 13 November, 2015. The
workshop discussion focused on the challenges in developing an
enforcement framework for the internet that guarantees transnational
due process and legal interoperability. The discussion also focused
on innovative approaches to multi-stakeholder cooperation such as
issue-based networks, inter-sessional work methods and transnational
policy standards.  The panellists for this discussion were the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Anne
	Carblanc  Head of Division, Directorate for Science, Technology and
	Industry, OECD&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Eileen
	Donahoe Director Global Affairs, Human Rights Watch&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Byron
	Holland President and CEO, CIRA (Canadian ccTLD)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Painter Coordinator for Cyber Issues, US Department of State&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham Executive Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alice
	Munyua Lead dotAfrica Initiative and GAC representative, African
	Union Commission&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudsen Senior Advisor for International Policy, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dunja
	Mijatovic Representative on Freedom of the Media, OSCE&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Thomas
	Fitschen Director for the United Nations, for International
	Cooperation against Terrorism and for Cyber Foreign Policy, German
	Federal Foreign Office&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Hartmut
	Glaser Executive Secretary, Brazilian Internet Steering Committee&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Matt
	Perault, Head of Policy Development Facebook&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Transnational
Due Process: A Case Study in MS Cooperation available here&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=M9jVovhQhd0"&gt;https://www.youtube.com/watch?v=M9jVovhQhd0&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;VI.
The Internet Governance Project organised a meeting of the
&lt;em&gt;&lt;strong&gt;Dynamic
Coalition on Accountability of Internet Governance Venues&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 2 from 14:00
– 15:30 on
12 November, 2015. The coalition
brought together panelists to highlight the
challenges in developing an accountability
framework
for internet governance
venues that include setting up standards and developing a set of
concrete criteria. Jyoti Panday provided the perspective of civil
society on why acountability is necessary in internet governance
processes and organizations. The panelists for this workshop included
the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Robin
	Gross, IP Justice&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jeanette
	Hofmann, Director
	&lt;a href="http://www.internetundgesellschaft.de/"&gt;Alexander
	von Humboldt Institute for Internet and Society&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	 Farzaneh
	Badiei, 
	Internet Governance Project&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Erika
	Mann,
	Managing
	Director Public PolicyPolicy Facebook and Board of Directors
	ICANN&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Paul
	Wilson, APNIC&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Izumi
	Okutani, Japan
	Network Information Center (JPNIC)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Keith
	Drazek , Verisign&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jyoti
	Panday,
	CIS&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jorge
	Cancio,
	GAC representative&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the workshop is available here
&lt;a href="http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link https://www.youtube.com/watch?v=UIxyGhnch7w&lt;/p&gt;
&lt;p&gt;&amp;nbsp;VII.
Digital
Infrastructure
Netherlands Foundation organized an open forum at
Workshop Room 3
from 11:00
– 12:00
on
10
November, 2015. The open
forum discussed the increase
in government engagement with “the internet” to protect their
citizens against crime and abuse and to protect economic interests
and critical infrastructures. It
brought
together panelists topresent
ideas about an agenda for the international protection of ‘the
public core of the internet’ and to collect and discuss ideas for
the formulation of norms and principles and for the identification of
practical steps towards that goal.
Pranesh Prakash participated in the e open forum. Other speakers
included&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Bastiaan
	Goslings AMS-IX, NL&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Pranesh
	Prakash CIS, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Marilia
	Maciel (FGV, Brasil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Dennis
	Broeders (NL Scientific Council for Government Policy)&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the open
forum is available here
&lt;a href="http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf"&gt;http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=joPQaMQasDQ"&gt;https://www.youtube.com/watch?v=joPQaMQasDQ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
VIII.
UNESCO, Council of Europe, Oxford University, Office of the High
Commissioner on Human Rights, Google, Internet Society organised a
workshop  on hate speech and youth radicalisation at Room 9 on
Thursday, November 12. UNESCO shared the initial outcome from its
commissioned research on online hate speech including practical
recommendations on combating against online hate speech through
understanding the challenges, mobilizing civil society, lobbying
private sectors and intermediaries and educating individuals with
media and information literacy. The workshop also discussed how to
help empower youth to address online radicalization and extremism,
and realize their aspirations to contribute to a more peaceful and
sustainable world. Sunil Abraham provided his inputs. Other speakers
include&lt;/p&gt;
&lt;p&gt;
	1.
Chaired by Ms Lidia Brito, Director for UNESCO Office in Montevideo&lt;/p&gt;
&lt;p&gt;
	2.Frank
La Rue, Former Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;p&gt;
	3.
Lillian Nalwoga, President ISOC Uganda and rep CIPESA, Technical
community&lt;/p&gt;
&lt;p&gt;
	4.
Bridget O’Loughlin, CoE, IGO&lt;/p&gt;
&lt;p&gt;
	5.
Gabrielle Guillemin, Article 19&lt;/p&gt;
&lt;p&gt;
	6.
Iyad Kallas, Radio Souriali&lt;/p&gt;
&lt;p&gt;
	7.
Sunil Abraham executive director of Center for Internet and Society,
Bangalore, India&lt;/p&gt;
&lt;p&gt;
	8.
Eve Salomon, global Chairman of the Regulatory Board of RICS&lt;/p&gt;
&lt;p&gt;
	9.
Javier Lesaca Esquiroz, University of Navarra&lt;/p&gt;
&lt;p&gt;
	10.
Representative GNI&lt;/p&gt;
&lt;p&gt;
	11.
Remote Moderator: Xianhong Hu, UNESCO&lt;/p&gt;
&lt;p&gt;
	12.
Rapporteur: Guilherme Canela De Souza Godoi, UNESCO&lt;/p&gt;
&lt;p&gt;
Detailed
description of the workshop
is available here
&lt;a href="http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link to the panel is available here
&lt;a href="https://www.youtube.com/watch?v=eIO1z4EjRG0"&gt;https://www.youtube.com/watch?v=eIO1z4EjRG0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;INTERMEDIARY
LIABILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
IX.
