<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2621 to 2635.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bis-litd-17-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bis-international-seminar-on-internet-of-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/biometry-is-watching"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/biometrics-or-bust-implications-of-uid-for-participation-and-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/biometric-identification"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-dog-is-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-rajat-kathuria-isha-suri-big-tech-consumers-privacy-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/big-data-in-the-global-south-international-workshop"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting">
    <title>BIS LITD 17 Privacy Panel meeting</title>
    <link>https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting</link>
    <description>
        &lt;b&gt;Udbhav Tiwari represented CIS at this meeting organized by National Law School of India University in Bangalore on June 21, 2017.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The bare-bones structure for what as discussed at the meeting can be found in the trailing email below. The standard itself is still in the drafting stage, which makes it confidential. I will share it on this thread once it hits the public draft stage, which should happen by September 2017. (approx)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting'&gt;https://cis-india.org/internet-governance/news/bis-litd-17-privacy-panel-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-07T01:31:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bis-litd-17-meeting">
    <title>BIS LITD 17 meeting</title>
    <link>https://cis-india.org/internet-governance/news/bis-litd-17-meeting</link>
    <description>
        &lt;b&gt;On July 3, 2019, Gurshabad Grover attended the sixteenth meeting of the Information Systems Security and Biometrics Section Committee (LITD17) at the Bureau of Indian Standards (BIS) in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In a previous meeting, a panel was formed to review two biometric standards: ISO/ IEC 24745 'Security Techniques - Biometric Information Protection' (2011), and ISO/IEC 19792 'Security techniques - Security evaluation of biometrics' (2009). Elonnai Hickok, Karan Saini and Gurshabad Grover had reviewed the documents and sent comments to BIS in December 2018 and January 2019 respectively. The Centre for Internet &amp;amp; Society (CIS) had also shared a document that compared the security guidelines in the standards to the provisions of the draft data protection bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee discussed whether the aforementioned standards should be adopted as Indian standards by BIS. A decision will be taken on the matter after future discussions that CIS will participate in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Members updated the committee on their participation at the ISO/IEC. Iupdated the committee on the progress of the study period on the impact of machine learning on privacy, which I am a co-rapporteur for in the identity management and privacy group working group at ISO/IEC IT Security Techniques committee. We also planned our participation at the next ISO/IEC SC 27 meeting, which is in October.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bis-litd-17-meeting'&gt;https://cis-india.org/internet-governance/news/bis-litd-17-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-21T13:58:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bis-international-seminar-on-internet-of-things">
    <title>BIS International Seminar on Internet of Things</title>
    <link>https://cis-india.org/internet-governance/news/bis-international-seminar-on-internet-of-things</link>
    <description>
        &lt;b&gt;To create awareness among Indian community and to provide a platform to all stakeholders to discuss the technology, challenges and the way forward with an emphasis on the role of standards, BIS organized a half day International seminar on Internet of Things on 15 November 2017 at India Habitat Centre in New Delhi. Amber Sinha attended the event.&lt;/b&gt;
        &lt;p&gt;Click to see the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/iot-seminar"&gt;agenda&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bis-international-seminar-on-internet-of-things'&gt;https://cis-india.org/internet-governance/news/bis-international-seminar-on-internet-of-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IoT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-25T16:35:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/biometry-is-watching">
    <title>Biometry Is Watching</title>
    <link>https://cis-india.org/news/biometry-is-watching</link>
    <description>
        &lt;b&gt;In its first steps, the UID drive encounters practical problems, raises ethical questions, reports Sugata Srinivasaraju in Outlook.&lt;/b&gt;
        
&lt;p&gt;Three women are fighting to take one chair in a classroom of a government school in Chelur village, in Gubbi taluka of Tumkur district. One sits on the lap of another and the third tries to push them both off the chair. What all three want is to be the first to be profiled under the Centre’s ambitious Aadhaar or unique identity number (UID) project. Their squabbling holds up the documentation by nearly 20 minutes, and the crowd outside, standing in line in the afternoon sun, grows restless. To calm them, the village revenue secretary orders the distribution of another round of buttermilk.&lt;/p&gt;
&lt;p&gt;Chelur is one of four villages in the district picked for field trials before the 12-digit UIDs are assigned to people later in the year. Besides Tumkur, the pilot project is simultaneously running in seven villages of Mysore district. Each village has been given a target of 2,400-2,500 profiles to be completed in 20 days. This involves photographing the face, imaging the iris and scanning all ten digits of each person profiled and assigned a UID.&lt;/p&gt;
&lt;p&gt;Villagers are enthusiastic about this rigorous profiling process even though there’s little awareness about the true purpose of the exercise. This is because of some falsehoods that have somehow spread in these areas. Nagamma, an elderly woman coming out after being profiled, thinks her eyes had been tested and found to be in perfect condition. Another middle-aged woman thought the exercise would bring her a new ration card—one that would entitle her family to an extra four kilos of rice. Some others were in a tizzy that if they didn’t undergo this “photography” their BPL cards would be taken away. Most, however, had queued up because they didn’t want to be left out of a sarkari exercise their neighbours were submitting to. Of the dozen people Outlook&amp;nbsp; spoke to, only Muniswamy could tell us that this process would ensure that no one had more than one voter ID card or ration card—the way it should be, unlike some in his village who had illegally acquired two of each.&lt;/p&gt;
