<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1501 to 1515.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/iana-transition-icann-accountability-process-indian-position"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-may-29-2015-jochelle-mendonca-and-neha-alawadhi-digital-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency">
    <title>The generation of e-Emergency</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency</link>
    <description>
        &lt;b&gt;The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/pL8oDtSth36hkoDvIjILLJ/The-generation-of-eEmergency.html"&gt;Livemint&lt;/a&gt; on June 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Censorship during the Emergency in the 1970s was done by clamping down on the media by intimidating editors and journalists, and installing a human censor at every news agency with a red pencil. In the age of both multicast and broadcast media, thought and speech control is more expensive and complicated but still possible to do. What governments across the world have realized is that traditional web censorship methods such as filtering and blocking are not effective because of circumvention technologies and the Streisand effect (a phenomenon in which an attempt to hide or censor information proves to be counter-productive). New methods to manipulate the networked public sphere have evolved accordingly. India, despite claims to the contrary, still does not have the budget and technological wherewithal to successfully pull off some of the censorship and surveillance techniques described below, but thanks to Moore’s law and to the global lack of export controls on such technologies, this might change in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, mass technological-enabled surveillance resulting in self-censorship and self-policing. The coordinated monitoring of Occupy protests in the US by the Department of Homeland Security, the Federal Bureau of Investigation (FBI) counter-terrorism units, police departments and the private sector showcased the bleeding edge of surveillance technologies. Stingrays or IMSI catchers are fake mobile towers that were used to monitor calls, Internet traffic and SMSes. Footage from helicopters, drones, high-res on-ground cameras and the existing CCTV network was matched with images available on social media using facial recognition technology. This intelligence was combined with data from the global-scale Internet surveillance that we know about thanks to the National Security Agency (NSA) whistle-blower &lt;a class="external-link" href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, and what is dubbed “open source intelligence” gleaned by monitoring public social media activity; and then used by police during visits to intimidate activists and scare them off the protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, mass technological gaming—again, according to documents released  by Snowden, the British spy agency, GCHQ (Government Communications  Headquarters), has developed tools to seed false information online,  cast fake votes in web polls, inflate visitor counts on sites,  automatically discover content on video-hosting platform and send  takedown notices, permanently disable accounts on computers, find  private photographs on Facebook, monitor Skype activity in real time and  harvest Skype contacts, prevent access to certain websites by using  peer-to-peer based distributed denial of service attacks, spoof any  email address and amplify propaganda on social media. According to &lt;i&gt;The Intercept&lt;/i&gt;,  a secret unit of GCHQ called the Joint Threat Research Intelligence  Group (JTRIG) combined technology with psychology and other social  sciences to “not only understand, but shape and control how online  activism and discourse unfolds”. The JTRIG used fake victim blog posts,  false flag operations and honey traps to discredit and manipulate  activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, mass human manipulation. The exact size of the Kremlin troll army  is unknown. But in an interview with Radio Liberty, St. Petersburg  blogger Marat Burkhard (who spent two months working for Internet  Research Agency) said, “there are about 40 rooms with about 20 people  sitting in each, and each person has their assignments.” The room he  worked in had each employee produce 135 comments on social media in  every 12-hour shift for a monthly remuneration of 45,000 rubles.  According to Burkhard, in order to bring a “feeling of authenticity”,  his department was divided into teams of three—one of them would be a  villain troll who would represent the voice of dissent, the other two  would be the picture troll and the link troll. The picture troll would  use images to counter the villain troll’s point of view by appealing to  emotion while the link troll would use arguments and references to  appeal to reason. In a day, the “troika” would cover 35 forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next generation of censorship technology is expected to be  “real-time content manipulation” through ISPs and Internet companies. We  have already seen word filters where blacklisted words or phrases are  automatically expunged. Last week, Bengaluru-based activist Thejesh GN  detected that Airtel was injecting javascript into every web page that  you download using a 3G connection. Airtel claims that it is injecting  code developed by the Israeli firm Flash Networks to monitor data usage  but the very same method can be used to make subtle personalized changes  to web content. In China, according to a paper by Tao Zhu et al titled &lt;i&gt;The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions&lt;/i&gt;,  “Weibo also sometimes makes it appear to a user that their post was  successfully posted, but other users are not able to see the post. The  poster receives no warning message in this case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than two decades ago, John Gilmore, of Electronic Frontier  Foundation, famously said, “the Net interprets censorship as damage and  routes around it.” That was when the topology of the Internet was highly  decentralized and there were hundreds of ISPs that competed with each  other to provide access. Given the information diet of the average  netizen today, the Internet is, for all practical purposes, highly  centralized and therefore governments find it easier and easier to  control.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency'&gt;https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-29T16:40:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2">
    <title>IANA Transition Stewardship &amp; ICANN Accountability (II)</title>
    <link>https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2</link>
    <description>
        &lt;b&gt;This paper is the second in a multi-part series, in which we provide an overview of submitted proposals and highlight areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussions and the processes established for transition plan have moved rapidly, though not fast enough—given the complicated legal and technical undertaking it is. ICG will be considering the submitted proposals and moving forward on consultations and recommendations for pending proposals. ICANN53 saw a lot of discussion on the implementation of the proposals from the numbers and protocols community, while the CWG addressed the questions related to the 2&lt;sup&gt;nd&lt;/sup&gt; draft of the names community proposal. The Protocol Parameters (IANA PLAN Working Group) submitted to ICG on 6 January 2015, while the Numbering Resources (CRISP Team) submitted on 15 January 2015. The Domain Names (CWG-Stewardship) submitted its second draft to ICG on 25 June 2015. The ICG had a face-to-face meeting in Buenos Aires and their proposal to transition the stewardship of the IANA functions is expected to be out for public comment July 31 to September 8, 2015. Parallelly, the CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015 and organised two working sessions at ICANN'53. More recently, the CCWG met in Paris focusing on the proposed community empowerment mechanisms, emerging concerns and progress on issues so far.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Number and Protocols Proposals&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The numbering and the protocol communities have developed and approved their plans for the transition. Both communities are proposing a direct contractual relationship with ICANN, in which they have the ability to end the contract on their terms. The termination clause has seen push back from ICANN and teams involved in the negotiations have revealed that ICANN has verbally represented that they will reject any proposed agreement in which ICANN is not deemed the sole source prime contractor for IANA functions in perpetuity.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The emerging contentious negotiations on the issue of separability i.e., the ability to change to a different IANA functions operator, is an important issue.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; As Milton Mueller points out, ICANN seems to be using these contract negotiations to undo the HYPERLINK "http://www.internetgovernance.org/2015/04/28/icann-wants-an-iana-functions-monopoly-and-its-willing-to-wreck-the-transition-process-to-get-it/#comment-40045"community process and that ICANN’s staff members are viewing themselves, rather than the formal IANA transition process shepherded by the ICG, as the final authority on the transition.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; The attempts of ICANN Staff to influence or veto ideas regarding what solutions will be acceptable to NTIA and the Congress goes beyond its mandate to facilitate the transition dialogue. The ARIN meeting&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and the process of updating MoU with IETF which mandates supplementary SLAs&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; are examples of ICANN leveraging its status as the incumbent IANA functions operator, with which all three operational communities must negotiate, to ensure that the outcome of the IANA transition process does not threaten its control.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Names Proposal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the CWG working on recommendations for the names related functions provided an improved 2nd draft of their earlier complex proposal which attempts to resolve the internal-external debate with a middle ground, with the creation of Post-Transition IANA (PTI). PTI a subsidiary/affiliate of the current contract-holder, ICANN, will be created and handed the IANA contract and its related technology and staff. Therefore, ICANN takes on the role of the contracting authority and PTI as the contracted party will perform the names-related IANA functions. &lt;b&gt;&lt;i&gt;Importantly, under the new proposal CWG has done away altogether with the requirement of “authorisation” to root zone changes and the reasons for this decision have not been provided.&lt;/i&gt;&lt;/b&gt; The proposal also calls for creation of a Customer Standing Committee (CSC) to continuously monitor the performance of IANA and creation a periodic review process, rooted in the community, with the ability to recommend ICANN relinquishing its role in names-related IANA functions, if necessary. A key concern area is the external oversight mechanism Multistakeholder Review Team– has been done away with. This is a significant departure from the version placed for public comment in December 2014. It is expected that clarification will be sought from the CWG on how it has factored in inputs from the first round of public comments.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Consensus around the CWG 2nd Draft&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is a growing consensus around the model proposed—the numbers community has commented on the proposal that it does "not foresee any incompatibility between the CWG's proposal”.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; On the IANA PLAN list, members of the protocols community have also expressed willingness to accept the new arrangement to keep all the IANA functions together in PTI during the transition and view this as merely a reorganization.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; However, acceptance of the proposal is pending till clarification related to how the PTI will be set up and its legal standing and scope are provided.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Structure of PTI&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Presently, two corporate forms are being considered for the PTI, a nonprofit public benefit corporation (PBC) or a limited liability corporation (LLC), with a single member, ICANN, at its outset. Milton Mueller has advocated for the incorporation of PTI as a PBC rather than as a LLC, with its board composed of a mix of insiders and outsiders.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; He is of the view that LLC form makes the implementation of PTI much more complex and risky as the CWG would need to debate mechanisms of control for the PTI as part of the transition process. &lt;b&gt;&lt;i&gt;The choice of structure is important as it will define the limitations and responsibilities that will be placed on the PTI Board—an important and necessary accountability mechanism.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the division of views is around selection of the Board Members that is if they should be chosen either by IANA's customers or representative groups within ICANN or solely by the Board. The degree of autonomy which the PTI has given the existing ICANN structure is also a key developing question. &lt;b&gt;&lt;i&gt;Debate on autonomy of PTI are broadly centered around two distinct views of PTI being incorporated in a different country, to prevent ICANN from slowly subsuming the organization. The other view endorsed by ICANN states that a high degree of autonomy risks creates additional bureaucracy and process for no discernible improvement in actual services.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Functional Separability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under the CWG-Stewardship draft proposal, ICANN would assume the role currently fulfilled by NTIA (overseeing the IANA function), while PTI would assume the role currently played by ICANN (the IANA functions operator). A divisive area here is that the goal of “functional separation” is defeated with PTI being structured as an “affiliate” wholly owned subsidiary, as it will be subject to management and policies of ICANN. From this view, while ICANN as the contracting party has the right of selecting future IANA functions operators, the legal and policy justification for this has not been provided. It is expected that ICANN'53 will see discussions around the PTI will focus on its composition, legal standing and applicability of the California law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Richard Hill is of the view that the details of how PTI would be set up is critical for understanding whether or not there is "real" separation between ICANN and PTI leading to the conclusion of a meaningful contract in the sense of an agreement between two separate entities.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; This functional separation and autonomy is granted by the combination of a legally binding contract, CSC oversight, periodic review and the possibility of non-renewal of the contract.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technical and policy roles - ICANN and PTI&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The creation of PTI splits the technical and policy functions between ICANN and PTI. The ICANN Board comments on CWG HYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"PrHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"oHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"posal also confirm PTI having no policy role, nor it being intended to in the future, and that while it will have control of the budget amounts ceded to it by ICANN the funding of the PTI will be provided by ICANN as part of the ICANN budgeting process.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; &lt;b&gt;The comments from the Indian government on the proposal&lt;/b&gt; &lt;b&gt;states this as an issue of concern, as it negates ICANN's present role as a merely technical coordination body. The concerns stem from placing ICANN in the role of the perpetual contracting authority for the IANA function makes ICANN the sole venue for decisions relating to naming policy as well as the entity with sole control over the PTI under the present wholly subsidiary entity.