Electronic
Frontier Foundation, Centre for Internet Society India, Open Net
Korea and Article 19 collaborated to organize
a workshop on the &lt;em&gt;&lt;strong&gt;Manila
Principles on Intermediary Liability&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 9 from 11:00 am to 12:00 pm on 13 November 2015. The
workshop elaborated on the Manila
Principles, a high level principle framework of best practices and
safeguards for content restriction practices and addressing liability
for intermediaries for third party content. The
workshop
saw particpants engaged in over lapping projects considering
restriction practices coming togetehr to give feedback and highlight
recent developments across liability regimes. Jyoti
Panday laid down the key details of the Manila Principles framework
in this session. The panelists for this workshop included the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Kelly
	Kim Open Net Korea,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jyoti
	Panday, CIS India,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gabrielle
	Guillemin, Article 19,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Rebecca
	McKinnon on behalf of UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Giancarlo
	Frosio, Center for Internet and Society, Stanford Law School&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nicolo
	Zingales, Tilburg University&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudson, Google&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here &lt;a href="https://www.youtube.com/watch?v=kFLmzxXodjs"&gt;https://www.youtube.com/watch?v=kFLmzxXodjs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;ACCESSIBILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
X.
Dynamic
Coalition
on Accessibility and Disability and Global Initiative for Inclusive
ICTs organised a workshop on &lt;em&gt;&lt;strong&gt;Empowering
the Next Billion by Improving Accessibility&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
Workshop Room 6 from 9:00 am to 10:30 am on 13 November, 2015. The
discussion focused on
the need and ways to remove accessibility barriers which prevent over
one billion potential users to benefit from the Internet, including
for essential services. Sunil
Abraham specifically spoke about the lack of compliance of existing
ICT infrastructure with well established accessibility standards
specifically relating to accessibility barriers in the disaster
management process. He discussed the barriers faced by persons with
physical or psychosocial disabilities.  The
panelists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Francesca
	Cesa Bianchi, G3ICT&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Cid
	Torquato, Government of Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Carlos
	Lauria, Microsoft Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Derrick
	L. Cogburn, Institute on Disability and Public Policy (IDPP) for the
	ASEAN(Association of Southeast Asian Nations) Region&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	H. F. Botelho, F123 Consulting&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gunela
	Astbrink, GSA InfoComm&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
Link Empowering
the next billion by improving accessibility&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=7RZlWvJAXxs"&gt;https://www.youtube.com/watch?v=7RZlWvJAXxs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;OPENNESS&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
XI.
A
workshop on &lt;em&gt;&lt;strong&gt;FOSS
&amp;amp; a Free, Open Internet: Synergies for Development&lt;/strong&gt;&lt;/em&gt;
was organized at Workshop Room 7 from 2:00 pm to 3:30 pm on 13
November, 2015. The discussion was focused on the increasing risk to
openness of the internet and the ability of present &amp;amp; future
generations to use technology to improve their lives. The panel shred
different perspectives about the future co-development
of FOSS and a free, open Internet; the threats that are emerging; and
ways for communities to surmount these. Sunil
Abraham emphasised the importance of free software, open standards,
open access and access to knowledge and the lack of this mandate in
the draft outcome document for upcoming WSIS+10 review and called for
inclusion of the same. Pranesh Prakash further contributed to the
discussion by emphasizing the need for free open source software with
end‑to‑end encryption and traffic level encryption based
on open standards which are decentralized and work through federated
networks. The
panellists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Satish
	Babu, Technical Community, Chair, ISOC-TRV, Kerala, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Judy
	Okite, Civil Society, FOSS Foundation for Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Mishi
	Choudhary, Private Sector, Software Freedom Law Centre, New York&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	Botelho, Private Sector, heads F123 Systems, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nnenna
	Nwakanma- WWW.Foundation&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Yves
	MIEZAN EZO, Open Source strategy consultant&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Corinto
	Meffe, Advisor to the President and Directors, SERPRO, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Frank
	Coelho de Alcantara, Professor, Universidade Positivo, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Caroline
	Burle, Institutional and International Relations, W3C Brazil Office
	and Center of Studies on Web Technologies&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7" target="_top"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=lwUq0LTLnDs"&gt;https://www.youtube.com/watch?v=lwUq0LTLnDs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015'&gt;https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>Civil Society</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-11-30T10:47:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bangalore-chapter-meet-dsci">
    <title>Bangalore Chapter Meet - DSCI</title>
    <link>https://cis-india.org/internet-governance/events/bangalore-chapter-meet-dsci</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is glad to host the Bangalore Chapter Meet of DSCI on Tuesday, December 1, 2015, from 2.30 p.m. to 5.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pronab Mohanty, Inspector General of Police, will give a talk on &lt;b&gt;Cybercrimes&lt;/b&gt;. Given his rich experience in handling cyber-crimes, participants are expected to immensely benefit from his talk. Sunil Abraham, Executive Director, CIS will present the outcome of his SIG, the study period for which got recently concluded after about six months of in-depth study - "Anonymity in Cyberspace" - a topic that touches our daily lives when we browse internet. The session will also include developments from the recent Jaipur International ISO Conference.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.30&lt;br /&gt;3.00&lt;/td&gt;
&lt;td&gt;Recent developments, updates from DSCI and SIGs: P. Srinivas&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.00&lt;br /&gt;4.00&lt;/td&gt;
&lt;td&gt;Anonymity in Cyberspace: Sunil Abraham, Executive Director, CIS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.00&lt;br /&gt;5.00&lt;/td&gt;
&lt;td&gt;Talk on Cybercrimes: Pronab Mohanty, Inspector General of Police, Karnataka&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.00&lt;br /&gt;5.30&lt;/td&gt;
&lt;td&gt;High Tea and Networking&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Since seats are limited, the participation will be restricted to first 50 confirmations. Please rush your email confirmation to &lt;a class="moz-txt-link-abbreviated" href="mailto:Rajesh_K18@infosys.com"&gt;Rajesh_K18@infosys.com&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bangalore-chapter-meet-dsci'&gt;https://cis-india.org/internet-governance/events/bangalore-chapter-meet-dsci&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-22T12:10:16Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10">
    <title>Comments on the Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (WSIS+10)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10</link>
    <description>
        &lt;b&gt;Following the comment-period on the Zero Draft, the Draft Outcome Document of the UN General Assembly's Overall Review of implementation of WSIS Outcomes was released on 4 November 2015. Comments were sought on the Draft Outcome Document from diverse stakeholders. The Centre for Internet &amp; Society's response to the call for comments is below.&lt;/b&gt;