&lt;p&gt;The village authorities have been doing little to counter the misinformation because their attention is focused on other compelling matters, like meeting the assigned target. This is an important issue because gram panchayat elections have been declared in Karnataka and lots of youngsters set off for campaigning early in the morning and would be difficult to locate for profiling.&lt;/p&gt;
&lt;p&gt;According to official figures, Chelur has a population of 5,000, with 3,640 people above the age of 18. A random selection&amp;nbsp; of 2,400 has been made from this to meet the UID target. The number seems small, but handling it at the village level can be demanding for the local authorities—there’s no police for crowd control, refreshments have to be distributed and the computerised work has to be done despite the power outages. Using generators has become inevitable, for the villages get hardly four or five hours’ power supply.&lt;/p&gt;
&lt;p&gt;Another problem lies in obtaining the fingerprints of rural folk: most of them are engaged in manual labour or farm work and arrive with dirty palms that defeat the biometric reading machines. Pails of water, detergent and towels are provided for cleaning up. Much time is lost in such rescanning and it goes against the official&amp;nbsp; estimate of five minutes for the young, nine for the elderly.&lt;/p&gt;
&lt;p&gt;Prasanna Kumar, the village secretary, admits to the problems. “We did not make an open announcement for the UID pilot because we didn’t want to attract large crowds. We quietly prepared a random list of 2,400 people from the ration card database and went door-to-door to invite them,” he says. “We have left out people above the age of 80 and under 18. We told people this identity number will help them access various government schemes. Fingerprinting is the toughest problem. Initially people were reluctant, but suddenly they have become curious.”&lt;/p&gt;
&lt;p&gt;H. Gnanesh, the tehsildar, says the ongoing step is only “concept testing”; the next will be rechecking, in which those already profiled will verify their identity details against what has been stored. Only after that will the UID be issued. In Chelur village, the concept testing ended on May 4;&amp;nbsp; rechecking began the very next day.&lt;/p&gt;
&lt;p&gt;Some NGOs observing the process have noted the lack of awareness in villagers. “They are clueless about what they are taking part in,” say Mahadev Prasad and Murthy, of the Basava Seva Trust. Murthy says fingerprinting is a big problem. He speaks of Hommaragalli, in Mysore district, where some foreign experts had to be called in to take a look at the scanning machines.&lt;/p&gt;
&lt;p&gt;Then there are larger issues. Away from the surging crowds in Chelur, civil society organisations like the Centre for Internet &amp;amp; Society, the Alternative Law Forum and PUCL have been demanding greater dialogue. In fact, they have even suggested a review of the scheme. They argue there is no clarity on how the government proposes to store and secure personal and biometric data, given the fact that various agencies such as banks, telecom companies and government departments would potentially access it. Security is a huge concern also because the software, hardware and expertise of foreign companies is being used. These NGOs say the UID data, the National Population Registry and the NATGRID, when connected, could prove a grave threat to civil liberties.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“First, a centralised database, like the UID will create, has never been safe,” says Sunil Abraham of CIS. “It needs to be decentralised like our various mail servers. Second, we feel the collection of biometric data is happening at the wrong end of the pyramid. Instead of putting the poor through the process first, why not start with those with financial dealings of Rs 1 crore and above. Third, one study says 48 per cent of our people cannot remember a 12-digit ID. Fourth, we need privacy laws in place before the UID regime sets in.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Those problems apart, even raising the level of the current exercise—from small samples of a few thousand each to profiling the billion-plus population of India—could place severe demands on our shaky administration. There’s a mountain to be moved.&lt;/p&gt;
&lt;p&gt;Read the original article in the &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?265326"&gt;Outlook&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/biometry-is-watching'&gt;https://cis-india.org/news/biometry-is-watching&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T12:08:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation">
    <title>Biometrics: An ‘Angootha Chaap’ nation? </title>
    <link>https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation</link>
    <description>
        &lt;b&gt;This blog post throws light on the inconsistencies in biometric collection under the UID and NPR Schemes. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Fingerprints and iris scans. The Unique Identification (UID) Number aims to serve as a proof of identity that can be easily verified and linked to subsidies and to bank accounts. Four years into its implementation, the UID Scheme seems to have the vote of confidence of the public. More than 65 Crore Indians have been granted UID Numbers,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and only a few have been concerned enough to seek clarity through Right to Information Requests to the UIDAI about the finances and legal authority backing the scheme.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Parallel to the UID scheme, the National Population Register scheme is also under way, with enrolment in some areas, such as Srinagar, Shimla and Panchkula, having reached 100% of the estimated population.