&lt;/b&gt;&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Key areas of work related to the distinction between the PTI and ICANN policy and technical functions include addressing how the new PFI Board would be structured, what its role would be, and what the legal construction between it and ICANN. The ICANN Board too has sought some important clarifications on its relationship as a parent body including areas where the PTI is separate from ICANN and areas where CWG sees shared services as being allowable (shared office space, HR, accounting, legal, payroll). It also sought clarification on the line of reporting, duties of the PTI Directors and alignment of PTI corporate governance with that of ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Swedish government has commented that the next steps in this process would be clarification of the process for designing the PTI-IANA contract, a process to establish community consent before entering the contract, explicit mention of whom the contracting parties are and what their legal responsibilities would be in relation to it.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internal vs External Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ICANN Board, pushing for an internal model of full control of IANA Functions is of the view that a more independent PTI could somehow be "captured" and used to thwart the policies developed by ICANN. However, others have pointed out that under proposed structure PTI has strong ties to ICANN community that implements the policies developed by ICANN.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; With no funding and no authority other than as a contractor of ICANN, if PTI is acting in a manner contrary to its contract it would be held in breach and could be replaced under the proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even so, as the Indian government has pointHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf"edHYPERLINK "http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf" out from the point of view of institutional architecture and accountability, this model is materially worse off than the status quo.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed PTI and ICANN relationship places complete reliance on internal accountability mechanisms within ICANN, which is not a prudent institutional design. &lt;b&gt;&lt;i&gt;The Indian government anticipates a situation where, in the event there is customer/ stakeholder dissatisfaction with ICANN’s role in naming policy development, there would be no mechanism to change the entity which fulfils this role. &lt;/i&gt;&lt;/b&gt;They feel that the earlier proposal for the creation of a Contract Co, a lightweight entity with the sole purpose of being the repository of contracting authority, and award contracts including the IANA Functions Contract provided a much more effective mechanism for external accountability. While the numbers and protocol communities have proposed a severable contractual relationship with ICANN for the performance of its SLAs no such mechanism exists with respect to ICANN's role in policy development for names.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Checks and Balances&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under the current proposal the Customer Standing Committee (CSC) has the role, of constantly reviewing the technical aspects of the naming function as performed by PTI. This, combined with the proposed periodic IANA Function Review (IFR), would act as a check on the PTI. The current draft proposal does not specify what will be the consequence of an unfavourable IANA Functions Review.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some other areas of focus going forward relate to the IFR team inclusion in ICANN bylaws along the lines of the AOC established in 2009.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; Also, ensuring the IFR team clarifies the scope of separability. The circumstances and procedures in place for pulling the IANA contract away if it has been established that ICANN is not fulfilling it contractual agreements. This will be a key accountability mechanism and deterrent for ICANN controlling the exercise of its influence.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CCWG Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Work Stream (WS1)&lt;/b&gt;: Responsible for drafting a mechanism for enhancing ICANN accountability, which must be in place before the IANA stewardship transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Work Stream (WS2)&lt;/b&gt;: Addressing long term accountability topics which may extend beyond the IANA Stewardship Transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IANA transition was recognized to be dependent on ICANN’s wider accountability, and this has exposed the trust issues between community and leadership and the proposal must be viewed in this context. The CCWG Draft Proposal attempts 4 significant new undertakings:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A. Restating ICANN’s Mission, Commitments, and Core Values, and placing those into the ICANN Bylaws. The CCWG has recommended that some segments of the Affirmation of Commitments (AOC)– a contract on operating principles agreed upon between ICANN and the United States government – be absorbed into the Corporation’s bylaws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;B. Establishing certain bylaws as “Fundamental Bylaws” &lt;b&gt;that cannot be altered by the ICANN&lt;/b&gt; Board acting unilaterally, but over which stakeholders have prior approval rights;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;C. Creating a &lt;b&gt;formal “membership” structure for ICANN&lt;/b&gt;, along with “community empowerment mechanisms”. Some of the community empowerment mechanisms including (a) remove individual Board members, (b) recall the entire Board, (c) veto or approve changes to the ICANN Bylaws, Mission Statement, Commitments, and Core Values; and (d) to veto Board decisions on ICANN’s Strategic Plan and its budget;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;D. &lt;b&gt;Enhancing and strengthening ICANN's Independent Review Process (IRP)&lt;/b&gt; by creating a standing IRP Panel empowered to review actions taken by the corporation for compliance both with stated procedures and with the Bylaws, and to issue decisions that are binding upon the ICANN Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key questions likely to be raised at ICANN 53 on several of these proposals will likely concern how these empowerment mechanisms affect the “legal nature” of the community.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Membership and Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the heart of the distrust between the ICANN Board and the community is the question of membership. ICANN as a corporation is a private sector body that is largely unregulated, with no natural competitors, cash-rich and directly or indirectly supports many of its participants and other Internet governance processes. Without effective accountability and transparency mechanisms, the opportunities for distortion, even corruption, are manifold. In such an environment, placing limitations on the Board’s power is critical to invoke trust. Three keys areas of accountability related to the Board include: no mechanisms for recall of individual board directors; the board’s ability to amend the company’s constitution (its bylaws), and the track record of board reconsideration requests.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With no membership, ICANN’s directors represent the end of the line in terms of accountability. While there is a formal mechanism to review board decisions, the review is conducted by a subset of the same people. The CCWG’s proposal to create SOs/ACs as unincorporated “members” with Articles of Association has met with a lot of discussion, especially in the Governmental Advisory Council (GAC).&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; The GAC has posed several critical questions on this set up, some of which are listed here:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Can a &lt;b&gt;&lt;i&gt;legal person created and acting on behalf of the GAC become a member of ICANN&lt;/i&gt;&lt;/b&gt;, even though the GAC does not appoint Board members?&lt;/li&gt;
&lt;li&gt;If GAC &lt;b&gt;&lt;i&gt;does not wish to become a member, how could it still be associated to the exercise of the 6 (community empowerment mechanisms) powers&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;It is still unclear what the &lt;b&gt;&lt;i&gt;liability of members &lt;/i&gt;&lt;/b&gt;of future “community empowered structures” would be.&lt;/li&gt;
&lt;li&gt;What are the &lt;b&gt;&lt;i&gt;legal implications on rights, obligations and liabilities of an informal group like the GAC&lt;/i&gt;&lt;/b&gt; creating an unincorporated association (UA) and taking decisions as such UA, from substantial (like exercising the community powers) to clerical (appointing its board, deciding on its financing) and whether there are implications when the members of such an UA are Governments? &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Any proposal to strengthen accountability of ICANN needs to provide for membership so that there is ability to remove directors, creates financial accountability by receiving financial accounts and appointing editors and can check the ICANN’s board power to change bylaws without recourse to a higher authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutional Undertaking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;David Post and Danielle Kehl have pointed out that the CCWG correctly identifies the task it is undertaking – to ensure that ICANN’s power is adequately and appropriately constrained – as a “constitutional” one.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Their interpretation is based on the view that even if ICANN is not a true “sovereign,” it can usefully be viewed as one for the purpose of evaluating the sufficiency of checks on its power. Subsequently, the CCWG Draft Proposal, and ICANN’s accountability post-transition, can be understood and analyzed as a constitutional exercise, and that the transition proposal should meet constitutional criteria. Further, from this view the CCWG draft reflects the reformulation of ICANN around the broadly agreed upon constitutional criteria that should be addressed. These include:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;A clear enumeration of the powers that the corporation can exercise, and a clear demarcation of those that it cannot exercise.&lt;/li&gt;
&lt;li&gt;A division of the institution’s powers, to avoid concentrating all powers in one set of hands, and as a means of providing internal checks on its exercise.&lt;/li&gt;
&lt;li&gt;Mechanism(s) to enforce the constraints of (1) and (2) in the form of meaningful remedies for violations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Their comments reflect that they support CCWG in their approach and progress made in designing a durable accountability structure for a post-transition ICANN. However, they have stressed that a number of important omissions and/or clarifications need to be addressed before they can be confident that these mechanisms will, in practice, accomplish their mission. One such suggestion relates to ICANN’s policy role and PTI technical role separability. Given ICANN’s position in the DNS hierarchy gives it the power to impose its policies, via the web of contracts with and among registries, registrars, and registrants, on all users of the DNS, a &lt;b&gt;&lt;i&gt;constitutional balance for the DNS must preserve and strengthen the separation between DNS policy-making and policy-implementation&lt;/i&gt;&lt;/b&gt;. Importantly, they have clarified that even if ICANN has the power to choose what policies are in the best interest of the community it is not free to impose them on the community. ICANN's role is a critical though narrow one: to organize and coordinate the activities of that stakeholder community – which it does through its various Supporting Organizations, Advisory Committees, and Constituencies – and to implement the consensus policies that emerge from that process. Their comments on the CCWG draft call for stating this clarification explicitly and institutionalizing separability to be guided by this critical safeguard against ICANN’s abuse of its power over the DNS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An &lt;b&gt;&lt;i&gt;effective implementation of this limitation will help clarify the role mechanisms being proposed such as the PTI and is critical for creating sustainable mechanisms, post-transition&lt;/i&gt;&lt;/b&gt;. More importantly, &lt;b&gt;&lt;i&gt;clarifying ICANN’s mission&lt;/i&gt;&lt;/b&gt; would ensure that in the post-transition &lt;b&gt;&lt;i&gt;communities could challenge its decisions&lt;/i&gt;&lt;/b&gt; on the basis that it is not pertaining to the role outlined or based on strengthening the stability and security of the DNS. Presently, it is very unclear where ICANN can interfere in terms of policymaking and implementation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Other Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Other issues expected to be raised in the context of ICANN's overall accountabiltiy will likey concern the following:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Strengthening financial transparency and oversight&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the rapid growth of the global domain name industry, one would imagine that ICANN is held up to the same standard of accountability as laid down in the right to information mechanisms countries such as India. CIS has been raising this issue for a while and has managed to received the list of ICANN’s current domain name revenues.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By sharing this information, ICANN has shown itself responsive to repeated requests for transparency however, the shared revenue data is only for the fiscal year ending June 2014, and historical revenue data is still not publicly available. Neither is a detailed list (current and historical) of ICANN’s expenditures publicly available. Accountability mechanisms and discussions must seek that ICANN provide the necessary information during its regular Quarterly Stakeholder Reports, as well as on its website.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Strengthening transparency&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A key area of concern is ICANN's unchecked influence and growing role as an institution in the IG space. Seen in the light of the impending transition, the transparency concerns gain significance and given ICANN's vocal interests in maintaining the status quo of its role in DNS Management. While financial statements (current and historic) are public and community discussions are generally open, the complexity of the contractual arrangements in place tracking the financial reserves available to ICANN through these processes are not sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, ICANN as a monopoly is presently constrained only by the NTIA review and few internal mechanisms like the Documentary Information Disclosure Policy (DIDP)&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;, Ombudsman&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;, Reconsideration and Independent Review&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; and the Accountability and Transparency Review (ATRT)&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. These mechanisms are facing teething issues and some do not conform to the principles of natural justice. For example, a Reconsideration Request can be filed if one is aggrieved by an action of ICANN’s Board or staff. Under ICANN’s By-laws, it is the Board Governance Committee, comprising ICANN Board members, that adjudicates Reconsideration Requests.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Responses to the DIDP requests filed by CIS reveal that the mechanism in its current form, is not sufficient to provide the transparency necessary for ICANN’s functioning. For instance, in the response to DIDP pertaining to the Ombudsman Requests&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;, ICANN cites confidentiality as a reason to decline providing information as making Ombudsman Requests public would violate ICANN Bylaws, toppling the independence and integrity of the Ombudsman. Over December ’14 and January ’15, CIS sent 10 DIDP requests to ICANN with an aim was to test and encourage discussions on transparency from ICANN. We have received responses for 9 of our requests, and in 7 of those responses ICANN provides very little new information and moving forward we would stress the improvements of existing mechanisms along with introduction of new oversight and reporting parameters towards facilitating the transition process.&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;John Sweeting and others, 'CRISP Process Overview' (ARIN 35, 2015) &lt;a href="https://regmedia.co.uk/2015/04/30/crisp_panel.pdf"&gt;https://regmedia.co.uk/2015/04/30/crisp_panel.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;Andrew Sullivan, &lt;i&gt;[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN&lt;/i&gt; (2015), Email &lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt;Milton Mueller, ‘ICANN WANTS AN IANA FUNCTIONS MONOPOLY – WILL IT WRECK THE TRANSITION PROCESS TO GET IT?’ (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 28 April 2015) http://www.internetgovernance.org/2015/04/28/icann-wants-an-iana-functions-monopoly-and-its-willing-to-wreck-the-transition-process-to-get-it/#comment-40045&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;Tony Smith, 'Event Wrap: ICANN 52' (&lt;i&gt;APNIC Blog&lt;/i&gt;, 20 February 2015) &lt;a href="http://blog.apnic.net/2015/02/20/event-wrap-icann-52/"&gt;http://blog.apnic.net/2015/02/20/event-wrap-icann-52/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;Internet Engineering Task Force, 'IPROC – IETF Protocol Registries Oversight Committee' (2015) &lt;a href="https://www.ietf.org/iana/iproc.html"&gt;https://www.ietf.org/iana/iproc.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt;Axel Pawlik, &lt;i&gt;Numbers Community Proposal Contact Points With CWG’S Draft IANA Stewardship Transition Proposal&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00003.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00003.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt;Jari Arkko, &lt;i&gt;Re: [Ianaplan] CWG Draft And Its Impact On The IETF&lt;/i&gt; (2015), Email &lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01843.html"&gt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01843.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt;Milton Mueller, &lt;i&gt;Comments Of The Internet Governance Project&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00021.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00021.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt;Richard Hill, &lt;i&gt;Initial Comments On CWG-Stewardship Draft Proposal&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00000.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00000.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt;Brenden Kuerbis, 'Why The Post-Transition IANA Should Be A Nonprofit Public Benefit Corporation' (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 18 May 2015) &lt;a href="http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonp"&gt;http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonp&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt;&lt;i&gt;ICANN Board Comments On 2Nd Draft Proposal Of The Cross Community Working Group To Develop An IANA Stewardship Transition Proposal On Naming Related Functions&lt;/i&gt; (20 May 2015) &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfrIUO5F9nY4.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt;&lt;i&gt;Comments Of Government Of India On The ‘2nd Draft Proposal Of The Cross Community Working Group To Develop An IANA Stewardship Transition Proposal On Naming Related Functions’&lt;/i&gt; (2015) &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt;Anders Hektor, &lt;i&gt;Sweden Comments To CWG-Stewardship&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00016.html"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/msg00016.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt;Brenden Kuerbis, 'Why The Post-Transition IANA Should Be A Nonprofit Public Benefit Corporation |' (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 18 May 2015) &lt;a href="http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonprofit-public-benefit-corporation/"&gt;http://www.internetgovernance.org/2015/05/18/why-the-post-transition-iana-should-be-a-nonprofit-public-benefit-corporation/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt;&lt;i&gt;Comments Of Government Of India On The ‘2nd Draft Proposal Of The Cross Community Working Group To Develop An IANA Stewardship Transition Proposal On Naming Related Functions’&lt;/i&gt; (2015) &lt;a href="http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf"&gt;http://forum.icann.org/lists/comments-cwg-stewardship-draft-proposal-22apr15/pdfJGK6yVohdU.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt;Kieren McCarthy, 'Internet Kingmakers Drop Ego, Devise Future Of DNS, IP Addys Etc' (&lt;i&gt;The Register&lt;/i&gt;, 24 April 2015) &lt;a href="http://www.theregister.co.uk/2015/04/24/internet_kingmakers_drop_ego_devise_future_of_the_internet/"&gt;http://www.theregister.co.uk/2015/04/24/internet_kingmakers_drop_ego_devise_future_of_the_internet/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt;Emily Taylor, &lt;i&gt;ICANN: Bridging The Trust Gap&lt;/i&gt; (Paper Series No. 9, Global Commission on Internet Governance March 2015) &lt;a href="https://regmedia.co.uk/2015/04/02/gcig_paper_no9-iana.pdf"&gt;https://regmedia.co.uk/2015/04/02/gcig_paper_no9-iana.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt;Milton Mueller, 'Power Shift: The CCWG’S ICANN Membership Proposal' (&lt;i&gt;Internet Governance Project&lt;/i&gt;, 4 June 2015) &lt;a href="http://www.internetgovernance.org/2015/06/04/power-shift-the-ccwgs-icann-membership-proposal/"&gt;http://www.internetgovernance.org/2015/06/04/power-shift-the-ccwgs-icann-membership-proposal/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt;David Post, &lt;i&gt;Submission Of Comments On CCWG Draft Initial Proposal&lt;/i&gt; (2015), Email &lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/msg00050.html"&gt;http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/msg00050.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Hariharan, 'ICANN reveals hitherto undisclosed details of domain names revenues', 8 December, 2014 See: &lt;a href="http://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;http://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; ICANN, Documentary Information Disclosure Policy See: https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; ICANN Accountability, Role of the Ombudsman https://www.icann.org/resources/pages/accountability/ombudsman-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; ICANN Reconsideration and independent review, ICANN Bylaws, Article IV, Accountability and Review https://www.icann.org/resources/pages/reconsideration-and-independent-review-icann-bylaws-article-iv-accountability-and-review&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; ICANN Accountability and Transparency Review Final Recommendations https://www.icann.org/en/system/files/files/final-recommendations-31dec13-en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; ICANN Bylaws Article iv, Section 2 https://www.icann.org/resources/pages/governance/bylaws-en#IV&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; ICANN Response to DIDP Ombudsman https://www.icann.org/resources/pages/20141228-1-ombudsman-2015-01-28-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Table of CIS DIDP Requests See: http://cis-india.org/internet-governance/blog/table-of-cis-didp-requests/at_download/file&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2'&gt;https://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-31T15:47:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india">
    <title>DesiSec: Cybersecurity and Civil Society in India</title>
    <link>https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india</link>
    <description>
        &lt;b&gt;As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet &amp; Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally the idea was to do 24 interviews with an array of international experts: Technical, political, policy, legal, and activist. The project was initiated at the University of Toronto and over time a possibility emerged. Why not shape these interviews into a documentary about cybersecurity and civil society? And why not focus on the world’s largest democracy, India? Whether in India or the rest of the world there are several issues that are fundamental to life online: Privacy, surveillance, anonymity and, free speech. DesiSec includes all of these, and it examines the legal frameworks that shape how India deals with these  challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the time it was shot till the final edit there has only been one change in the juridical topography: the dreaded 66A of the IT Act has been struck down. Otherwise, all else is in tact. DesiSec was produced by Purba Sarkar, shot and edited by Aaron Joseph, and directed by Oxblood Ruffin. It took our team from Bangalore to Delhi and, Dharamsala. We had the honour of interviewing: Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad. Everyone brought something special to the discussion and we are grateful for their insights. Also, we are particularly pleased to include the music of Charanjit Singh for the intro/outro of DesiSec. Mr. Singh is the inventor of acid house music, predating the Wikipedia entry for that category by five years. Someone should correct that.&lt;/p&gt;
&lt;p&gt;DesiSec is released under the Creative Commons License Attribution 3.0 Unported (CC by 3.0). You can watch it on Vimeo: &lt;a href="https://vimeo.com/123722680" target="_blank"&gt;https://vimeo.com/123722680&lt;/a&gt; or download it legally and free of charge via torrent. Feel free to show, remix, and share with your friends. And let us know what you think!&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/8N3JUqRRvys" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india'&gt;https://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Laird Brown</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-06-29T16:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1">
    <title>IANA Transition Stewardship &amp; ICANN Accountability (I)</title>
    <link>https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1</link>
    <description>
        &lt;b&gt;This paper is the first in a multi-part series, in which we provide a background to the IANA transition and updates on the ensuing processes. An attempt to familiarise people with the issues at stake, this paper will be followed by a second piece that provides an overview of submitted proposals and areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In developing these papers we have been guided by Kieren McCarthy's writings in The Register, Milton Mueller writings on the Internet Governance Project, Rafik Dammak emails on the mailings lists, the constitutional undertaking argument made in the policy paper authored by Danielle Kehl &amp;amp; David Post for New America Foundation.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The 53rd ICANN&lt;/b&gt; conference in Buenos Aires was pivotal as it marked the last general meeting before the IANA transition deadline on 30th September, 2015. The multistakeholder process initiated seeks communities to develop transition proposals to be consolidated and reviewed by the the IANA Stewardship Transition Coordination Group (ICG). The names, number and protocol communities convened at the conference to finalize the components of the transition proposal and to determine the way forward on the transition proposals. The Protocol Parameters (IANA PLAN Working Group) submitted to ICG on 6 January 2015, while the Numbering Resources (CRISP Team) submitted on 15 January 2015. The Domain Names (CWG-Stewardship) submitted its second draft to ICG on 25 June 2015. The ICG had a face-to-face meeting in Buenos Aires and their proposal to transition the stewardship of the IANA functions is expected to be out for public comment July 31 to September 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallelly, the CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015 and organised two working sessions at ICANN'53. More recently, the CCWG met in Paris focusing on the proposed community empowerment mechanisms, emerging concerns and progress on issues so far. &lt;b&gt;&lt;i&gt;CIS reserves its comments to the CCWG till the second round of comments expected in July.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This working paper explains the IANA Transition, its history and relevance to management of the Internet. It provides an update on the processes so far, including the submissions by the Indian government and highlights areas of concern that need attention going forward.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How is IANA Transition linked to DNS Management?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The IANA transition presents a significant opportunity for stakeholders to influence the management and governance of the global network. The Domain Name System (DNS), which allows users to locate websites by translating the domain name with corresponding Internet Protocol address, is critical to the functioning of the Internet. The DNS rests on the effective coordination of three critical functions—the allocation of IP Addresses (the numbers function), domain name allocation (the naming function), and protocol parameters standardisation (the protocols function).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;History of the ICANN-IANA Functions contract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Initially, these key functions were performed by individuals and public and private institutions. They either came together voluntarily or through a series of agreements and contracts brokered by the Department of Commerce’s National Telecommunications and Information Administration (NTIA) and funded by the US government. With the Internet's rapid expansion and in response to concerns raised about its increasing commercialization as a resource, a need was felt for the creation of a formal institution that would take over DNS management. This is how ICANN, a California-based private, non-profit technical coordination body, came at the helm of DNS and related issues. Since then, ICANN has been performing the Internet Assigned Numbers Authority (IANA) functions under a contract with the NTIA, and is commonly referred to as the IANA Functions Operator.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;IANA Functions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In February 2000, the NTIA entered into the first stand-alone IANA Functions HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/sf_26_pg_1-2-final_award_and_sacs.pdf"contract&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; with ICANN as the Operator. While the contractual obligations have evolved over time, these are largely administrative and technical in nature including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(1) the coordination of the assignment of technical Internet protocol parameters;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) the allocation of Internet numbering resources; and&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) the administration of certain responsibilities associated with the Internet DNS root zone management;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) other services related to the management of the ARPA and top-level domains.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been performing the IANA functions under this oversight, primarily as NTIA did not want to let go of complete control of DNS management. Another reason was to ensure NTIA's leverage in ensuring that ICANN’s commitments, conditional to its incorporation, were being met and that it was sticking to its administrative and technical role.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Root Zone Management—Entities and Functions Involved&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NTIA' s involvement has been controversial particularly in reference to the Root Zone Management function, which allows allows for changes to the&lt;a href="http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf"&gt; &lt;/a&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf"&gt;HYPERLINK "http://www.internetsociety.org/sites/default/files/The Internet Domain Name System Explained for Non-Experts (ENGLISH).pdf"&lt;/a&gt;highest level of the DNS namespace&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; by updating the databases that represent that namespace. DNS namespace is defined to be the set of names known as top-level domain names or TLDs which may be at the country level (ccTLDs or generic (gTLDs). This&lt;a href="https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&gt; &lt;/a&gt;&lt;a href="https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&gt;HYPERLINK "https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&lt;/a&gt;function to maintain the Root was split into two parts&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;—with two separate procurements and two separate contracts. The operational contract for the Primary (“A”) Root Server was awarded to VeriSign, the IANA Functions Contract—was awarded to ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These contracts created contractual obligations for ICANN as IANA Root Zone Management Function Operator, in co-operation with Verisign as the Root Zone Maintainer and NTIA as the Root Zone Administrator whose authorisation is explicitly required for any requests to be implemented in the root zone. Under this contract, ICANN had responsibility for the technical functions for all three communities under the IANA Functions contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN also had policy making functions for the names community such as developing&lt;a href="https://www.iana.org/domains/root/files"&gt; &lt;/a&gt;&lt;a href="https://www.iana.org/domains/root/files"&gt;HYPERLINK "https://www.iana.org/domains/root/files"&lt;/a&gt;rules and procedures and policies under &lt;a href="https://www.iana.org/domains/root/files"&gt;HYPERLINK "https://www.iana.org/domains/root/files"&lt;/a&gt;which any changes to the Root Zone File&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; were to be proposed, including the policies for adding new TLDs to the system. The policy making of numbers and protocols is with IETF and RIRs respectively.