        &lt;p class="Normal1" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The WSIS+10 Overall Review of the Implementation of WSIS Outcomes, scheduled for December 2015, comes as a review of the WSIS process initiated in 2003-05. At the December summit of the UN General Assembly, the WSIS vision and mandate of the IGF are to be discussed. The Draft Outcome Document, released on 4 November 2015, is towards an outcome document for the summit. Comments were sought on the Draft Outcome Document. Our comments are below.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (“&lt;i&gt;the current Draft&lt;/i&gt;”) stands considerably altered from the Zero Draft. With references to development-related challenges, the Zero Draft covered areas of growth and challenges of the WSIS. It noted the persisting digital divide, the importance of innovation and investment, and of conducive legal and regulatory environments, and the inadequacy of financial mechanisms. Issues crucial to Internet governance such as net neutrality, privacy and the mandate of the IGF found mention in the Zero Draft.&lt;/li&gt;
&lt;li&gt;The current Draft retains these, and adds to them. Some previously-omitted issues such as surveillance, the centrality of human rights and the intricate relationship of ICTs to the Sustainable Development Goals, now stand incorporated in the current Draft. This is most commendable. However, the current Draft still lacks teeth with regard to some of these issues, and fails to address several others. &lt;/li&gt;
&lt;li&gt;In our comments to the Zero Draft, CIS had called for these issues to be addressed. We reiterate our call in the following paragraphs.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(1) &lt;/strong&gt;&lt;strong&gt;ICT for Development&lt;/strong&gt;&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the current Draft, paragraphs 14-36 deal with ICTs for development. While the draft contains rubrics like ‘Bridging the digital divide’, ‘Enabling environment’, and ‘Financial mechanisms’, the following issues are unaddressed:&lt;/li&gt;
&lt;li&gt;Equitable development for all;&lt;/li&gt;
&lt;li&gt;Accessibility to ICTs for persons with disabilities;&lt;/li&gt;
&lt;li&gt;Access to knowledge and open data.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Equitable development&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the &lt;a class="external-link" href="http://www.itu.int/net/wsis/docs/geneva/official/dop.html"&gt;Geneva Declaration of Principles&lt;/a&gt; (2003), two goals are set forth as the Declaration’s “ambitious goal”: (a) the bridging of the digital divide; and (b) equitable development for all (¶ 17). The current Draft speaks in detail about the bridging of the digital divide, but the goal of equitable development is conspicuously absent. At WSIS+10, when the WSIS vision evolves to the creation of inclusive ‘knowledge societies’, equitable development should be both a key principle and a goal to stand by.&lt;/li&gt;
&lt;li&gt;Indeed, inequitable development underscores the persistence of the digital divide. The current Draft itself refers to several instances of inequitable development; for ex., the uneven production capabilities and deployment of ICT infrastructure and technology in developing countries, landlocked countries, small island developing states, countries under occupation or suffering natural disasters, and other vulnerable states; lack of adequate financial mechanisms in vulnerable parts of the world; variably affordable (or in many cases, unaffordable) spread of ICT devices, technology and connectivity, etc. &lt;/li&gt;
&lt;li&gt;What underscores these challenges is the inequitable and uneven spread of ICTs across states and communities, including in their production, capacity-building, technology transfers, gender-concentrated adoption of technology, and inclusiveness. &lt;/li&gt;
&lt;li&gt;As such, it is essential that the WSIS+10 Draft Outcome Document reaffirm our commitment to equitable development for all peoples, communities and states.&lt;/li&gt;
&lt;li&gt;We suggest the following inclusion to &lt;strong&gt;paragraph 5 of the current Draft&lt;/strong&gt;:&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;&lt;span style="text-align: justify; "&gt;“5. We reaffirm our common desire and commitment to the WSIS vision to build &lt;/span&gt;&lt;i style="text-align: justify; "&gt;&lt;span&gt;an equitable,&lt;/span&gt;&lt;/i&gt;&lt;span style="text-align: justify; "&gt; people-centred, inclusive, and development-oriented Information Society…”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Accessibility for persons with disabilities&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;10. Paragraph 13 of the Geneva Declaration of Principles (2003) pledges to “pay particular attention to the special needs of marginalized and vulnerable groups of society” in the forging of an Information Society. Particularly, ¶ 13 recognises the special needs of older persons and persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. Moreover, ¶ 31 of the Geneva Declaration of Principles calls for the special needs of persons with disabilities, and also of disadvantaged and vulnerable groups, to be taken into account while promoting the use of ICTs for capacity-building. Accessibility for persons with disabilities is thus core to bridging the digital divide – as important as bridging the gender divide in access to ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. Not only this, but the &lt;a class="external-link" href="http://www.itu.int/net/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;WSIS+10 Statement on the Implementation of WSIS Outcomes&lt;/a&gt; (June 2014) also reaffirms the commitment to “provide equitable access to information and knowledge for all… including… people with disabilities”, recognizing that it is “crucial to increase the participation of vulnerable people in the building process of Information Society…” (¶8).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. In our previous submission, CIS had suggested language drawing attention to this. Now, the current Draft only acknowledges that “particular attention should be paid to the specific ICT challenges facing… persons with disabilities…” (paragraph 11). It acknowledges also that now, accessibility for persons with disabilities constitutes one of the core elements of quality (paragraph 22). However, there is a glaring omission of a call to action, or a reaffirmation of our commitment to bridging the divide experienced by persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. We suggest, therefore, the addition of the following language the addition of &lt;strong&gt;paragraph 24A to the current Draft&lt;/strong&gt;. Sections of this suggestion are drawn from ¶8, WSIS+10 Statement on the Implementation of WSIS Outcomes.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"24A. &lt;span style="text-align: justify; "&gt;Recalling the UN Convention on the rights of people with disabilities, the Geneva principles paragraph 11, 13, 14 and 15, Tunis Commitment paras 20, 22 and 24, and reaffirming the commitment to providing equitable access to information and knowledge for all, building ICT capacity for all and confidence in the use of ICTs by all, including youth, older persons, women, indigenous and nomadic peoples, people with disabilities, the unemployed, the poor, migrants, refugees and internally displaced people and remote and rural communities, it is crucial to increase the participation of vulnerable people in the building process of information Society and to make their voice heard by stakeholders and policy-makers at different levels. It can allow the most fragile groups of citizens worldwide to become an integrated part of their economies and also raise awareness of the target actors on the existing ICTs solution (such as tolls as e- participation, e-government, e-learning applications, etc.) designed to make their everyday life better. We recognise need for continued extension of access for people with disabilities and vulnerable people to ICTs, especially in developing countries and among marginalized communities, and reaffirm our commitment to promoting and ensuring accessibility for persons with disabilities. In particular, we call upon all stakeholders to honour and meet the targets set out in Target 2.5.B of the Connect 2020 Agenda that enabling environments ensuring accessible telecommunication/ICT for persons with disabilities should be established in all countries by 2020.