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NPR scheme is an offshoot of the census. It began in census cycle 2010-11, pursuant to the amendment of the Citizenship Act in 2004, under which national identity cards are to be issued. The desired outcome of the NPR scheme is an NPR card with a chip embedded with three bits of information built into a card: (i) biometric information, (ii) demographic information and (iii) UID Number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the UID and NPR schemes aspire to be conduits that subsidies, utilities, and other benefits are routed through. While the UID and NPR schemes are distinct in terms of their legal sanctity, purpose and form, the harmonization of these two schemes is one of the UIDAI’s functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are substantial overlaps in the information collected and the purpose they serve leading to the argument that having two schemes is redundant. The compatibility of the two schemes was questioned and it was initially thought that a merger would be unreasonable. While there has been speculation that the UID scheme may terminate, or that it would be taken over by the Home Ministry, it has been reported that the new government has directed expedited enrolments through the UID scheme. &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both schemes are incomplete and suffer from vagaries, including, but not limited to: their legality, safeguards against misuse of the data, the implementation of the schemes – including the collection and storage of biometric information and their convergence or divergence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This blog will focus on understanding the process of collecting biometric data in each scheme – calling out similarities and differences – as well as areas in which data collected under one scheme is incompatible with the other scheme. It will look at existing and missing safeguards in the collection of biometrics, overlap in the collection of biometrics by the two schemes, and existing practice in the collection of biometrics. In doing so the blog will highlight the lack of privacy safeguards for the biometric information and conclude that since the policies for data collection and use policy are unclear, the data subjects do not know how their data is being collected, used, and shared between the UID and the NPR schemes.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Unreliability of Biometric Data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Biometric data has been qualified as being unreliable.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; It cannot always be successfully used to identify a person, especially in India, where manual labour degrades the fingerprint&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; and nutritional deficiencies mar the iris. Even experts working with the UIDAI&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; admit that fingerprints are not always good indicators of identity. If the very identification of a person fails, which is what the UID seeks to do, then the purpose of the UID is defeated.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Biometric Data Collection under the UID Scheme&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the current structure of the scheme, collected biometric information is stored by, and vests with the UIDAI for an undefined period. The data if used only for identification and authentication purposes, as originally intended, could very well fail to serve its intended purpose. But amassing the personal data of the entire country is lucrative, particularly to the service providers who collect the information and are mandated with the task to manually collect the data before it is fed into the UID system and encrypted. Most of the service providers that collect information, including biometric data, for the UID are engaged in information services such as IT or online marketing service providers.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The below chart delineates the process followed for the collection of biometrics under the UID Scheme:&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_c1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Under the NIAI Bill, all data collected or authenticated by the UIDAI, until the Bill is enacted and the National Identification Authority of India is created, vests with the UIDAI. In practice this means that the UIDAI owns the biometric data of the data-subject, without clear safeguards against misuse of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the UID scheme, the collection of biometrics at the time of enrollment by the UIDAI is severely flawed for a number of reasons:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Lack of clear legal authority and procedure for collection of biometrics:&lt;/b&gt; The only legal authority the UIDAI has to collect biometric information is via the notification of its constitution. Even then, the powers of the UIDAI are vague and broad. Importantly, the notification tells us nothing of how biometric data is to be collected and how it is to be used. These standards have only been developed by the UIDAI in an &lt;i&gt;ad-hoc manner &lt;/i&gt;when the need arises or after a problem is spotted. The lack of purpose-specification is in violation of the law&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; and prevents the data subject from giving informed consent to data collection. This is discussed at a later stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. The collection of Biometrics is regulated through only a Bill, which delegates the development of safeguards to Rules:&lt;/b&gt; The National Identification Authority of India (NIAI) Bill&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; confers the National Information Authority of India (NOT THE UIDAI) with the power to pass rules to collect biometric data and to prescribe standards for collection.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; This is a rule-making power, which is conferred under a Bill. Neither has the Bill been enacted, nor have rules for the collection of biometrics been framed and notified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Collection&lt;/b&gt; &lt;b&gt;of&lt;/b&gt; &lt;b&gt;biometric&lt;/b&gt; &lt;b&gt;data only with implied consent:&lt;/b&gt; Though collection of biometrics is mentioned in the enrolment form, explicit consent for the collection of biometrics is not collected and only implied consent may be inferred. The last line in the enrollment form is titled ‘CONSENT’ and is a declaration that all data, including biometric information, is true.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. Collection of biometric data outsourced to third party:&lt;/b&gt; Collection of biometric information in the UID scheme is outsourced to third parties through tenders. For instance, Accenture has been declared a biometric service provider under a contract with the UID.