&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&lt;/a&gt;NTIA role in root zone management&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; is clerical and judgment free with regards to content. It authorizes implementation of requests after verifying whether procedures and policies are being followed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This contract was subject to extension by mutual agreement and failure of complying with predefined commitments could result in the re-opening of the contract to another entity through a Request For Proposal (RFP). In fact, in 2011&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;NTIA issued a RFP pursuant to ICANN&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;'&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;s Conflict of Interest Policy.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why is this oversight needed?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The role of the Administrator becomes critical for ensuring the security and operation of the Internet with the Root Zone serving as the directory of critical resources. In December 2014,&lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt; &lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt;HYPERLINK "http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&lt;/a&gt;a report revealed 300 incidents of internal security breaches&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; some of which were related to the Centralized Zone Data System (CZDS) – where the internet core root zone files are mirrored and the WHOIS portal. In view of the IANA transition and given ICANN's critical role in maintaining the Internet infrastructure, the question which arises is if NTIA will let go of its Administrator role then which body should succeed it?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transition announcement and launch of process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 14 March 2014, the NTIA &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;announced&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; “&lt;i&gt;its intent to transition key Internet domain name functions to the global multistakeholder community”&lt;/i&gt;. These key Internet domain name functions refer to the IANA functions. For this purpose, the NTIA&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;asked&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; the Internet Corporation for Assigned Names and Numbers (ICANN) to convene a global multistakeholder process to develop a transition proposal which has broad community support and addresses the following four principles:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The transition process has been split according to the three main communities naming, numbers and protocols.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Structure of the Transition Processes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN performs both technical functions and policy-making functions. The technical functions are known as IANA functions and these are performed by ICANN are for all three communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.&lt;i&gt; Naming function:&lt;/i&gt;&lt;/b&gt; ICANN performs &lt;b&gt;&lt;i&gt;technical and policy-making&lt;/i&gt;&lt;/b&gt; for the names community. The technical functions are known as IANA functions and the policy-making functions relates to their role in deciding whether .xxx or .sucks should be allowed amongst other issues. There are two parallel streams of work focusing on the naming community that are crucial to completing the transition. The first, &lt;b&gt;&lt;i&gt;Cross-Community Working Group to Develop an IANA Stewardship Transition Proposal on Naming Related Functions &lt;/i&gt;&lt;/b&gt;will enable NTIA to transition out of its role in the DNS. Therefore, accountability of IANA functions is the responsibility of the CWG and accountability of policy-making functions is outside its scope. CWG has submitted its second draft to the ICG.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second, &lt;b&gt;&lt;i&gt;Cross-Community Working Group on Accountability (CCWG-Accountability)&lt;/i&gt;&lt;/b&gt; is identifying necessary reforms to ICANN’s bylaws and processes to enhance the organization’s accountability to the global community post-transition. Therefore accountability of IANA functions is outside the scope of the CCWG. The CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.&lt;i&gt; Numbers function:&lt;/i&gt;&lt;/b&gt; ICANN performs only technical functions for the numbers community. The policy-making functions for numbers are performed by RIRs. CRISP is focusing on the IANA functions for numbers and has submitted their proposal to the ICG earlier this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.&lt;i&gt; Protocols function:&lt;/i&gt;&lt;/b&gt; ICANN performs only technical functions for the protocols community. The policy-making functions for protocols are performed by IETF. IETF-WG is focusing on the IANA functions for protocols and has submitted their proposal to the ICG earlier this year.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Role of ICG&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After receiving the proposals from all three communities the ICG must combine these proposals into a consolidated transition proposal and then seek public comment on all aspects of the plan. ICG’s role is crucial, because it must build a public record for the NTIA on how the three customer group submissions tie together in a manner that ensures NTIA’s&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;criteria&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; are met and institutionalized over the long term. Further, ICG's final submission to NTIA must include a plan to enhance ICANN’s accountability based on the CCWG-Accountability proposal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA Leverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Reprocurement of the IANA contract is &lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;essential for ICANN&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;'&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;s&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt; legitimacy&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; in the DNS ecosystem and the authority to reopen the contract and in keeping the policy and operational functions separate meant that, NTIA could simply direct VeriSign to follow policy directives being issued from the entity replacing ICANN if they were deemed to be not complying. This worked as an effective leverage for ICANN complying to their commitments even if it is difficult to determine how this oversight was exercised. Perceptually, this has been interpreted as a broad overreach particularly, in the context of issues of sovereignty associated with ccTLDs and the gTLDs in their influence in shaping markets. However, it is important to bear in mind that the NTIA authorization comes after the operator, ICANN—has validated the request and does not deal with the substance of the request rather focuses merely on compliance with outlined procedure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA's role in the transition process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NTIA in its&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&lt;/a&gt;Second Quarterly Report to the Congress&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; for the period of February 1-March 31, 2015 has outlined some clarifications on the process ahead. It confirmed the flexibility of extending the contract or reducing the time period for renewal, based on community decision. The report also specified that the NTIA would consider a proposal only if it has been developed in consultation with the multi-stakeholder community. The transition proposal should have broad community support and does not seek replacement of NTIA's role with a government-led or intergovernmental organization solution. Further the proposal should maintain security, stability, and resiliency of the DNS, the openness of the Internet and must meet the needs and expectations of the global customers and partners of the IANA services. NTIA will only review a comprehensive plan that includes all these elements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the communities develop and ICG submits a consolidated proposal, NTIA will ensure that the proposal has been adequately “stress tested” to ensure the continued stability and security of the DNS. NTIA also added that any proposed processes or structures that have been tested to see if they work, prior to the submission—will be taken into consideration in NTIA's review. The report clarified that NTIA will review and assess the changes made or proposed to enhance ICANN’s accountability before initiating the transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to ICANN'53, Lawrence E. Strickling Assistant Secretary for Communications and Information and NTIA Administrator HYPERLINK "http://www.ntia.doc.gov/blog/2015/stakeholder-proposals-come-together-icann-meeting-argentina"has posed some questions for consideration&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; by the communities prior to the completion of the transition plan. The issues and questions related to CCWG-Accountability draft are outlined below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Proposed &lt;b&gt;&lt;i&gt;new or modified community empowerment tools—&lt;/i&gt;&lt;/b&gt;how can the CCWG ensure that the creation of new organizations or tools will not interfere with the security and stability of the DNS during and after the transition? Do these new committees and structures &lt;b&gt;&lt;i&gt;create a different set of accountability questions&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;Proposed membership model for community empowerment—have &lt;b&gt;&lt;i&gt;other possible models&lt;/i&gt;&lt;/b&gt; been thoroughly examined, detailed, and documented? Has CCWG designed stress tests of the various models to address how the multistakeholder model is preserved &lt;b&gt;&lt;i&gt;if individual ICANN Supporting Organizations and Advisory Committees opt out&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;Has CCWG developed stress tests to address the &lt;b&gt;&lt;i&gt;potential risk of capture and barriers to entry for new participants&lt;/i&gt;&lt;/b&gt; of the various models? Further, have stress tests been considered to address &lt;b&gt;&lt;i&gt;potential unintended consequences of “operationalizing” groups&lt;/i&gt;&lt;/b&gt; that to date have been advisory in nature?&lt;/li&gt;
&lt;li&gt;Suggestions on improvements to the current Independent Review Panel (IRP) that has been criticized for its lack of accountability—how does the CCWG proposal &lt;b&gt;&lt;i&gt;analyze and remedy existing concerns with the IRP&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;In designing a plan for improved accountability, should the CCWG consider what exactly is the &lt;b&gt;&lt;i&gt;role of the ICANN Board within the multistakeholder model&lt;/i&gt;&lt;/b&gt;? Should the &lt;b&gt;&lt;i&gt;standard for Board action&lt;/i&gt;&lt;/b&gt; be to confirm that the community has reached consensus, and if so, what &lt;b&gt;&lt;i&gt;accountability mechanisms are needed&lt;/i&gt;&lt;/b&gt; to ensure the Board operates in accordance with that standard?&lt;/li&gt;
&lt;li&gt;The proposal is primarily focused on the accountability of the ICANN Board—has the CCWG considered &lt;b&gt;&lt;i&gt;accountability improvements&lt;/i&gt;&lt;/b&gt; that would apply to &lt;b&gt;&lt;i&gt;ICANN management and staff or to the various ICANN Supporting Organizations and Advisory Committees&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;NTIA has also asked the CCWG to &lt;b&gt;&lt;i&gt;build a public record and thoroughly document&lt;/i&gt;&lt;/b&gt; how the NTIA criteria have been met and will be maintained in the future.&lt;/li&gt;
&lt;li&gt;Has the CCWG identified and &lt;b&gt;&lt;i&gt;addressed issues of implementation &lt;/i&gt;&lt;/b&gt;so that the community and ICANN can implement the plan as expeditiously as possible once NTIA has reviewed and accepted it.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;NTIA has also sought community’s input on timing to finalize and implement the transition plan if it were approved. The Buenos Aires meeting became a crucial point in the transtion process as following the meeting, NTIA will need to make a determination on extending its current contract with ICANN. Keeping in mind that the community and ICANN will need to implement all work items identified by the ICG and the Working Group on Accountability as prerequisites for the transition before the contract can end, the community’s input is critical.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA's legal standing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 25th February, 2015 the US Senate Committee on Commerce, Science &amp;amp; Transportation on 'Preserving the Multi-stakeholder Model of Internet Governance'&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; heard from NTIA head Larry Strickling, Ambassador Gross and Fadi Chehade. The hearing sought to plug any existing legal loopholes, and tighten its administrative, technical, financial, public policy, and political oversight over the entire process no matter which entity takes up the NTIA function. The most important takeaway from this Congressional hearing came from Larry Strickling’s testimony&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; who stated that NTIA has no legal or statutory responsibility to manage the DNS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If &lt;b&gt;&lt;i&gt;the NTIA does not have the legal responsibility to act, and its role was temporary; on what basis is the NTIA driving the current IANA Transition process without the requisite legal authority or Congressional mandate?&lt;/i&gt;&lt;/b&gt; Historically, the NTIA oversight, effectively devised as a leverage for ICANN fulfilling its commitments have not been open to discussion.&lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&gt; &lt;/a&gt;&lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&gt;HYPERLINK "http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&lt;/a&gt;Concerns have also been raised&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; on the lack of engagement with non-US governments, organizations and persons prior to initiating or defining the scope and conditions of the transition. Therefore, any IANA transition plan must consider this lack of consultation, develop a multi-stakeholder process as the way forward—even if the NTIA wants to approve the final transition plan.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Need to strengthen Diversity Principle&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following submissions by various stakeholders raising concerns regarding developing world participation, representation and lack of multilingualism in the transition process—the Diversity Principle was included by ICANN in the Revised Proposal of 6 June 2014. Given that representatives from developing countries as well as from stakeholder communities outside of the ICANN community are unable to productively involve themselves in such processes because of lack of multilingualism or unfamiliarity with its way of functioning merely mentioning diversity as a principle is not adequate to ensure abundant participation. As CIS has pointed out&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; before issues have been raised about the domination by North American or European entities which results in undemocratic, unrepresentative and non-transparent decision-making in such processes. Accordingly, all the discussions in the process should be translated into multiple native languages of participants in situ, so that everyone participating in the process can understand what is going on. Adequate time must be given for the discussion issues to be translated and circulated widely amongst all stakeholders of the world, before a decision is taken or a proposal is framed. This was a concern raised in the recent CCWG proposal which was extended as many communities did not have translated texts or adequate time to participate.