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Access to knowledge and open data&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;15. The Geneva Declaration of Principles dedicates a section to access to information and knowledge (B.3). It notes, in ¶26, that a “rich public domain” is essential to the growth of Information Society. It urges that public institutions be strengthened to ensure free and equitable access to information (¶26), and also that assistive technologies and universal design can remove barriers to access to information and knowledge (¶25). Particularly, the Geneva Declaration advocates the use of free and open source software, in addition to proprietary software, to meet these ends (¶27).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. It was also recognized in the WSIS+10 Statement on the Implementation of WSIS Outcomes (‘Challenges-during implementation of Action Lines and new challenges that have emerged’) that there is a need to promote access to all information and knowledge, and to encourage open access to publications and information (C, ¶¶9 and 12).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. In our previous submission, CIS had highlighted the importance of open access to knowledge thus: “…the implications of open access to data and knowledge (including open government data), and responsible collection and dissemination of data are much larger in light of the importance of ICTs in today’s world. As Para 7 of the Zero Draft indicates, ICTs are now becoming an indicator of development itself, as well as being a key facilitator for achieving other developmental goals. As Para 56 of the Zero Draft recognizes, in order to measure the impact of ICTs on the ground – undoubtedly within the mandate of WSIS – it is necessary that there be an enabling environment to collect and analyse reliable data. Efforts towards the same have already been undertaken by the United Nations in the form of ‘Data Revolution for Sustainable Development’. In this light, the Zero Draft rightly calls for enhancement of regional, national and local capacity to collect and conduct analyses of development and ICT statistics (Para 56). Achieving the central goals of the WSIS process requires that such data is collected and disseminated under open standards and open licenses, leading to creation of global open data on the ICT indicators concerned.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. This crucial element is missing from the current Draft of the WSIS+10 Outcome Document. Of course, the current Draft notes the importance of access to information and free flow of data. But it stops short of endorsing and advocating the importance of access to knowledge and free and open source software, which are essential to fostering competition and innovation, diversity of consumer/ user choice and ensuring universal access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. We suggest the following addition – of &lt;strong&gt;paragraph 23A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"23A. &lt;span style="text-align: justify; "&gt;We recognize the need to promote access for all to information and knowledge, open data, and open, affordable, and reliable technologies and services, while respecting individual privacy, and to encourage open access to publications and information, including scientific information and in the research sector, and particularly in developing and least developed countries.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(2) &lt;/strong&gt;&lt;strong&gt;Human Rights in Information Society&lt;/strong&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;20. The current Draft recognizes that human rights have been central to the WSIS vision, and reaffirms that rights offline must be protected online as well. However, the current Draft omits to recognise the role played by corporations and intermediaries in facilitating access to and use of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. In our previous submission, CIS had noted that “the Internet is led largely by the private sector in the development and distribution of devices, protocols and content-platforms, corporations play a major role in facilitating – and sometimes, in restricting – human rights online”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. We reiterate our suggestion for the inclusion of &lt;strong&gt;paragraph 43A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"43A. &lt;span style="text-align: justify; "&gt;We recognize the critical role played by corporations and the private sector in facilitating human rights online. We affirm, in this regard, the responsibilities of the private sector set out in the Report of the Special Representative of the Secretary General on the issue of human rights and transnational corporations and other business enterprises, A/HRC/17/31 (21 March 2011), and encourage policies and commitments towards respect and remedies for human rights.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(3) &lt;/strong&gt;&lt;strong&gt;Internet&lt;/strong&gt; &lt;strong&gt;Governance&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;The support for multilateral governance of the Internet&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;23. While the section on Internet governance is not considerably altered from the zero draft, there is a large substantive change in the current Draft. The current Draft states that the governance of the Internet should be “multilateral, transparent and democratic, with full involvement of all stakeholders” (¶50). Previously, the zero draft recognized the “the general agreement that the governance of the Internet should be open, inclusive, and transparent”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. A return to purely ‘multilateral’ Internet governance would be regressive. Governments are, without doubt, crucial in Internet governance. As scholarship and experience have both shown, governments have played a substantial role in shaping the Internet as it is today: whether this concerns the availability of content, spread of infrastructure, licensing and regulation, etc. However, these were and continue to remain contentious spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. As such, it is essential to recognize that a plurality of governance models serve the Internet, in which the private sector, civil society, the technical community and academia play important roles. &lt;strong&gt;We recommend returning to the language of the zero draft in ¶32: “open, inclusive and transparent governance of the Internet”.&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Governance of Critical Internet Resources&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;26. It is curious that the section on Internet governance&lt;strong&gt; &lt;/strong&gt;in both the zero and the current Draft makes no reference to ICANN, and in particular, to the ongoing transition of IANA stewardship and the discussions surrounding the accountability of ICANN and the IANA operator. The stewardship of critical Internet resources, such as the root, is crucial to the evolution and functioning of the Internet. Today, ICANN and a few other institutions have a monopoly over the management and policy-formulation of several critical Internet resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. While the WSIS in 2003-05 considered this a troubling issue, this focus seems to have shifted entirely. Open, inclusive, transparent and &lt;i&gt;global&lt;/i&gt; Internet are misnomer-principles when ICANN – and in effect, the United States – continues to have monopoly over critical Internet resources. The allocation and administration of these resources should be decentralized and distributed, and should not be within the disproportionate control of any one jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. Therefore, we reiterate our suggestion to add &lt;strong&gt;&lt;span&gt;paragraph 53A&lt;/span&gt;&lt;/strong&gt; after Para 53:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"53A. &lt;span style="text-align: justify; "&gt;We affirm that the allocation, administration and policy involving critical Internet resources must be inclusive and decentralized, and call upon all stakeholders and in particular, states and organizations responsible for essential tasks associated with the Internet, to take immediate measures to create an environment that facilitates this development.