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; The third party may be a company, firm, educational institution or an accreditation agency. The eligibility criteria are quite straightforward, they relate to the entity’s structure and previous experiences with small projects.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Since the ability to protect privacy of the data subject is entirely absent from the eligibility criteria, a successful bidder may not have adequate procedure in place or sufficient experience in managing confidential data, to ensure the privacy of the data subject. By outsourcing the data collection, the UIDAI has arguably delegated a function it never had the legal authority to perform. Thus, the agency of the data collection is equally defective. To heighten the irregularity, these contract agents can sub-contract the job of physical data collection.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; This means that the data operator and the ground supervisors, who come into direct contact with the raw data, including biometric data, are not appointed by the government, or the UIDAI, but by a private agency, who is further removed from the chain. The data operator scans the documents submitted for verification and has physical access to the document.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Biometric data is admittedly vulnerable to sale and leakage: &lt;/b&gt;In an ongoing case in the Supreme Court of India, the national Capital Territory of Delhi has, in its counter-affidavit, admitted that data collected under the UID is vulnerable to sale and leakage.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; To quote from the counter-affidavit ‘&lt;i&gt;..in any exercise of gathering identities whether it is by census authority… or through the present process… there is always a possibility of leakage. Enumerators can scan and keep copies of all the forms and sell them for a price.- this (sic) it can never be said that the data gathered… is safe.’&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;b&gt;[18]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; Anyone who has registered for either UID is therefore a candidate for identity theft or unsolicited commercial information. This is also true for the NPR, as census data is the basis for the NPR.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Data collection under the NPR Scheme&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The declaration of courts that it is unnecessary to link the UID number for public utilities and the admission by Delhi in the case that a data subject cannot be compelled to provide biometrics or to obtain a UID Number under the Aadhaar scheme&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; are steps forward in ensuring the voluntariness of UID. However, the UID Number is mandatory by implication. It is a pre-requisite for registration under the National Population Register, which is compulsory, pursuant to S. 14-A of the Citizenship Act. The below diagram delineates the collection of biometric information under the NPR scheme:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;DATA FLOW PROCESS&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_c2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Flaws in the collection of biometric data under the NPR scheme&lt;b&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Compulsion:&lt;/b&gt; Registration in the NPR is legally mandated and individuals who fail to do so can face penalty. As a note, arguably, the compulsion to register for the NPR is untenable, as the Rules prescribe penalty, whereas the Act does not. &lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; A word of caution is appropriate here. The penalty under the Rules stands till it is deleted by the legislature or declared void by courts and one may be held liable for refusing to register for the NPR, though the above argument may be a good defense.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Duplicity: &lt;/b&gt;Duplicity is a problem under the NPR Scheme. Biometric data is collected twice before the NPR exercise is completed. Even if one has registered under the UID scheme, they have to give their biometric information again under the NPR scheme. The first instance of collection of biometric information is for the UID number and the second, under the NPR scheme. The latter is necessary even if the data has already been collected for the UID number. Since the parties collecting biometric information for NPR are empanelled by the UIDAI and the eligibility is the same, the data is subject to the same or similar threats of data leakage that may arise when registering for the UID. The multi-level data collection only amplifies the admitted vulnerability of data as unauthorized actors can unlawfully access the data at any stage. This, coupled with the fact that UIDAI has to harmonize the NPR and UID schemes, and that the data comes to the UIDAI for de-duplication, means that the NPR data could be used by the UIDAI, but it may not result in a UID Number. There is no data that disproves this potential. This is a matter of concern, as one who wishes not to register for a UID number, in protection of their privacy, is at peril for their data falls into the hands of the UIDAI.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Biometric data collectors under the NPR scheme empanelled by the UIDAI:&lt;/b&gt; The service providers collecting biometric data under the NPR are selected through bids and need to be empanelled with the UIDAI.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; Most enrolment agencies that are empanelled with the UIDAI are either IT or online marketing companies&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;, making the fear of targeted marketing even more likely.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Public display and verification: &lt;/b&gt;Under the NPR scheme, the biometric and demographic information and UID number of registrants is publicly displayed in their local area for verification.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; However, it is a violation of privacy to have sensitive personal data, such as biometrics put up publicly. Not only will the demographic information be readily accessible, nothing will prohibit the creation of a mailing list or collection of data for either data theft or for sending unsolicited commercial communication. The publicly available information is the kind of information that can be used for verification (Know Your Customer) and to authorize financial transactions. Since the personal information is displayed in the data subject’s local area, it is arguably a more invasive violation of privacy, since the members of the local area can make complex connections between the data subject and the data.