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Representation of the global multistakeholder community in ICG&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, the Co-ordination Group includes representatives from ALAC, ASO, ccNSO, GNSO, gTLD registries, GAC, ICC/BASIS, IAB, IETF, ISOC, NRO, RSSAC and SSAC. Most of these representatives belong to the ICANN community, and is not representative of the global multistakeholder community including governments. This is not representative of even a multistakeholder model which the US &lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;g&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;ov&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;ernment &lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;has announced&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; for the transition; nor in the multistakeholder participation spirit of NETmundial. Adequate number of seats on the Committee must be granted to each stakeholder so that they can each coordinate discussions within their own communities and ensure wider and more inclusive participation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;ICANN's role in the transition process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Another issue of concern in the pre-transition process has been ICANN having been charged with facilitating this transition process. This decision calls to question the legitimacy of the process given that the suggestions from the proposals envision a more permanent role for ICANN in DNS management. As Kieren McCarthy has pointed out &lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;ICANN has taken several steps to retain the balance of power in managing these functions which have seen considerable pushback from the community. These include an attempt to control the process by announcing two separate processes&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; – one looking into the IANA transition, and a second at its own accountability improvements – while insisting the two were not related. That effort was beaten down&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; after an unprecedented letter by the leaders of every one of ICANN's supporting organizations and advisory committees that said the two processes must be connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, ICANN was accused of stacking the deck&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; by purposefully excluding groups skeptical of ICANN’s efforts, and by trying to give ICANN's chairman the right to personally select the members of the group that would decide the final proposal. That was also beaten back. ICANN staff also produced a "scoping document"&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;, that pre-empt any discussion of structural separation and once again community pushback forced a backtrack.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These concerns garner more urgency given recent developments with the community working &lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;HYPERLINK "http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&lt;/a&gt;groups&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; and ICANN divisive view of the long-term role of ICANN in DNS management. Further, given HYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164"ICANNHYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164" HYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164"President Chehade’s comments that the CWG is not doing its job&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;, is populated with people who do not know anything and the “IANA process needs to be left alone as much as possible”. Fadi also specified that ICANN had begun the formal process of initiating a direct contract with VeriSign to request and authorise changes to be implemented by VeriSign. &lt;b&gt;&lt;i&gt;While ICANN may see itself without oversight in this relationship with VeriSign, it is imperative that proposals bear this plausible outcome in mind and put forth suggestions to counter this.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The&lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt; &lt;/a&gt;&lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;HYPERLINK "http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&lt;/a&gt;update from IETF on the ongoing negotiation with ICANN on their proposal&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; related to protocol parameters has also flagged that ICANN is unwilling to cede to any text which would suggest ICANN relinquishing its role in the operations of protocol parameters to a subsequent operator, should the circumstances demand this. ICANN has stated that agreeing to such text now would possibly put them in breach of their existing agreement with the NTIA. Finally,&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;HYPERLINK "https://twitter.com/arunmsukumar/status/603952197186035712"&lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;ICANN &lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;HYPERLINK "https://twitter.com/arunmsukumar/status/603952197186035712"&lt;/a&gt;Board Member, Markus Kummer&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; stated that if ICANN was to not approve any aspect of the proposal this would hinder the consensus and therefore, the transition would not be able to move forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been designated the convenor role by the US government on basis of its unique position as the current IANA functions contractor and the global coordinator for the DNS. However it is this unique position itself which creates a conflict of interest as in the role of contractor of IANA functions, ICANN has an interest in the outcome of the process being conducive to ICANN. In other words, there exists a potential for abuse of the process by ICANN, which may tend to steer the process towards an outcome favourable to itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Therefore there exists a strong rationale for defining the limitations of the role of ICANN as convenor.&lt;/i&gt;&lt;/b&gt; The community has suggested that ICANN should limit its role to merely facilitating discussions and not extend it to reviewing or commenting on emerging proposals from the process. Additional safeguards need to be put in place to avoid conflicts of interest or appearance of conflicts of interest. ICANN should further not compile comments on drafts to create a revised draft at any stage of the process. Additionally, ICANN staff must not be allowed to be a part of any group or committee which facilitates or co-ordinates the discussion regarding IANA transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How is the Obama Administration and the US Congress playing this?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Even as the issues of separation of ICANN's policy and administrative role remained unsettled, in the wake of the Snowden revelations, NTIA initiated the long due transition of the IANA contract oversight to a global, private, non-governmental multi-stakeholder institution on March 14, 2014. This announcement immediately raised questions from Congress on whether the transition decision was dictated by technical considerations or in response to political motives, and if the Obama Administration had the authority to commence such a transition unilaterally, without prior open stakeholder consultations. Republican&lt;a href="http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&gt; &lt;/a&gt;&lt;a href="http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&gt;HYPERLINK "http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&lt;/a&gt;lawmakers have raised concerns about the IANA transition plan &lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;worried that it may allow other countries to capture control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More recently,&lt;a href="https://www.congress.gov/bill/114th-congress/house-bill/2251"&gt; &lt;/a&gt;&lt;a href="https://www.congress.gov/bill/114th-congress/house-bill/2251"&gt;HYPERLINK "https://www.congress.gov/bill/114th-congress/house-bill/2251"&lt;/a&gt;Defending Internet Freedom Act&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; has been re-introduced to US Congress. This bill seeks ICANN adopt the recommendations of three internet community groups, about the transition of power, before the US government relinquishes control of the IANA contract. The bill also seeks ownership of the .gov and .mil top-level domains be granted to US government and that ICANN submit itself to the US Freedom of Information Act (FOIA), a legislation similar to the RTI in India, so that its records and other information gain some degree of public access.It has also been asserted by ICANN that neither NTIA nor the US Congress will approve any transition plan which leaves open the possibility of non-US IANA Functions Operator in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Funding of the transition&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Obama administration is also&lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt; &lt;/a&gt;&lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt;HYPERLINK "http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&lt;/a&gt;fighting a Republican-backed Commerce, Justice, Science, and &lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt;HYPERLINK "http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&lt;/a&gt;Related Agencies Appropriations Act (H.R. 2578)&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; which seeks to block NTIA funding the IANA transition. One provision of this bill restricts NTIA from using appropriated dollars for IANA stewardship transition till the end of the fiscal year, September 30, 2015 also the base period of the contact in function. This peculiar proviso in the Omnibus spending bill actually implies that Congress believes that the IANA Transition should be delayed with proper deliberation, and not be rushed as ICANN and NTIA are inclined to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IANA Transition cannot take place in violation of US Federal Law that has defunded it within a stipulated time-window. At the Congressional Internet Caucus in January 2015, NTIA head Lawrence Strickling clarified that NTIA will “not use appropriated funds to terminate the IANA functions...” or “to amend the cooperative agreement with Verisign to eliminate NTIA's role in approving changes to the authoritative root zone file...”. This implicitly establishes that the IANA contract will be extended, and Strickling confirmed that there was no hard deadline for the transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DOTCOM Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Communications and Technology Subcommittee of the House Energy and Commerce Committee&lt;a href="http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&gt; &lt;/a&gt;&lt;a href="http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&gt;HYPERLINK "http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&lt;/a&gt;amended the DOTCOM Act&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;, a bill which, in earlier drafts, would have halted the IANA functions transition process for up to a year pending US Congressional approval. The bill in its earlier version represented unilateral governmental interference in the multistakeholder process. The new bill reflects a much deeper understanding of, and confidence in, the significant amount of work that the global multistakeholder community has undertaken in planning both for the transition of IANA functions oversight and for the increased accountability of ICANN. The amended DOTCOM Act would call for the NTIA to certify – as a part of a proposed GAO report on the transition – that &lt;i&gt;“the required changes to ICANN’s by-laws contained in the final report of ICANN’s Cross Community Working Group on Enhancing ICANN Accountability and the changes to ICANN’s bylaws required by ICANN’s IANA have been implemented.” &lt;/i&gt;The bill enjoys immense bipartisan support&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;, and is being lauded as a prudent and necessary step for ensuring the success of the IANA transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; IANA Functions Contract &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/sf_26_pg_1-2-final_award_and_sacs.pdf&amp;gt; accessed 15th June 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Daniel Karrenberg, The Internet Domain Name System Explained For Nonexperts &amp;lt;http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf&amp;gt; accessed 15 June 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; David Post and Danielle Kehl, Controlling Internet Infrastructure The “IANA Transition” And Why It Matters For The Future Of The Internet, Part I (1st edn, Open Technology Institute 2015) &amp;lt;https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Iana.org, 'IANA — Root Files' (2015) &amp;lt;https://www.iana.org/domains/root/files&amp;gt; accessed 11 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; 'NTIA's Role In Root Zone Management' (2014). &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;i&gt;Contract&lt;/i&gt; ( 2011) &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Kieren McCarthy, 'Confidential Information Exposed Over 300 Times In ICANN Security Snafu' &lt;i&gt;The Register&lt;/i&gt; (2015) &amp;lt;http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; David Post and Danielle Kehl, &lt;i&gt;Controlling Internet Infrastructure The “IANA Transition” And Why It Matters For The Future Of The Internet, Part I&lt;/i&gt; (1st edn, Open Technology Institute 2015) &amp;lt;https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; National Telecommunications and Information Administration, 'REPORT ON THE TRANSITION OF THE STEWARDSHIP OF THE INTERNET ASSIGNED NUMBERS AUTHORITY (IANA) FUNCTIONS' (NTIA 2015) &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf&amp;gt; accessed 10 July 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Lawrence Strickling, 'Stakeholder Proposals To Come Together At ICANN Meeting In Argentina' &amp;lt;http://www.ntia.doc.gov/blog/2015/stakeholder-proposals-come-together-icann-meeting-argentina&amp;gt; accessed 19 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Philip Corwin, 'NTIA Says Cromnibus Bars IANA Transition During Current Contract Term' &amp;lt;http://www.circleid.com/posts/20150127_ntia_cromnibus_bars_iana_transition_during_current_contract_term/&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Sophia Bekele, '"No Legal Basis For IANA Transition": A Post-Mortem Analysis Of Senate Committee Hearing' &amp;lt;http://www.circleid.com/posts/20150309_no_legal_basis_for_iana_transition_post_mortem_senate_hearing/&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt;&lt;i&gt; Comments On The IANA Transition And ICANN Accountability Just Net Coalition&lt;/i&gt; (2015) &amp;lt;http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; The Centre for Internet and Society, 'IANA Transition: Suggestions For Process Design' (2014) &amp;lt;http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; The Centre for Internet and Society, 'IANA Transition: Suggestions For Process Design' (2014) &amp;lt;http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Kieren McCarthy, 'Let It Go, Let It Go: How Global DNS Could Survive In The Frozen Lands Outside US Control Public Comments On Revised IANA Transition Plan' &lt;i&gt;The Register&lt;/i&gt; (2015) &amp;lt;http://www.theregister.co.uk/2015/05/26/iana_icann_latest/&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Icann.org, 'Resources - ICANN' (2014) &amp;lt;https://www.icann.org/resources/pages/process-next-steps-2014-08-14-en&amp;gt; accessed 13 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &amp;lt;https://www.icann.org/en/system/files/correspondence/crocker-chehade-to-soac-et-al-18sep14-en.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Richard Forno, '[Infowarrior] - Internet Power Grab: The Duplicity Of ICANN' (&lt;i&gt;Mail-archive.com&lt;/i&gt;, 2015) &amp;lt;https://www.mail-archive.com/infowarrior@attrition.org/msg12578.html&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; ICANN, 'Scoping Document' (2014) &amp;lt;https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Milton Mueller, 'ICANN: Anything That Doesn’T Give IANA To Me Is Out Of Scope |' (&lt;i&gt;Internetgovernance.org&lt;/i&gt;, 2014) &amp;lt;http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Andrew Sullivan, '[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN' (&lt;i&gt;Ietf.org&lt;/i&gt;, 2015) &amp;lt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&amp;gt; accessed 14 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;DNA Member Breakfast With Fadi Chehadé (2015-02-11)&lt;/i&gt; (The Domain Name Association 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Andrew Sullivan, '[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN' (&lt;i&gt;Ietf.org&lt;/i&gt;, 2015) &amp;lt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&amp;gt; accessed 14 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Mobile.twitter.com, 'Twitter' (2015) &amp;lt;https://mobile.twitter.com/arunmsukumar/status/603952197186035712&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Alina Selyukh, 'U.S. Plan To Cede Internet Domain Control On Track: ICANN Head' &lt;i&gt;Reuters&lt;/i&gt; (2015) &amp;lt;http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; 114th Congress, 'H.R.2251 - Defending Internet Freedom Act Of 2015' (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; John Eggerton, 'House Bill Blocks Internet Naming Oversight Handoff: White House Opposes Legislation' &lt;i&gt;Broadcasting &amp;amp; Cable&lt;/i&gt; (2015) &amp;lt;http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; &lt;i&gt;Communications And Technology Subcommittee Vote On The DOTCOM Act&lt;/i&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Timothy Wilt, 'DOTCOM Act Breezes Through Committee' &lt;i&gt;Digital Liberty&lt;/i&gt; (2015) &amp;lt;http://www.digitalliberty.net/dotcom-act-breezes-committee-a319&amp;gt; accessed 22 June 2015.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1'&gt;https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2015-07-31T14:56:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day">