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Inclusiveness and Diversity in Internet Governance&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;29. The current Draft, in ¶52, recognizes that there is a need to “promote greater participation and engagement in Internet governance of all stakeholders…”, and calls for “stable, transparent and voluntary funding mechanisms to this end.” This is most commendable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. The issue of inclusiveness and diversity in Internet governance is crucial: today, Internet governance organisations and platforms suffer from a lack of inclusiveness and diversity, extending across representation, participation and operations of these organisations. As CIS submitted previously, the mention of inclusiveness and diversity becomes tokenism or formal (but not operational) principle in many cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. As we submitted before, the developing world is pitifully represented in standards organisations and in ICANN, and policy discussions in organisations like ISOC occur largely in cities like Geneva and New York. For ex., 307 out of 672 registries listed in ICANN’s registry directory are based in the United States, while 624 of the 1010 ICANN-accredited registrars are US-based.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. Not only this, but 80% of the responses received by ICANN during the ICG’s call for proposals were male. A truly global and open, inclusive and transparent governance of the Internet must not be so skewed. Representation must include not only those from developing countries, but must also extend across gender and communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. We propose, therefore, the addition of a &lt;strong&gt;&lt;span&gt;paragraph 51A&lt;/span&gt;&lt;/strong&gt; after Para 51:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"51A. &lt;span style="text-align: justify; "&gt;We draw attention to the challenges surrounding diversity and inclusiveness in organisations involved in Internet governance, including in their representation, participation and operations. We note with concern that the representation of developing countries, of women, persons with disabilities and other vulnerable groups, is far from equitable and adequate. We call upon organisations involved in Internet governance to take immediate measures to ensure diversity and inclusiveness in a substantive manner.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;Prepared by Geetha Hariharan, with inputs from Sunil Abraham and Japreet Grewal. All comments submitted towards the Draft Outcome Document may be found &lt;a class="external-link" href="http://unpan3.un.org/wsis10/Preparatory-Process-Roadmap/Comments-on-Draft-Outcome-Document"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-11-18T06:33:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-november-14-2015-come-be-my-guest">
    <title>Come, be my guest</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-november-14-2015-come-be-my-guest</link>
    <description>
        &lt;b&gt;The success of art residencies in the city has a lot to do with its openness and artists' initiatives.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/features/metroplus/come-be-my-guest/article7877770.ece"&gt;published in the Hindu&lt;/a&gt; on November 14, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Can we deny even for a moment that a setting has inspired many a  creative minds in their pursuits? A space which allows you to express,  create and innovate is crucial to a thinking mind. Bengaluru's art  residencies afford that freedom and setting to artists.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Players like 1 Shanthiroad, Jaaga, Taj Residency have rendered city’s  art residency scene vibrant. Shortly, TAJ Residency in collaboration  with the Centre for Internet and Society, Bengaluru is coming out with  “Silicon Plateau”, a book observing intersection of the arts, technology  and society. There would be observations emerging from the personal  experiences and perspectives of a variety of contemporary artists,  writers and researchers, national and international, who either live in  or have spent a period of time in the city, or have just crossed paths  with its communities. “The book will have original work by the  participants of residency,” says artist Tara Kelton who founded TAJ  Residency with Galleryske’s Sunitha Kumar Emmart in 2013. When  contemporary artist Tara Kelton returned to Bengaluru from New York,  Tara felt a gap between people of divergent streams needed to be  bridged. “I felt artists were only talking to artists which is why we  wanted to build something interdisciplinary. So, we invite economists,  scientists, designers, architects, writers and artists to our  residencies,” says Tara. As two day residents and three live-in  residents create art at the space in Cooke Town for six weeks TAJ  Residency works in the direction of furthering a dialogue and  facilitating collaborative projects. Over the last two years, the space  has hosted around 50 residents.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Art residency is not a new concept but a slightly improved version of  art camps which have been happening forever. With exchange programme  through fellowships and grants given by Indian and international  institutes, entering the fold, art residencies became more common. In  Bangalore, artist-led space, 1 Shanthiroad elevated the art residencies  to another level.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One of the most seminal names in the world of art residencies, Khoj, an  alternative space for art in Delhi, also collaborated with 1 Shanthiroad  for three years with a view to have South Asian artists work with  artists from Bengaluru or different parts of Southern India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“With Khoj being in Delhi, artists from Pakistan, Bangladesh would  travel to Delhi and go back. The collaboration allowed them to travel  down south. It went on to have several ripple effects. Suresh went on to  co-curate the first Colombo Biennale in 2012,” says Pooja Sood,  Director, Khoj.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to her, the presence of several art schools also has a role to  play. With not much infrastructure to boast, the artists coming out of  these places worked towards creating these opportunities to cater to  themselves.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The absence of a buoyant market for art unlike Delhi and Mumbai, the art  community of Bengaluru started to look beyond. “Bangalore, as such is  not a gallery-driven city which is why the residency space often  executes the various functions of a gallery. 1 Shanthi Road stands out  from many because it is an artist-led initiative, which is why TAKE has  often chosen to collaborate with 1 Shanthi Road...” says Bhavna Kakar  who runs Gallery Latitude in Delhi and also TAKE on art, an art  magazine.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In 1 Shanthiroad again, Bhavna found a perfect platform to organise  ‘TAKE on Residencies’ seminar in collaboration with India Foundation for  the arts. “The ethos of the residency reflects that of the city — as it  is born of the specific culture and is located within it, so naturally  it will reflect that aspect of the city. 1 ShanthiRoad aims is to  function as an experimental laboratory, it is different in its approach  in that it is more homely with its open soup kitchen, its endless addas  and the warm paternal presence of Suresh Jayaram as a mentor. It also  addresses issues that are often considered ‘out of syllabus’ and it  consciously creates a neighbourhood of cultural ethics in the heart of  the city,” observes Kakar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Bar 1, was another force to reckon with once upon a time with regard to  art residencies in Bangalore. It hosted more than 120 local, national  and international artists. “The India India Residency in collaboration  with IFA was special as it brought people from different disciplines  together. Six participants - writers, poets, curators - lived together  for three months and created works. The residency had artists not only  from Bangalore but from small towns and cities in Karnataka. For an  artist of Coorg, Bijapur, seeing so much of art meant a lot,” says  artist Surekha, who along with Christoph Storz, Ayisha Abraham, Suresh  and Smitha Cariappa, formed the core group of BAR 1. It hosted its last  residency in 2012.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Suresh Jayaram of 1 ShanthiRoad on art residencies &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“These art residencies have put Bangalore on the cultural map of India  and also made it a global player. Some major players who have pushed the  cause of residencies are Goethe Institut, Pro-Helvetia Swiss Arts  Council, Asialink Arts Residency Foundation, Asia New Zealand  Foundation. And we have a long-term relationship with them.