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Smart Card: &lt;/b&gt;The desired outcome of the NPR scheme is an NPR card. This card is to contain a chip, which is embedded with information such as the UID Number, biometrics and the demographic information. It is still unclear as to whether this information will be machine-readable. If so, this information may be just a swipe away. However, this cannot be confirmed without information on the level encryption and how the data will be stored on the chip.&lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;‘Privacy safeguards available under the UID and NPR schemes are ad-hoc and incomplete&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The safeguards under both the UID and NPR schemes are quite similar, since the UIDAI and its empanelled biometric service providers are involved in collecting biometric information for both the UID and the NPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pilot studies for the UID scheme, including the use of biometrics, were not conducted in advance to implementation. In line with this, the enactment of a legislation governing the UID and the implementation of policies with respect to data handling and use will be made as and when the need arises. The development of safeguards in relation to the NPR will also be ad-hoc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the data standards for one will potentially influence that of the other scheme. For instance, the change in privacy standards for handling biometrics under the UID may affect the empanelment of biometric service providers. This will automatically affect the data security level the NPR can seek to achieve.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Being developed ad-hoc and after the fact, there is a risk that these regulations may unreasonably curtail the rights of data subjects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing Indian laws on data protection and privacy are not comprehensive. Certain laws protect privacy only in specific situations. For instance, the IT Act and related rules protect privacy in relation to digital information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any body that collects sensitive personal data such as biometric data, or any other data for processing and storage has a legal mandate under the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011 to make certain disclosures BEFORE OR WHILE THE DATA IS COLLECTED. This includes, &lt;i&gt;inter-alia,&lt;/i&gt; disclosures of (i) the purpose of information collection, (ii) the intended recipients of the information and (iii) name and addresses of the collector and of the party retaining the data.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Rules, the data collector has a duty to give the data subject an option to withhold personal sensitive information.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; A conversation with a data subject shows that this safeguard has not been upheld. The subject also conveyed a lack of knowledge of who the collection agency was. This is a problem of lack of accountability, as the data path cannot be traced and the party responsible for misuse or breach of security cannot be held liable.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The data collection under the NPR and UID schemes shows several vulnerabilities. Apart from the vulnerabilities with biometric information, there is a real risk of misuse of the data and documents submitted for enrolment under these schemes. Since the data collectors are primarily online marketing or IT service providers, there is likelihood that they will use this data for marketing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can only hope that in time, data subjects will be able to withdraw their personal data from the UID database and surrender their UID number. We can only wait and watch to see whether (i) the UID Number is a legal prerequisite for the NPR Card and (ii) whether the compulsion to register for NPR is done away with.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; &lt;a href="https://portal.uidai.gov.in/uidwebportal/dashboard.do"&gt;https://portal.uidai.gov.in/uidwebportal/dashboard.do&lt;/a&gt; accesed: 21 August, 2014&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; As of January 2013, only 25 RTI requests were made to the UIDAI &lt;a href="http://uidai.gov.in/rti/rti-requests.html"&gt;http://uidai.gov.in/rti/rti-requests.html&lt;/a&gt; accessed: 21 August, 2014&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; DIT-NPR Management Information System accessed: 22 August, 2014 &lt;a href="http://nprmis.nic.in/NPRR33_DlyDigitPrgGraph.aspx"&gt;http://nprmis.nic.in/NPRR33_DlyDigitPrgGraph.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Cloud Still Hangs Over Aadhaar’s Future, Business Standard, accessed 28 August, 2014. &lt;a href="http://www.business-standard.com/article/current-affairs/cloud-still-hangs-over-aadhaar-s-future-114081401131_1.html"&gt;http://www.business-standard.com/article/current-affairs/cloud-still-hangs-over-aadhaar-s-future-114081401131_1.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Frost &amp;amp; Sullivan, Best Practices Guide to Biometrics, accessed: 13 August, 2014 &lt;a class="external-link" href="http://www.google.co.in/url?sa=t&amp;amp;amp;rct=j&amp;amp;amp;q=&amp;amp;amp;esrc=s&amp;amp;amp;source=web&amp;amp;amp;cd=5&amp;amp;amp;cad=rja&amp;amp;amp;uact=8&amp;amp;amp;ved=0CD8QFjAE&amp;amp;amp;url=http%3A%2F%2Fwww.frost.com%2Fprod%2Fservlet%2Fcpo%2F240303611&amp;amp;amp;ei=6VbsU4m8HcK58gWx64DYDQ&amp;amp;amp;usg=AFQjCNGqan81fX6qtG0S4VV6oh_B5R_QYg&amp;amp;amp;sig2=cOOPm1JJ79AcJq2Gfq1_3Q&amp;amp;amp;bvm=bv.73231344,d.dGc"&gt;http://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CD8QFjAE&amp;amp;url=http%3A%2F%2Fwww.frost.com%2Fprod%2Fservlet%2Fcpo%2F240303611&amp;amp;ei=6VbsU4m8HcK58gWx64DYDQ&amp;amp;usg=AFQjCNGqan81fX6qtG0S4VV6oh_B5R_QYg&amp;amp;sig2=cOOPm1JJ79AcJq2Gfq1_3Q&amp;amp;bvm=bv.73231344,d.dGc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Malavika Jayaram, “India’s Identity Crisis”, Internet Monitor 2013, reflections of a digital world, accessed: 13 August, 2014 &lt;a href="http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2366840_code727672.pdf?abstractid=2366840&amp;amp;mirid=1"&gt;http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2366840_code727672.pdf?abstractid=2366840&amp;amp;mirid=1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt;M. Vatsa, et.al, “Analyzing Fingerprints of Indian Population Using Image Quality: A UIDAI Case Study” , accessed: 13 August, 2014 &lt;a href="https://research.iiitd.edu.in/groups/iab/ICPR2010-Fingerprint.pdf"&gt;https://research.iiitd.edu.in/groups/iab/ICPR2010-Fingerprint.