    <title>The I-MACX Summit &amp; Demo Day (Spring 2015)</title>
    <link>https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day</link>
    <description>
        &lt;b&gt;IIIT-B Innovation Center organized this event in Bangalore on June 18, 2015. Sunil Abraham participated as a speaker.&lt;/b&gt;
        &lt;h3&gt;Programme&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Agenda&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.00 p.m.&lt;/td&gt;
&lt;td&gt;Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.15 p.m.&lt;/td&gt;
&lt;td&gt;Welcome Address&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.30 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Keynote: “Solving Civic Issues through Technology Platforms” by&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Pramod Varma, &lt;i&gt;Chief Architect – Technology, UIDAI&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.50 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Panel Discussion: “Opportunities and Challenges in Civic-Tech Startup Space”&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms. Radha Kizhanattam, Principal – Unitus Seed Fund&lt;/li&gt;
&lt;li&gt;Mr. Shyam Menon, Co-founder – Infuse Ventures&lt;/li&gt;
&lt;li&gt;Mr. Sunil Abraham, Executive Director – The Center for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Mr. Rajith Shaji, Product Manager – Janaagraha&lt;/li&gt;
&lt;li&gt;Mr. VS Prakash, Director – Karnataka State Natural Disasters&lt;/li&gt;
&lt;li&gt;Monitoring Center (Retd.); Currently Registrar – IIIT Bangalore&lt;/li&gt;
&lt;li&gt;Mr. Syed Suhale Perveez, Senior Manager – Emergency Management Research Institute (108)&lt;/li&gt;
&lt;li&gt;Moderated by Dr. TK Srikanth, Professor – IIIT Bangalore&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.45 p.m.&lt;/td&gt;
&lt;td&gt;Startups Pitch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.55 p.m.&lt;/td&gt;
&lt;td&gt;Vote of Thanks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Investors – Startups discuss over High Tea&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Startups demonstrate their innovative solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;About the Summit:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The I-MACX Summit is a civic-tech focused event that intends to bring together innovators from government and social organizations along with civic-minded startups, influencers, activists, investors and entrepreneurs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The I-MACX Summit aims to not only bring out the opportunities and the challenges in the civictech space, but also showcase the offerings that are being created by the civic-tech startups nurtured at IIIT-B Innovation Center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The I-MACX Summit, envisions itself as a thought-leadership forum that would delve into how the various players in the civic-tech ecosystem could potentially transform governance and society, using the emerging technologies (IOT, Data Analytics, Sensors, Mobile, Cloud).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day'&gt;https://cis-india.org/internet-governance/news/icmax-summit-and-demo-day&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-23T09:37:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation">
    <title>Panel Discussion on Internet Intermediaries, Law and Innovation</title>
    <link>https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation</link>
    <description>
        &lt;b&gt;CII, Google and Centre For Communications Governance, NLU Delhi hosted a panel discussion on June 2 in New Delhi. Jyoti Panday attended.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) participated in the panel discussion on 'Internet Intermediaries, Law and Innovation' hosted by CII, Google and Centre For Communications Governance, NLU Delhi. The panel discussed the impact of the existing provisions on intermediary liability and innovation and sought suggestions and the way forward.&lt;br /&gt;&lt;br /&gt;The panel was moderated by Dr Subho Ray, President, IAMAI&lt;br /&gt;&lt;br /&gt;Other panelists included:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Mr Anupam Chander, Eminent Global Lawyer &amp;amp; Academician&lt;/li&gt;
&lt;li&gt; Mr Apar Gupta, Advocate&lt;/li&gt;
&lt;li&gt; Ms Mishi Choudhary, Founding Director , Software Freedom Law Centre&lt;/li&gt;
&lt;li&gt; Mr J Sai Deepak, Associate Partner, Litigation Team, Saikrishna &amp;amp; Associates&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Mr Indranil Choudhury, Founder and CEO, Lexplosion&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-intermediaries-law-and-innovation-panel.odp" class="internal-link"&gt;Click to download the presentation.&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation'&gt;https://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2015-06-14T16:37:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked">
    <title>Can Uber, Ola apps be blocked? Govt fighting cyber odds</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked</link>
    <description>
        &lt;b&gt;The Delhi government is trying to block taxi hailing apps like Uber and Ola Cabs, but is it really possible?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Siladitya Ray published in the &lt;a class="external-link" href="http://www.hindustantimes.com/technology-topstories/can-the-uber-ola-apps-be-blocked/article1-1354921.aspx"&gt;Hindustan Times&lt;/a&gt; on June 4, 2015 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Taxi aggregators are in the firing line over passenger safety again  after a 21-year-old Delhi woman alleged she was molested by a driver in  an Uber cab near Gurgaon on Saturday morning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The allegation came just six months after a 25-year-old financial  analyst was allegedly raped in an Uber cab in Delhi, over which the  victim took the cab aggregator's parent company to court in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following an order from the Delhi government, the Department of  Telecommunication had issued an order to Internet Service Providers to  block the websites and apps of taxi hailing aggregators like Uber,  TaxiForSure and Ola Cabs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet Service Providers (ISP) have apparently expressed  inability to block Uber, Ola as the web services feature strong  end-to-end encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How ISPs block sites&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Often when an ISP blocks a website it severs your connection with the  domain name.  For example if ISPs want to block Google they simply  block your access to &lt;a href="http://www.google.com"&gt;www.google.com&lt;/a&gt; (i.e. Google's domain name), pretty simple. But if you are using an app  like Google Now there is no domain name involved here the app talks  directly to the server through using some form of encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we were to use an analogy, think of the ISP as a bridge that  connects you to the web. The sites can be thought of as cars and their  domain names as license plates.  If the ISP wants to block a car with a  certain license plate from going through it can do so with ease. But if a  car's number plates are obscured (encryption) then ISP cannot block the  car from passing through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Uber and Ola&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most users book cabs from Ola or Uber using the company's apps, which  use strong encryption effectively making their data virtually  undetectable to ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's possible to block apps but it's much more difficult than  before. Earlier you had to deal with a finite set of IP addresses but  now these services are hosted on multiple cloud servers," said Sunil  Abraham, the executive director of Bangalore based research  organisation, the Centre for Internet and Society. "The ISPs themselves  don't want to go through the pain of blocking these apps so they are  asking the government to give them a solution," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and the Department of Telecommunication are fighting  near improbable odds in their endeavor to block these services on the  web.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked'&gt;https://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-14T09:52:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online">
    <title>The Perils and Prospects of Bringing the Next Billion Online</title>
    <link>https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online</link>
    <description>
        &lt;b&gt;Sunil Abraham is the executive director of the Centre for Internet &amp; Society, Bangalore. In his PDF talk, he explains the fight for net neutrality in India and how many solutions fall under the category of walled garden.&lt;/b&gt;
        &lt;h2&gt;Video&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/amJaGwAgD_A" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;For more see &lt;a class="external-link" href="https://personaldemocracy.com/media/perils-and-prospects-bringing-next-b illion-online"&gt;Personal Democracy Media&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online'&gt;https://cis-india.org/internet-governance/news/perils-and-prospects-of-bringing-next-billion-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-23T08:04:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please">
    <title>Only digital sex, please</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please</link>
    <description>
        &lt;b&gt;Many Indian men are getting so dependent on digital sex and online pornography that they can’t handle real relationships. And a new book says this is happening the world over. Prasun Chandhuri and Avijit Chatterjee turn the spotlight on the trend&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1150531/jsp/7days/story_23033.jsp"&gt;published in the Telegraph&lt;/a&gt; on May 31. Rohini is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;P. Sharath doesn't know how to handle women. The 31-year-old software  engineer, who works for a multinational company in Bangalore, thinks he  doesn't need them either. The man who grew up in Hubli in Karnataka and  now earns an eight-figure annual salary has his virtual world. That  gives him his sexual satisfaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Socially awkward, Sharath did try to date a woman, but the  relationship broke within a few months because he found that she was  getting to be "clingy" and "boring". An attempt by his family to fix a  marriage with a woman failed when he groped her in a cinema hall. His  online women, on the other hand, need no pampering, and do not complain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharath, however, is not happy. "He no longer gets any gratification  from online sex and has been suffering from anxiety and depression,"  says Dr Ali Khwaja, a Bangalore-based psychologist and founder of the  Banjara Academy, a counselling centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Increasingly, counsellors in urban India are coming across such cases  of people who are so used to digital sex that they can't cope with real  relationships any more. Khwaja refers to them as "hollow men" - people  who go through despair after relations fail because of their dependence  on digital pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Almost every week I meet a young man addicted to porn," says  Mumbai-based counsellor Shefali Batra, author of the recently published  book &lt;i&gt;Teen Matters&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's a pattern that many counsellors have noticed. As teenagers,  young boys get hooked on to digital sex. "But it becomes a vicious  addiction over time, playing havoc with their social and sexual  development," Batra says. The women they meet do not match up to the  large breasted and oversexed digital women - and the boys become men who  cannot sustain marriages and relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pornography has always existed, and some counsellors do not believe  that it is always harmful. But the spread of the Internet, the easy  availability of smartphones and the profusion of sophisticated sex games  and other platforms have led to a situation where men merely log on for  sexual satisfaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet is bursting at the seams with sex sites. There are  various types of sex games, including cartoon sex games, 3D sex games,  virtual reality sex games and so on where the viewer can indulge in sex  with three or four imaginary characters. Some online games offer virtual  simulation sex. In a new genre of digital porn, users can enjoy 3D porn  with a special virtual reality headset that allows them to step inside  their favourite games and completely immerse themselves in a sexual  fantasy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And this is happening across the world. In a recently released book, &lt;i&gt;Men (Dis)Connected: How technology has sabotaged what it means to be male&lt;/i&gt;, psychologist Philip Zimbardo holds that "masculinity" is being destroyed by online pornography and gaming technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have surveyed over 20,000 young people in many countries. Even  though we don't have data on Indian men, we assume that the impact of  freely available porn is creating a new breed of addicts in every  country," he says in an email interview. "These men prefer to masturbate  to visual images than have live sexual relations with real women."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikita Coulombe, co-author of &lt;i&gt;Men (Dis)Connected&lt;/i&gt;, adds that  it is an "endless novelty" and a "virtual harem" for the men. "In 10  minutes you can see more 'mates' than your ancestors would have seen in  their lifetime."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was a time when people shrugged and said, it's just a phase.  But Zimbardo believes that this addiction has gone beyond that and will  have a "permanent negative impact" on young men everywhere because the  porn industry is big business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The professor emeritus at Stanford discovered this phenomenon when he  found that many of his male students were shy and spent too much time  poring over screens. Closer home, academic and writer Shiv Visvanathan  had a similar experience while teaching at the O.P. Jindal University in  Haryana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Many of these guys do not know how to talk to a girl - they'd rather  convey their feelings through text messages or through social networks  or mobile phones. Sometimes you'll even see two people sitting close  together but talking over the phone, just to avoid a face-to-face  conversation," Visvanathan says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What this means is that young men are not just wary of getting into  relationships - they are not missing them either. "Porn gives them  instant gratification which can be repeated, say, 200 times. Moreover,  the virtual body seems more transformable than the actual body and it's  fast," Visvanathan points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is an addiction that draws men more than women, primarily because  the majority of Internet porn is male-centric and, more than teenage  women, boys are addicted to computer games and associated thrills.  "Research has affirmed that this is truer for the male brain in  comparison to the female brain," explains Batra. "The male brain is more  thrill and pleasure seeking and these exciting virtual realities  provide an immense rush of pleasure in the brain."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zimbardo's survey underlines this. It found that three out of five  men expressed a "lack of interest in pursuing and maintaining a romantic  relationship" while three out of four women between the ages of 18 and  30 said they were concerned about the "emotional immaturity or the  unavailability" of men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the celebrated psychologist plans to conduct a similar survey  in India, concerns are already rising because the lack of sex education  in schools and colleges - coupled with repressed backgrounds and  exaggerated pornographic images - gives the young a warped idea of sex  and relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In a society where talking about sex is taboo, their only avenue to  satisfy sexual curiosities becomes porn," says Rohini Lakshane,  researcher, Centre for Internet and Society, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is why sexologist Prakash Kothari often encounters young men who  yearn for a "14-inch organ" and suffer from performance anxiety and  depression. "Proper sex education can teach them just two inches and  oodles of erotic love are enough to satisfy your female partner," says  Kothari.