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Raising the bar &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Bar 1 was another force to reckon with, once upon a time, with regard to  art residencies in Bangalore. It hosted more than 120 local, national  and international artists. “The India India Residency in collaboration  with IFA was special as it brought people from different disciplines  together. Six participants - writers, poets, curators - lived together  for three months and created works. The residency had artists not only  from Bangalore but from small towns and cities in Karnataka. For an  artist of Coorg, Bijapur, seeing so much of art meant a lot. While  several interesting projects emerged from these residencies like Swiss  artist Rahel Hagnauer worked on an environmental project of felling of  trees due to construction of flyovers. Haruko created an inflatable  space ship and Shreyas Karle created ‘Demon heads of Bangalore’,” says  artist Surekha, who along with Christoph Storz, Ayisha Abraham, Suresh  and Smitha Cariappa, formed the core group of BAR 1. It hosted its last  residency in 2012.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-november-14-2015-come-be-my-guest'&gt;https://cis-india.org/internet-governance/news/the-hindu-november-14-2015-come-be-my-guest&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-16T02:11:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality">
    <title>A Dialogue on "Zero Rating" and Network Neutrality</title>
    <link>https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. The workshop on Zero Rating and Network Neutrality will be held on November 12, 2015 at IGF 2015. Pranesh Prakash will be speaking at this event.&lt;/b&gt;
        &lt;p&gt;This was published on the IGF website. &lt;a class="external-link" href="http://igf2015.sched.org/event/145714f13d66ae706eab56b2fb5d2548?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no#.Vj7IlF58hQo"&gt;Read here&lt;/a&gt; the details.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Overview:&lt;br /&gt;The objective of this session is to provide the global Internet  community, and policymakers in particular, with an informed and balanced  dialogue on the complex Internet policy issue of “&lt;a href="https://en.wikipedia.org/wiki/Zero-rating" target="_blank"&gt;zero-rating&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purpose of the session is to help others, in their respective  countries and locales, in their own analyses of Zero-Rating (ZR). The  session will promote access to expert insight and multistakeholder  community discussion. We encourage remote and in-person participation  and aim for complete diversity across stakeholder groups and  perspectives. As a main session, translation will be available in the  official UN languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many different viewpoints on ZR, with some stakeholders  being completely against the practice to others being fully supportive.  In the open discussion leading up to this session, it has become  apparent that some stakeholder approaches to ZR are more nuanced and  varied than “for or against.” The session will consider the full  spectrum of views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case where ZR is advanced as a means to drive Internet access  and narrow the digital divide, this session will also explore  alternative approaches, such as the use of community networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agenda:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The agenda is currently being developed between organizers and  moderators. Based upon list discussion to date, the session will involve  the following elements:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Introduction and Opening - After a brief introduction by the session  organizers, the lead moderator will ask expert speakers to provide a  brief description of how they view ZR.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Multistakeholder, expert dialogue - A moderated discussion on  zero-rating amongst experts holding different positions and  perspectives. The discussion will be based upon policy questions  contributed from the community.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Community questions and discussion - Remote and in-person  participants will be invited to pose questions to the experts, as well  as to engage in guided discussion on topics raised.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Alternatives - Alternatives to zero-rating as a means to advance  access, such as community networks, will be explained and illustrated.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Contributions from relevant IGF workshops - A handful of workshops at  this year’s IGF will consider zero-rating. Organisers or participants  from these workshops will be invited to contribute a readout to the  session.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Policy Questions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Based upon submissions from the community, below are examples of the policy questions that will be addressed during the session:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Please describe ZR as you see it in 90 seconds.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Under what circumstances are there benefits of ZR? What are the  benefits? Under what circumstances are there detriments from ZR? What  are the detriments?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Is all zero-rating bad? Or are there business models of ZR that are  good? Should the bad models be regulated? should the good models be  regulated? How?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Is ZR an anti-competitive business practice, or does ZR enhance competition?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Does a focus on Zero-Rated Internet access in developing countries  divert government attention and investment away from other efforts to  enhance access?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In those countries which have banned zero rating, what has been the impact?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Does ZR limit or skew end-user behavior? If so, how? Is this effect  different from that of other free offerings over the Internet?&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;What are your thoughts,, for example, the following hypothetical:  Imagine that Developer says to Consumer, "Send me your Internet bill at  the end of the month. If you are being charged $Y/MB, and you consume Z  MB of our service, we will send you a check for $Y*Z or simply reduce  your bill with us by that amount.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How should regulators / governments address the potential tension  between expanding Internet connectivity and the desire for “pure net  neutrality?”&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Host Country Chair: Mr. Nivaldo Cleto, Owner at Classico Consultoria,  Advisor to the Brazilian Internet Steering Committee of Brazil (&lt;a href="http://icannwiki.com/CGI.br" target="_blank"&gt;CGI.br&lt;/a&gt;) and Board member of the Board of Trade of Sao Paulo (JUCESP), as a Representative of the Union.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moderators:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The role of the moderators is to keep the discussion focused, self-referencing, fluid, friendly, and on time.