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Prakash Chandra Sao, The Unique ID Project in India: An Exploratory Study, accessed: 21 August, 2014 &lt;a href="http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/"&gt;http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; R. 5(3) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011, accessed: 20 August, 2013 &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; National Identification Authority of India Bill, 2010 (Bill No. LXXV of 2010), accessed: 26 August,2014 http://164.100.24.219/BillsTexts/RSBillTexts/asintroduced/national%20ident.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Clause 23 of the NIAI Bill, 2010&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt;The UID Enrollment form, accessed: 26 August, 2014 &lt;a href="http://uidai.gov.in/images/uid_download/enrolment_form.pdf"&gt;http://uidai.gov.in/images/uid_download/enrolment_form.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Documents filed and relied on in Puttuswamy v Union of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Request for empanelment, accessed: 28 August, 2014. &lt;a href="http://uidai.gov.in/images/tenders/rfe_for_concurrent_evaluation_of_processoperation_at_enrolment_centers_13082014.pdf"&gt;http://uidai.gov.in/images/tenders/rfe_for_concurrent_evaluation_of_processoperation_at_enrolment_centers_13082014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; This information is available from the documents filed and relied on in Puttuswamy v Union Of India, which is being heard in the Supreme Court of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; An anonymous registrant observes that the data was scanned behind a screen and was not visible from the registered counter. The registrant is concerned that, in addition to collection of information for the UID, photocopies or digital copies could be taken for other uses and the registrant would not know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Counter Affidavit filed in the Supreme Court of India on behalf on New Delhi in K. Puttuswamy v Union of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also admitted that the census is equally vulnerable. The information collected through census is used for the NPR exercise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Para. 48 in the Counter Affidavit filed by NCR Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Affidavit in K. Puttuswamy v Union of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;See also: &lt;/i&gt;FAQs: Enrollment Agencies, accessed 22 August, 2014 &lt;a href="http://uidai.gov.in/faq.html?catid=37"&gt;http://uidai.gov.in/faq.html?catid=37&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Usha Ramanathan, A Tale of Two Turfs, The Statesman, accessed: 20 August, 2014 &lt;a href="http://www.thestatesman.net/news/10497-a-tale-of-two-turfs-npr-and-uid.html?page=3"&gt;http://www.thestatesman.net/news/10497-a-tale-of-two-turfs-npr-and-uid.html?page=3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; RFQ for Engaging MSP for Biometric Enrolment for the Creation of NPR, accessed: 26 August, 2014 http://ditnpr.nic.in/pdf/120102_RFQBiometricUrban_rebidding-Draft.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Prakash Chandra Sao, The Unique ID Project in India: An Exploratory Study, accessed: 21 August, 2014 &lt;a href="http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/"&gt;http://subversions.tiss.edu/the-unique-id-project-in-india-an-exploratory-study/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;a href="http://censusindia.gov.in/2011-Common/IntroductionToNpr.html"&gt;http://censusindia.gov.in/2011-Common/IntroductionToNpr.html&lt;/a&gt;, accessed: 26 August, 2014&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; R. 5(3) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011, accessed: 20 August, 2013 &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; R. 5(7) of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal data or Information) Rules, 2011.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation'&gt;https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Mukta Batra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-19T06:12:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis">
    <title>Biometrics or bust? India's Identity Crisis</title>
    <link>https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis</link>
    <description>
        &lt;b&gt;Malavika Jayaram is speaking at an event organized by the Oxford Internet Institute on July 2, 2013. The talk will be held at Oxford Internet Institute, University of Oxford, 1 St Giles Oxford OX1 3JS.&lt;/b&gt;
        &lt;hr /&gt;
&lt;div class="story" style="text-align: justify; "&gt;
&lt;p&gt;This info was &lt;a class="external-link" href="http://www.oii.ox.ac.uk/events/?id=602"&gt;published on the Oxford Internet Institute website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;India's mammoth biometric ID project, which has  registered around 270 million people and is yet to be fully realized, is  already the worldís largest such endeavor. It is marketed as a  potential game-changer both domestically (where it is touted as a silver  bullet to solve most problems) and internationally (where countries  wait and watch this experiment before importing it into their own  jurisdictions). Alongside all the hype about the scale of the scheme,  its potential for transforming the delivery of services and the scope  for private participation in traditionally state-controlled functions,  there are fears of function creep, of subversion to create new types of  fraud and corruption, of increased profiling and targeting, and of a  citizenry becoming transparent to its government in an unprecedented  way, all in the name of ambiguous benefits and the rhetoric of  inclusion.&lt;/p&gt;
&lt;p&gt;The government praises the ease and efficiency of  centralized databases, the promise of technology (including the myth of  biometrics uniquely and unambiguously identifying people in a foolproof  way) and the construction of the identified self. However, there is  growing awareness of the dangers of joined-up databases resulting in  exclusion rather than inclusion, and persecution rather than  democratization.&lt;/p&gt;