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The experts stress that they are not against pornography. "One should  not shoot the messenger," contends Audrey D'Mello, programme director,  Majlis, a legal counselling centre in Mumbai. "If used properly it can  be an aphrodisiac," Kothari adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But many of the images that the young today see are violent and  bestial. "These twisted forms of sex are being consumed by young men and  boys through smartphones across the country," laments Ira Trivedi,  author of &lt;i&gt;India in Love&lt;/i&gt;. Lakshane believes that easy access to  violent pornography "degrades and objectifies women", giving men and  boys a "skewed view of sex and intimacy".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Calcutta-based Subhrangshu Aditya counselled a woman who wanted a  divorce because her husband forced her to replicate all that he watched  on porn. "It was torture for her, devoid of romantic love or eroticism,"  Aditya says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the effect on men has an impact on women as well. Trivedi  points out that as men devote themselves to porn, women go for measures  such as vaginal beautification to attract men.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or women go off sex altogether.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These women have an extreme phobia about sex," says Aindri Sanyal,  an infertility specialist at a Calcutta-based fertility centre. "Some  haven't even got their marriage consummated. So they want to conceive  through artificial insemination."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is there a way out? Experts such as Khwaja are doing what they can.  "I am trying to help Sharath socialise in mixed groups, then spend a few  minutes at a time doing a favour for a woman, or showing a gesture. I  want him to focus on understanding the emotions that girls go through  and eventually make him understand how to interact with another  flesh-and-blood person who has her own romantic and sexual needs," he  says. "The process will take quite a long time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zimbardo, 82, wants the "socially crippled generation" to hit the  Escape button on their digital devices. He wants to remind them that  real sex involves communicating with a real person, feeling their pain,  earning their trust and making a real connection to their heart. Like  people did, once upon a time.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;If it’s May, it’s got to be India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Some porn stats&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In 2014, India ranked among the highest consumers of pornographic content in the world, according to Pornhub, an online video hub&lt;/li&gt;
&lt;li&gt;Around 25 per cent of Indian visitors on Pornhub.com were women, 2 per cent higher than the worldwide average of 23 per cent&lt;/li&gt;
&lt;li&gt;Indians seek out pornography most in May and least in October&lt;/li&gt;
&lt;li&gt;More Indians surf porn on their smartphones than on desktops&lt;/li&gt;
&lt;li&gt;On an average, Indians spend 8 minutes and 22 seconds per visit to Pornhub, 30 seconds less than the rest of the world&lt;/li&gt;
&lt;li&gt;Of all states, people from Andhra Pradesh spend the least time on Pornhub — 6 min and 40 sec; people from West Bengal spend 9 min and 5 sec; people from Assam spend 9 min and 55 sec&lt;/li&gt;
&lt;li&gt;Sunny Leone is India’s favourite porn star&lt;/li&gt;
&lt;li&gt;In most places in the world, porn is viewed most on Monday, but in India, it’s on Saturday&lt;/li&gt;
&lt;li&gt;Porn viewing in India dips by over 25 per cent on Diwali, Dussehra, New Year’s Eve and Gandhi Jayanti.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please'&gt;https://cis-india.org/internet-governance/news/the-telegraph-may-31-2015-only-digital-sex-please&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-15T01:38:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july">
    <title>Digital India launch likely in July</title>
    <link>https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july</link>
    <description>
        &lt;b&gt;The Modi government, which completed one year at the Centre, is preparing for a big-ticket launch of Digital India, taking technology to the villages and block levels, through merchandise, hackathons and games spread over a week-long initiative across the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jochelle Mendonca and Neha Alawadhi was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/articleshow/47470673.cms"&gt;Times of India&lt;/a&gt; on May 29, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  National e-Governance Division (NeGD), under the Department of Electronics and Information Technology ( &lt;a href="http://www.speakingtree.in/topics/god/deity" target="_blank"&gt;DeitY&lt;/a&gt;),  has empanelled agencies for a messaging campaign, gamification,  printing and merchandise, advertising and creatives, including  advertising for rural outreach and social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Working directly with the Prime Minister's Office, NeGD has been tasked  with preparing for the launch since February. Though no formal dates  have been fixed yet, the  Digital India Week (DIW) is likely to take off  in July, and will involve stakeholders across state governments and  ministries, and is expected to be the flagship programme for the second  year of the BJP government, EThas learnt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"They really want to make this the biggest programme of the second year.  The idea is that many things have been done in the digital space that  need to get highlighted," an individual with knowledge of the plans told  ET.&lt;br /&gt; &lt;br /&gt; The event is certainly being planned on a grand scale,  according to the tender documents issued by the government. The  government has asked for merchandise such as t-shirts, caps, trophies,  pen drives and leather cloth and plastic bags. A gamification agency  will work on the portals, mobile applications and social media handles  to boost participation.&lt;br /&gt; &lt;br /&gt; The messaging agency must be able to  carry out, track, record and analyze 50 lakh to one crore messages a  day. The event will be launched by the Prime Minister through a radio  address on 'Mann ki Baat,' which will be followed by events at gram  panchayats, block and sub divisional headquarters, district and state  levels, eventually culminating in a national event, according to a  presentation seen by ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the run-up to the DIW, events such as hackathons, training  programmes and webinars would be held in schools and colleges, followed  by crowd-sourcing ideas through the government's portal MyGov, as well  as a new Digital India portal that is being designed.&lt;br /&gt; &lt;br /&gt; "It is a  typical BJP-style campaign. The Prime Minister does not want to hold the  final day event in Delhi and the location is being finalized. All state  and line ministries have been involved, and are being asked to showcase  e-services and best practices, along with the launch of some programmes  like digital locker," said another person familiar with the plans being  rolled out for the DIW.&lt;br /&gt; &lt;br /&gt; The watch words of the campaign will  be "inform, educate and engage", which will include taking the message  of Digital India to the masses through educational institutions,  industry and government agencies.&lt;br /&gt; &lt;br /&gt; "It will educate people on  various important services such as digital literacy, cyber-hygiene and  e-waste management, and also look at engaging a large number of people,  especially youth on a continuous basis," said a person familiar with the  ongoing preparation.&lt;br /&gt; &lt;br /&gt; NeGD is looking at using the principles  of gamification to gather feedback. Experts on e-governance say this is a  good move as most e-governance projects, across the world, fail because  there's not enough buy-in from stakeholders or the goals aren't  communicated widely to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"E-governance needs evangelizing. That is what this campaign looks like  it will do. Some parts are dated — such as posters and the print  elements. But this is a good idea. Whether it works or not depends on  the participation they see at the end," Sunil Abraham, director at the  Centre for Internet and Society, said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july'&gt;https://cis-india.org/internet-governance/news/times-of-india-jochelle-mendonca-neha-alawadhi-may-29-2015-digital-india-launch-likely-in-july&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-31T16:08:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance">
    <title>Mastering the Art of Keeping Indians Under Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance</link>
    <description>
        &lt;b&gt;In its first year in office, the National Democratic Alliance government has been notably silent on the large-scale surveillance projects it has inherited. This ended last week amidst reports the government is hastening to complete the Central Monitoring System (CMS) within the year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/"&gt;the Wire&lt;/a&gt; on May 30, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a statement to the Rajya Sabha in 2009, Gurudas Kamat, the  erstwhile United Progressive Alliance’s junior communications minister,  said the CMS was a project to enable direct state access to all  communications on mobile phones, landlines, and the Internet in India.  He meant the government was building ‘backdoors’, or capitalising on  existing ones, to enable state authorities to intercept any  communication at will, besides collecting large amounts of metadata,  without having to rely on private communications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not new. Legally sanctioned backdoors have existed in Europe  and the USA since the early 1990s to enable direct state interception of  private communications. But the laws of those countries also subject  state surveillance to a strong regime of state accountability,  individual freedoms, and privacy. This regime may not be completely  robust, as Edward Snowden’s revelations have shown, but at least it  exists on paper. The CMS is not illegal by itself, but it is coloured by  the compromised foundation of Indian surveillance law upon which it is  built.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance and social control&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is a technological project. But technology does not exist in  isolation; it is contextualised by law, society, politics, and history.  Surveillance and the CMS must be seen in the same contexts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The great sociologist Max Weber claimed the modern state could not  exist without monopolising violence. It seems clear the state also  entertains the equal desire to monopolise communications technologies.  The state has historically shaped the way in which information is  transmitted, received, and intercepted. From the telegraph and radio to  telephones and the Internet, the state has constantly endeavoured to  control communications technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law is the vehicle of this control. When the first telegraph line was  laid down in India, its implications for social control were instantly  realised; so the law swiftly responded by creating a state monopoly over  the telegraph. The telegraph played a significant role in thwarting the  Revolt of 1857, even as Indians attempted to destroy the line; so the  state consolidated its control over the technology to obviate future  contests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This controlling impulse was exercised over radio and telephones,  which are also government monopolies, and is expressed through the  state’s surveillance prerogative. On the other hand, because of its open  and decentralised architecture, the Internet presents the single  greatest threat to the state’s communications monopoly and dilutes its  ability to control society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interception in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The power to intercept communications arises with the regulation of  telegraphy. The first two laws governing telegraphs, in 1854 and 1860,  granted the government powers to take possession of telegraphs “on the  occurrence of any public emergency”. In 1876, the third telegraph law  expanded this threshold to include “the interest of public safety”.  These are vague phrases and their interpretation was deliberately left  to the government’s discretion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This unclear formulation was replicated in the Indian Telegraph Act  of 1885, the fourth law on the subject, which is currently in force  today. The 1885 law included a specific power to wiretap. Incredibly,  this colonial surveillance provision survived untouched for 87 years  even as countries across the world balanced their surveillance powers  with democratic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Constitution requires all deprivations of free speech to  conform to any of nine grounds listed in Article 19(2). Public  emergencies and public safety are not listed. So Indira Gandhi amended  the wiretapping provision in 1972 to insert five grounds copied from  Article 19(2). However, the original unclear language on public  emergencies and public safety remained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indira Gandhi’s amendment was ironic because one year earlier she had  overseen the enactment of the Defence and Internal Security of India  Act, 1971 (DISA), which gave the government fresh powers to wiretap.  These powers were not subject to even the minimal protections of the  Telegraph Act. When the Emergency was imposed in 1975, Gandhi’s  government bypassed her earlier amendment and, through the DISA Rules,  instituted the most intensive period of surveillance in Indian history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although DISA was repealed, the tradition of having parallel  surveillance powers for fictitious emergencies continues to flourish.  Wiretapping powers are also found in the Maharashtra Control of  Organised Crime Act, 1999 which has been copied by Karnataka, Andhra  Pradesh, Arunachal Pradesh, and Gujarat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Procedural weaknesses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the Telegraph Act with its 1972 amendment continued to  weather criticism through the 1980s. The wiretapping power was largely  exercised free of procedural safeguards such as the requirements to  exhaust other less intrusive means of investigation, minimise  information collection, limit the sharing of information, ensure  accountability, and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This changed in 1996 when the Supreme Court, on a challenge brought  by PUCL, ordered the government to create a minimally fair procedure.  The government fell in line in 1999, and a new rule, 419A, was put into  the Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the United States, where a wiretap can only be ordered by a  judge when she decides the state has legally made its case for the  requested interception, an Indian wiretap is sanctioned by a bureaucrat  or police officer. Unlike the United Kingdom, which also grants  wiretapping powers to bureaucrats but subjects them to two additional  safeguards including an independent auditor and a judicial tribunal, an  Indian wiretap is only reviewed by a committee of the original  bureaucrat’s colleagues. Unlike most of the world which restricts this  power to grave crime or serious security needs, an Indian wiretap can  even be obtained by the income tax department.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A certainly creates procedure, but it lacks crucial  safeguards that impugn its credibility. Worse, the contours of rule 419A  were copied in 2009 to create flawed procedures to intercept the  content of Internet communications and collect metadata. Unlike rule  419A, these new rules issued under sections 69(2) and 69B(3) of the  Information Technology Act 2000 have not been constitutionally  scrutinised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Three steps to tap&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite its monopoly, the state does not own the infrastructure of  telephones. It is dependent on telecommunications carriers to physically  perform the wiretap. Indian wiretaps take place in three steps: a  bureaucrat authorises the wiretap; a law enforcement officer serves the  authorisation on a carrier; and, the carrier performs the tap and  returns the information to the law enforcement officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many moving parts in this process, and so there are leaks.  