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Lead/expert moderator: Robert Pepper, VP, Global Technology Policy, Cisco&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Remote moderator: Ginger Paque, Director, Internet Governance Programmes, Diplo&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Floor and Readout moderator: Carolina Rossini, VP, International Policy, Public Knowledge&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Floor and Readout moderator: Vladimir Radunovic, Director, E-diplomacy and Cybersecurity Programmes, Diplo&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Expert speakers: (confirmed as of 29 October 2015)&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Jochai Ben-Avie, Senior Global Policy Manager, Mozilla, USA&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;Eduardo Bertoni, Professor, Universidad de Palermo, Argentina&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Igor Vilas Boas de Freitas, Commissioner, ANATEL, Brazil&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Dušan Caf, Chairman, Electronic Communications Council, Republic of Slovenia&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Silvia Elaluf-Calderwood, Research Fellow, London School of Economics, UK/Peru&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Belinda Exelby, Director, Institutional Relations, GSMA, UK&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;Bob Frankston, Computer Scientist, USA&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Helani Galpaya, CEO, LIRNEasia, Sri Lanka&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Anka Kovacs, Director, Internet Democracy Project, India&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Kevin Martin, VP, Mobile and Global Access Policy, Facebook, USA&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Pranesh Prakash, Policy Director, Center for Internet and Society, India&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Steve Song, Founder, Village Telco, South Africa/Canada&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Dhanaraj Thakur, Research Manager, Alliance for Affordable Internet, USA/West Indies&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Christopher Yoo, Professor of Law, Communication, and Computer &amp;amp; Information Science, University of Pennsylvania, USA&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Plan for online interaction:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This session will include a remote panelist who will be prepared to speak from a remote hub.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both in situ and remote interventions are being carefully coordinated to maximise a diversity of views in the available time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This session will treat online participants on equal footing with in  situ attendees, and will monitor remote attendees specifically to ensure  that their requests to ask questions will be noted. Participant  interventions in the session will consist of questions, at two  structured points in the session. Floor moderators will collect the  questions, and will consult with the panel remote moderator to ensure  that remote questions are considered, as the moderators select for  stakeholder balance and remote representation. Remote participant  questions will be read into the session in English or Spanish by the  remote moderator, to avoid 'transaction cost' (time and possible  connection difficulties).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Feeder’ workshops and/or connections with other sessions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have identified the following workshops and other sessions as  relevant. Each shall provide a 1-2 minute readout or preview from their  session.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Workshop No. 156: Zero-rating and neutrality policies in developing countries&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Workshop No. 79: Zero-rating, Open Internet, and Freedom of Expression&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Workshop No. 21: SIDS Roundtable: “Free Internet” - Bane or Boon?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Dynamic Coalition Session: Dynamic Coalition on Net Neutrality&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Access/PROTESTE event on Zero-Rating&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Desired results/output:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As explained above, our desired result is to provide the global  Internet community with a well-rounded and insightful dialogue on the  Internet policy issue of zero-rating. The discussion is an output in and  of itself, from which policymakers around the world should benefit. In  accordance with the IGF reporting requirement, a rapporteur shall  produce a neutral report of the session, which will not draw conclusions  on the topic, but rather will summarise the main points discussed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality'&gt;https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-08T04:21:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-ms-cooperation">
    <title>Transnational Due Process: A Case Study in MS Cooperation</title>
    <link>https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-ms-cooperation</link>
    <description>
        &lt;b&gt;nternet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Internet &amp; Jurisdiction Project is organizing a workshop on Transnational Due Process on November 13, 2015. Sunil Abraham is a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Multi-stakeholder cooperation is necessary to develop  and implement operational solutions to Internet Governance challenges.  One such challenge is the tension between the cross-border nature of the  Internet and diverse national jurisdictions. As a result, direct  requests are increasingly addressed by public authorities and courts in  one country to Internet platforms and DNS operators in other  jurisdictions for domain seizures, content takedowns and user  identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since 2012, the Internet &amp;amp; Jurisdiction Project facilitates a multi-stakeholder dialogue process on this issue. More than 80 entities have collaboratively produced a draft transnational due process framework. Here, the concept of multi-stakeholder cooperation is therefore relevant both as method (the dialogue process) and as outcome (the collaborative framework).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtable will gather participants in the I&amp;amp;J Project from different stakeholder groups to describe:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the method employed to develop this framework, challenges encountered and solutions found&lt;/li&gt;
&lt;li&gt;the potential distribution of roles among the respective stakeholders in the operation of the diverse framework components &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The expected benefit is to share concrete experiences around innovative approaches for multi-stakeholder cooperation such as issue-based networks, inter-sessional work methods and transnational policy standards. &lt;br /&gt;&lt;br /&gt;This session will also present the proposed framework to the IGF community to solicit feedback, reach out to new actors and discuss the way forward. The roundtable will be prepared in 2015 by two dedicated meetings in Germany and Brazil, as well as by a number of other sessions with stakeholders around the world organized by the Internet &amp;amp; Jurisdiction Project.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://igf2015.intgovforum.org/event/c5aca9d5712654402e069bbe2dd97eb2#.Vj6_Zl58hQo"&gt;Click to read the details on IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-ms-cooperation'&gt;https://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-ms-cooperation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-08T03:27:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned">
    <title>Cases on the right to be forgotten, what have we learned?</title>
    <link>https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Jyoti Panday is attending the workshop on "Cases on the right to be forgotten, what have we learned?" to be held on November 11, 2015 at IGF 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the &lt;a class="external-link" href="http://igf2015.sched.org/event/49c272c76c66a8f85ca407f2dcb80263?iframe=no&amp;amp;w=i:100;&amp;amp;sidebar=yes&amp;amp;bg=no#.Vj6xF158hQq"&gt;full details on the IGF website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Since the EU Court of Justice ruled to uphold and  codify the Right to Be Forgotten, Free expression activists fear that  the decision will open the door to corporate and government censorship.  However and apart from the European case, how much do we know from the  rest of the world? It is part of a cross-workshop collaboration with  Workshop 31 that look at the procedural and legal implications of such  rulings. &lt;br /&gt;&lt;br /&gt;In a conversational format, the roundtable seek to  understand arguments, scope, discussions and current situation of the  Right to be Forgotten outside the EU and around the world in rulings and  legislations (enacted and proposed).&lt;br /&gt;&lt;br /&gt;The round table will start with kick off presentations (3 minutes) of cases by local activists, such as&lt;br /&gt;&lt;br /&gt;Mexican data authority IFAI fine to Google &lt;br /&gt;Colombian Court case against El Tiempo and ultimately Google&lt;br /&gt;Chilean bill intended to modify the Data Protection Act&lt;br /&gt;Legislation in Nicaragua codifying the ‘right to be forgotten’&lt;br /&gt;Japan's court case against Google&lt;br /&gt;South Korean analysis process to adopt the ‘right to be forgotten’&lt;br /&gt;&lt;br /&gt;After  those presentations, participants will be divided into groups to be  facilitated by the speakers. These groups will discuss and note  problems, challenges and enabling environments on the cases in order to  draw some “lessons learned”. The full group will reconvene on the  roundtable format to detect particularities of the debate beyond EU and  will present, discuss and define 10 lessons that can be drawn from these  experiences to protect freedom of expression in these debates.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned'&gt;https://cis-india.org/internet-governance/news/cases-on-the-right-to-be-forgotten-what-have-we-learned&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-08T02:24:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data">