&lt;p&gt;The scheme is technically voluntary, but with the  provision of benefits, goods and services being increasingly linked to  the scheme, it will soon become impossible to function in India without a  biometric ID. If every facet of everyday life is linked to this single  number, it renders all claims of voluntariness meaningless. The lack of  information self-determination in a biometrically mediated universe has  important ramifications for anonymity, free speech and the maintenance  of an essential private sphere.&lt;/p&gt;
&lt;p&gt;In this talk, Malavika will  provide an overview of the scheme as well as the debate around privacy  and autonomy that it has triggered, framed against the backdrop of a  larger civil liberties crisis. She will also describe Indiaís efforts to  craft new privacy and data protection legislation.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis'&gt;https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:49:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/biometrics-or-bust-implications-of-uid-for-participation-and-inclusion">
    <title>Biometrics or Bust? Implications of the UID for Participation and Inclusion</title>
    <link>https://cis-india.org/events/biometrics-or-bust-implications-of-uid-for-participation-and-inclusion</link>
    <description>
        &lt;b&gt;Malavika Jayaram will give a talk on biometrics and the implications of UID for participation and inclusion at the office of the Centre for Internet and Society in Bangalore on January 10, 2014 at 6.00 p.m.&lt;/b&gt;
        &lt;h2&gt;Abstract&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Privacy is often portrayed as a luxury, as the intellectual preoccupation of nerdy privileged liberals, and an issue of salience only to the elite. This ignores the reality of the most marginalized sections of a society being disproportionately impacted by privacy intrusive technologies. The collusion of public and private agendas towards implementing large welfare projects is generally seen as progressive and neutral, yet the consequences of even well-intentioned efforts that trade privacy for convenience, welfare, security or a host of other compelling goals is troubling. The use of biometric technologies further complicates matters: the assumption that bodies can be rendered into infallible verifiers, as repositories of unchanging truth, is not without its catalogue of failures. This talk will examine the notion of biometric representations as a kind of capital, the possibility that failures are endemic to their functioning, and the implications of systemic errors on equality, participation and democracy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Malavika Jayaram&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Malavika is a Fellow at the Berkman Center for Internet and Society at Harvard University, focusing on privacy, identity and free expression. She is also a Fellow at the Centre for Internet and Society, Bangalore, and the author of the India chapter for the Data Protection &amp;amp; Privacy volume in the Getting the Deal Done series.  Malavika is one of 10 Indian lawyers in The International Who's Who of Internet e-Commerce &amp;amp; Data Protection Lawyers directory. In August 2013, she was voted one of India’s leading lawyers and one of only 8 women to be featured in the “40 under 45” survey conducted by Law Business Research, London. In a different life, she spent 8 years in London, practicing law with global firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology group, and as VP and Technology Counsel at Citigroup. During 2012-2013, she was a Visiting Scholar at the Annenberg School for Communication, University of Pennsylvania. She is working on completing her PhD at the National Law School.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/biometrics-or-bust-implications-of-uid-for-participation-and-inclusion'&gt;https://cis-india.org/events/biometrics-or-bust-implications-of-uid-for-participation-and-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-06T08:56:51Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/biometric-identification">
    <title>Biometric Identification: Specified Error, Accuracy and Efficiency, Considered for the Operations of the UIDAI — A Talk by Hans Varghese Mathews</title>
    <link>https://cis-india.org/internet-governance/biometric-identification</link>
    <description>
        &lt;b&gt;Hans Varghese Mathews gave a public lecture on biometric identification at the Centre for Internet &amp; Society office in Bangalore on August 17, 2012 at 5.00 p.m.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/uid-summary-of-findings.pdf" class="internal-link"&gt;Click&lt;/a&gt; to read UID Summary by Hans Varghese Mathews&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/biometric-identification'&gt;https://cis-india.org/internet-governance/biometric-identification&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-10T08:07:28Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming">
    <title>Bill to create bank for DNA profiling of accused coming</title>
    <link>https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming</link>
    <description>
        &lt;b&gt;Access to data only for victim’s or suspect’s relatives. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Aarthi Dhar was published in the &lt;a class="external-link" href="http://www.thehindu.com/news/national/bill-to-create-bank-for-dna-profiling-of-accused-coming/article4019621.ece"&gt;Hindu&lt;/a&gt; on October 21, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;A Bill to create a DNA data centre to profile people accused of serious crimes and unknown deceased is in the works. The proposal was originally mooted in 2007 but was dropped to factor in ethical, moral and legal issues on the sensitive matter.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Crafted by the Department of Biotechnology, it allows Deoxyribose Nucleic Acid (DNA) profiling for cases of culpable homicide, murder, death by negligence, miscarriage, dowry deaths, causing death of new born child, sexual assault, unnatural offences, outraging the modesty of a woman, co-habitation with a woman by deceit, adultery, enticing a married woman with criminal intent, among others.&lt;/p&gt;