Some leaks are cynically motivated such as Amar Singh’s lewd  conversations in 2011. But others serve a public purpose: Niira Radia’s  conversations were allegedly leaked by a whistleblower to reveal serious  governmental culpability. Ironically, leaks have created accountability  where the law has failed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS will prevent leaks by installing servers on the transmission  infrastructure of carriers to divert communications to regional  monitoring centres. Regional centres, in turn, will relay communications  to a centralised monitoring centre where they will be analysed, mined,  and stored. Carriers will no longer perform wiretaps; and, since this  obviates their costs of compliance, they are willing participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its annual report of 2012, the Centre for the Development of  Telematics (C-DOT), a state-owned R&amp;amp;D centre tasked with designing  and creating the CMS, claimed the system would intercept 3G video, ILD,  SMS, and ISDN PRI communications made through landlines or mobile phones  – both GSM and CDMA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are unclear reports of an expansion to intercept Internet data,  such as emails and browsing details, as well as instant messaging  services; but these remain unconfirmed. There is also a potential  overlap with another secretive Internet surveillance programme being  developed by the Defence R&amp;amp;D Organisation called NETRA, no details  of which are public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Culmination of surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its present state, Indian surveillance law is unable to bear the  weight of the CMS project, and must be vastly strengthened to protect  privacy and accountability before the state is given direct access to  communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there is a larger way to understand the CMS in the context of  Indian surveillance. Christopher Bayly, the noted colonial historian,  writes that when the British set about establishing a surveillance  apparatus in colonised India, they came up against an established system  of indigenous intelligence gathering. Colonial rule was at its most  vulnerable at this point of intersection between foreign surveillance  and indigenous knowledge, and the meeting of the two was riven by  suspicion. So the colonial state simply co-opted the interface by  creating institutions to acquire local knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is also an attempt to co-opt the interface between government  and the purveyors of communications; because if the state cannot  control communications, it cannot control society. Seen in this light,  the CMS represents the natural culmination of the progression of Indian  surveillance. No challenge against it that does not question the  construction of the modern Indian state will be successful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T12:26:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/iana-transition-icann-accountability-process-indian-position">
    <title>IANA Transition &amp; ICANN Accountability Process and India' s Position</title>
    <link>https://cis-india.org/internet-governance/news/iana-transition-icann-accountability-process-indian-position</link>
    <description>
        &lt;b&gt;Jyoti Panday participated in the workshop organized by CCAOI on "IANA Transition &amp; ICANN Accountability Process and India' s Position" on May 30, 2015. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr Ajay Kumar launched the IANA Transition Report and set the context for the workshop. Dr Mahesh Uppal was the moderator of the panel and other participants included Mr Samiran Gupta, ICANN providing an overview of the current status on the transition, Mr Parminder Singh, IT for Change and Mr Rahul Sharma, DSCI sharing concerns of different stakeholders.&lt;br /&gt;&lt;br /&gt;The panel also saw discussion on issues in the transition process that are of relevance to India and what should their position going forward including ensuring the efficiency of ICANN Functions included in the CWG draft proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS raised issues around financial accountability and the role of ICANN in shaping markets therefore the urgent need for improving transparency and accountability measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report launched at the workshop is &lt;a class="external-link" href="http://www.ccaoi.in/UI/links/fwresearch/Study%20on%20the%20Indian%20Perspective%20on%20IANA%20transition.pdf"&gt;available here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/iana-transition-icann-accountability-process-indian-position'&gt;https://cis-india.org/internet-governance/news/iana-transition-icann-accountability-process-indian-position&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2015-08-23T09:26:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india">
    <title>The Four Parts of Privacy in India</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india</link>
    <description>
        &lt;b&gt;Privacy enjoys an abundance of meanings. It is claimed in diverse situations every day by everyone against other people, society and the state.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Traditionally traced to classical liberalism’s public/private divide, there are now several theoretical conceptions of privacy that collaborate and sometimes contend. Indian privacy law is evolving in response to four types of privacy claims: against the press, against state surveillance, for decisional autonomy, and in relation to personal information. The Indian Supreme Court has selectively borrowed competing foreign privacy norms, primarily American, to create an unconvincing pastiche of privacy law in India. These developments are undermined by a lack of theoretical clarity and the continuing tension between individual freedoms and communitarian values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was published in &lt;i&gt;Economic &amp;amp; Political Weekly&lt;/i&gt;, 50(22), 30 May 2015. &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/four-parts-of-privacy.pdf" class="internal-link"&gt;Download the full article here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T13:04:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-may-29-2015-jochelle-mendonca-and-neha-alawadhi-digital-india">
    <title>Digital India: PM Modi to launch BJP's flagship programme likely in July</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-may-29-2015-jochelle-mendonca-and-neha-alawadhi-digital-india</link>
    <description>
        &lt;b&gt;The Modi government, which completed one year at the Centre, is preparing for a big-ticket launch of Digital India, taking technology to the villages and block levels, through merchandise, hackathons and games spread over a week-long initiative across the country.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jochelle Mendonca and Neha Alawadhi was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/digital-india-pm-modi-to-launch-bjps-flagship-programme-likely-in-july/articleshow/47463709.cms"&gt;published in the Economic Times&lt;/a&gt; on May 29, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Modi government, which completed one year at the Centre, is preparing for a big-ticket launch of Digital India, taking technology to the villages and block levels, through merchandise, hackathons and games spread over a week-long initiative across the country.&lt;br /&gt;&lt;br /&gt;The National e-Governance Division (NeGD), under the Department of Electronics and Information Technology (DeitY), has empanelled agencies for a messaging campaign, gamification, printing and merchandise, advertising and creatives, including advertising for rural outreach and social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Working directly with the Prime Minister's Office, NeGD has been tasked with preparing for the launch since February. Though no formal dates have been fixed yet, the Digital India Week (DIW) is likely to take off in July, and will involve stakeholders across state governments and ministries, and is expected to be the flagship programme for the second year of the BJP government, EThas learnt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"They really want to make this the biggest programme of the second year. The idea is that many things have been done in the digital space that need to get highlighted," an individual with knowledge of the plans told ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event is certainly being planned on a grand scale, according to the tender documents issued by the government. The government has asked for merchandise such as t-shirts, caps, trophies, pen drives and leather cloth and plastic bags. A gamification agency will work on the portals, mobile applications and social media handles to boost participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The messaging agency must be able to carry out, track, record and analyse 50 lakh to one crore messages a day. The event will be launched by the Prime Minister through a radio address on "Mann ki Baat", which will be followed by events at gram panchayats, block and sub divisional headquarters, district and state levels, eventually culminating in a national event, according to a presentation seen by ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the run-up to the DIW, events such as hackathons, training programmes and webinars would be held in schools and colleges, followed by crowdsourcing ideas through the government's portal MyGov, as well as a new Digital India portal that is being designed. "It is a typical BJP-style campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Prime Minister does not want to hold the final day event in Delhi and the location is being finalised. All state and line ministries have been involved, and are being asked to showcase e-services and best practices, along with the launch of some programmes like digital locker," said another person familiar with the plans being rolled out for the DIW. The watch words of the campaign will be "inform, educate and engage", which will include taking the message of Digital India to the masses through educational institutions, industry and government agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It will educate people on various important services such as digital literacy, cyber hygiene and e-waste management, and also look at engaging a large number of people, especially youth on a continuous basis," said a person familiar with the ongoing preparation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NeGD is looking at using the principles of gamification to gather feedback. Experts on e-governance say this is a good move as most e-governance projects, across the world, fail because there's not enough buy-in from stakeholders or the goals aren't communicated widely to the public.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;"E-governance  needs evangelising. That is what this campaign looks like it will do.  Some parts are dated — such as posters and the print elements. But this  is a good idea. Whether it works or not depends on the participation  they see at the end,"  Sunil Abraham,  director at the  Centre for  Internet and Society, said.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-may-29-2015-jochelle-mendonca-and-neha-alawadhi-digital-india'&gt;https://cis-india.org/internet-governance/news/economic-times-may-29-2015-jochelle-mendonca-and-neha-alawadhi-digital-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-22T16:45:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed">
    <title>Indian music streaming service Gaana hacked, millions of users’ details exposed</title>
    <link>https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed</link>
    <description>
        &lt;b&gt;Indian music streaming service Gaana, which has over 7.5 million monthly visitors, has been compromised by a hacker and its user information database is now exposed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read more at &lt;a class="moz-txt-link-freetext" href="http://thenextweb.com/insider/2015/05/28/indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed/"&gt;http://thenextweb.com/insider/2015/05/28/indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The hacker, who goes by the moniker Mak Man and appears to be based in Lahore, Pakistan, posted a link to a searchable database of Gaana user details on his Facebook page. Enter a user’s email address and it spits out their full name, email address, MD5-hashed password, date of birth Facebook and Twitter profiles and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hack appears to be a SQL injection-based exploit of Gaana’s systems, but the intention behind it is unknown. The database shows more than 12.5 million users are currently registered on Gaana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mak Man also posted images of the service’s admin panel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s worrying that an online service from one of India’s biggest internet companies (&lt;a href="http://www.timesinternet.in/" target="_blank"&gt;Times Internet&lt;/a&gt;) is vulnerable to attacks like this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With user details exposed, it may not do much good to simply change your Gaana password, as it will reflect in the hacker’s database. You’re better off deactivating your account until the issue is resolved, and changing your email, Facebook and Twitter passwords if they’re the same as on Gaana right away.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Update:&lt;/b&gt; &lt;i&gt;Since our story broke, Gaana has &lt;a href="http://gaana.com" target="_blank"&gt;taken its site offline &lt;/a&gt;and the exposed database isn’t returning search results when we queried it with test data.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;i&gt;The hacker has updated his database page with the following message:  “The vulnerable parameter I was using here, has been patched by the  Admin&lt;br /&gt; Now the question is, Was this the only vulnerable parameter I had .. ? ;)”&lt;/i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Update 2: &lt;/b&gt;&lt;i&gt;Times Internet CEO Satyan Gajwani &lt;a href="https://twitter.com/satyangajwani/status/603870753898024960" target="_blank"&gt;tweeted&lt;/a&gt; that only login credentials were accessed and no financial or sensitive personal data was leaked.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gajwani attempted to contact the hacker on Facebook and  acknowledged the issue. He added that the attack was the hacker’s way of  highlighting Gaana’s vulnerability.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The exposed database has since been removed on Gajwani’s request. All Gaana users’ passwords have been reset.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gajwani also sought to reassure his followers that no user data  was stored and that the passwords were hashed. Hacker&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; Mak Man also &lt;a href="https://www.facebook.com/themakmaniac/posts/853667861337854" target="_blank"&gt;confirmed this in a Facebook post&lt;/a&gt;.  However, that can’t be confirmed and you’d best change your passwords  for any social accounts and email addresses associated with your Gaana  profile.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;According to &lt;a href="https://twitter.com/pranesh_prakash" target="_blank"&gt;Pranesh Prakash&lt;/a&gt;, Policy Director at &lt;a href="http://cis-india.org/" target="_blank"&gt;Center for Internet and Society&lt;/a&gt; in Bangalore, India, the MD5 hashing algorithm which appears to have  been used for securing passwords isn’t very strong and could easily be  unscrambled using a rainbow table to get the plain-text version of the  data.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prakash also says that for added security, Gaana should:&lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Stop using MD5 as its password hashing function and instead look at stronger password derivation functions like &lt;a href="https://www.wikiwand.com/en/Scrypt" target="_blank"&gt;scrypt&lt;/a&gt;, &lt;a href="https://www.wikiwand.com/en/Bcrypt" target="_blank"&gt;bcrypt&lt;/a&gt;, or &lt;a href="https://www.wikiwand.com/en/PBKDF2" target="_blank"&gt;PBKDF2&lt;/a&gt;.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Sanitize its SQL inputs to prevent against malicious SQL injections.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Enable &lt;a href="http://www.wikiwand.com/en/Two_factor_authentication" target="_blank"&gt;two-factor authentication&lt;/a&gt; for users to log in securely.&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Urge its users to use long passphrases instead of short complicated passwords and to never to reuse a password.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;➤ &lt;a href="http://www.gaana.com" target="_blank"&gt;Gaana&lt;/a&gt; [via &lt;a href="http://www.thegeekbyte.com/4841/gaana-com-database-compromised-by-hackers/" target="_blank"&gt;The Geek Byte&lt;/a&gt;]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed'&gt;https://cis-india.org/internet-governance/news/tnwnews-may-28-2015-abhimanyu-ghoshal-indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-22T16:44:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