    <title>The Benefits and Challenges of the “Free Flow” of Data</title>
    <link>https://cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Sunil Abraham is a panelist in this workshop organized by Public Knowledge on November 12, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Internet was designed so that global data flows would be dictated by efficiency, rather than centralized control or oversight. This engineering principle has provided businesses and consumers with access to the best available technology, information, and services, wherever those resources may be located around the world. It has benefitted virtually all industry sectors, from manufacturing to financial services, education, health care, and beyond. The “free flow” of data is what has allowed the Internet flourish into what it is today.&lt;br /&gt;&lt;br /&gt;Yet governments, corporations, and non-state actors around the world are increasingly employing a variety of technical, legal, and administrative tools to restrict data flows, limiting routing and data storage to particular jurisdictions and restricting the kinds of content and data types that are permitted online. Some of these restrictions have been put in place for legitimate purposes, designed to further privacy protections, network security, and fair commerce, and have been justified within the bounds of international law and norms. Others, however, are less defensible, and are intended to unfairly support preferred commercial interests or to quell domestic political dissent.&lt;br /&gt;&lt;br /&gt;This panel will discuss the many benefits and challenges of the free flow of data. It will foster a discussion of the ways in which stakeholders can address the underlying reasons for data flow restrictions (such as the need for law enforcement access to data or the desire to nurture local ICT industry development, etc.) without subverting the Internet’s core potential for innovation, economic growth, and public welfare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Name, stakeholder group, and organizational affiliation of workshop proposal co-organizer(s)&lt;/b&gt;&lt;br /&gt;Carolina Rossini&lt;br /&gt;Civil Society&lt;br /&gt;Public Knowledge&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Has the proposer, or any of the co-organizers, organized an IGF workshop before?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;no&lt;br /&gt;&lt;br /&gt;Subject matter #tags that describe the workshop&lt;br /&gt;&lt;br /&gt;#innovation #barriers #policy #cross-boarder flow #privacy&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Description of the plan to facilitate discussion amongst speakers, audience members and remote participants&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;Each panelist will be given approximately 3 minutes for opening remarks, followed by a moderated discussion, and then audience question and answer. Remote participants will be given the opportunity to ask questions over an online forum, such as Webx and Twitter.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Names and affiliations (stakeholder group, organization) of the participants in the proposed workshop&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr class="even"&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; Name Carolina Rossini&lt;/li&gt;
&lt;li&gt;Stakeholder group: Civil Society&lt;/li&gt;
&lt;li&gt;Organization: Public Knowledge&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: She is a  world-renowned expert on Internet policy and law, a Brazilian national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Name Vint Cerf&lt;/li&gt;
&lt;li&gt;Stakeholder group: Private Sector/Technical Community&lt;/li&gt;
&lt;li&gt;Organization: Google&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He has been involved  in Internet issues for many years and currently serving in influential  vice president and “chief evangelist” role at Google.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Lawrence Strickling&lt;/li&gt;
&lt;li&gt;Stakeholder group: Government&lt;/li&gt;
&lt;li&gt;Organization: U.S. Department of Commerce, NTIA&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He is the head of one  of the United States government’s principal Internet policy agencies.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;li&gt;Name Richard Leaning&lt;/li&gt;
&lt;li&gt;Stakeholder group: Government&lt;/li&gt;
&lt;li&gt;Organization: European Cyber Crime Centre (EC3), Europol&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He understands the  needs of the law enforcement community from a European perspective, a  British national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Marietje Schaake&lt;/li&gt;
&lt;li&gt;Stakeholder group: Government&lt;/li&gt;
&lt;li&gt;Organization: European Parliament&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: She is a prominent  privacy advocate within the European Parliament, a Netherlands national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Name Nasser Kettani&lt;/li&gt;
&lt;li&gt;Stakeholder group: Private Sector&lt;/li&gt;
&lt;li&gt;Organization: Microsoft&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He helps build and  design data centers for Microsoft in Africa, a Moroccan national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Sunil Abraham&lt;/li&gt;
&lt;li&gt;Stakeholder group: Civil Society&lt;/li&gt;
&lt;li&gt;Organization: Centre for Internet and Society, India&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He is the executive  director of one of India’s most influential Internet policy think tanks  and advocacy groups.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? No, but know him well.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Zahra Rose&lt;/li&gt;
&lt;li&gt;Stakeholder group: Civil Society&lt;/li&gt;
&lt;li&gt;Organization: Developing Countries' Centre for Cyber Crime Law&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: A lawyer, she  understands the needs of the law enforcement community from a civil  society perspective in Pakistan.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? No&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;&lt;b&gt;Name of in-person Moderator(s)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Jonah Force Hill&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;&lt;b&gt;Name of Remote Moderator(s)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Winter Casey, U.S. Department of Commerce, NTIA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;&lt;b&gt;Name of Rapporteur(s)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Seth Bouvier, U.S. Department of State&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Description of the proposer's plans for remote participation&lt;/p&gt;
&lt;p&gt;We intend to utilize the IGF’s WebX system to include remote  participants in the question and answer portion of the panel. The remote  participants will be afforded equal/proportional representation in the  discussion. The remote moderator will facilitate the Q&amp;amp;A with the  moderator. We’ll need a screen in the room to display the remote  comments.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;For more info visit &lt;a class="external-link" href="https://www.intgovforum.org/cms/wks2015/index.php/proposal/view_public/65"&gt;IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data'&gt;https://cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-08T02:09:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