&lt;p class="body"&gt;&lt;b&gt;Protecting privacy&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Addressing issues related to protecting privacy of individuals, the draft Bill envisages that access to the information in the National DNA Data Bank will be restricted to those related to the victim or suspect; any individual undergoing a sentence of imprisonment or death sentence can apply to the court which convicted him, for an order of DNA testing of specific evidence under specific conditions.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Human DNA Profiling Bill seeks to establish a DNA Profiling Board that will lay down the standards for laboratories, collection of human body substances and custody trail from collection to reporting. It also has a provision for setting up a National DNA Data Bank.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The DNA analysis of body substances that makes it possible to determine whether the source of origin of one body substance is identical to that of another, and to establish the biological relationship, if any, between two individuals.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The “forensic material” from which the DNA sample can be lifted is biological material from the body and represents intimate body samples. They include blood, semen, or any other tissue fluid.&lt;/p&gt;
&lt;p class="body"&gt;&lt;b&gt;DNA Profiling Board&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As envisaged in the Bill, the DNA Profiling Board at the national level, with similar structures at the State level, will be headed by a renowned molecular biologist with the other members being from police, legal, biological and related fields.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It will deliberate and advise on all ethical and human rights issues emanating out of DNA profiling in consonance with the United Nations vis-à-vis the rights and privacy of citizens, civil liberties and issues having ethical and other social implications.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Board will make recommendations on the use and dissemination of DNA information, ensure the accuracy, security and confidentiality of DNA and guidelines destruction of obsolete, expunged or inaccurate information.&lt;/p&gt;
&lt;p class="body"&gt;&lt;b&gt;Jail, fine for data misuse&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It will also will lay down standards and procedures for establishment and functioning of DNA laboratories and Data Banks and prepare guidelines for storage of biological substances and their destruction. Any misuse of DNA data will attract imprisonment up to three years and monetary fine.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The working draft of the Bill has been sent to the Centre for Internet and Society for analysis and comments. The Citizens Forum for Civil Liberties has already opposed the proposed legislation and sought pre-emptive intervention to stop “dangerous” erosion of privacy by DNA profiling of citizens.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In a representation submitted to the National Human Rights Commission, the Forum has said DNA profiling is “undesirable, particularly as forensic DNA developments are intertwined with significant changes in legislation and contentious issues of privacy, civil liberty and social justice.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Forum has sought “immediate intervention to safeguard citizens’ privacy and their civil liberties, which face an unprecedented onslaught from the provisions of the DNA Profiling Bill and other related surveillance measures being bulldozed by unregulated and ungovernable technology.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming'&gt;https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T09:15:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people">
    <title>Biggest blast on Aadhaar leak so far: govt sites leaked data of 13 crore people</title>
    <link>https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people</link>
    <description>
        &lt;b&gt;In yet another shocking report of personal data breach in India, it has emerged that Aadhaar data of 13 crore people was put out on websites of four major government projects in the country. The leaked data include bank account details of over one crore people linked to Aadhar numbers under the direct benefit scheme. Over eight crore people lost their private data on the national job guarantee scheme website alone.&lt;/b&gt;
        &lt;p&gt;The article by Jikku Varghese Jacob was &lt;a href="http://english.manoramaonline.com/news/nation/2017/05/01/government-sites-leaked-aadhaar-data-of-13-crore-cis-report.html"&gt;published by Manorama&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The shocking details have surfaced in a report released by the       Center for Internet Society (CIS) which deals with the publication       of Aadhaar data and their security. It appears to be the biggest       blast on Aadhaar data leak yet. The report says these pieces of       information were available on Internet since last November. Once       detected, the CIS officials had initiated steps to remove them.&lt;/p&gt;
&lt;p&gt;The CIS report cites two central government portals and websites       from Andhra Pradesh as violators. Following are the websites that       published the data:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;National Social Assistance Programme (under the Ministry of       Rural Development).&lt;/li&gt;
&lt;li&gt;The national portal of the job guarantee scheme.&lt;/li&gt;
&lt;li&gt;Daily online payment reports (Government of Andhra Pradesh)&lt;/li&gt;
&lt;li&gt;Chandranna Bheema project (Government of Andhra Pradesh)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Private data of 1,59,42,083 people were leaked on the social       assistance scheme site. The two Andhra Pradesh sites breached the       privacy of three crore people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information leaked on most of the sites could be downloaded as       Excel sheet. It is estimated that data on 23 crore people is       linked to Aadhaar under the direct benefit scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS fears that if other government sites have also handled       such data without care there could have occurred a massive data       base breach. The CIS put in months of effort before finalizing       this report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was recently found that Aadhaar data on 35 lakh people in       Kerala was found disclosed on the state's Sevana Pension website.       In Jharkhand, 14 lakh people had their privacy violated when their       Aadhaar information was put out on a government website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such leaks of Aadhaar data is a crime that can fetch up to three       years of imprisonment. Complaints have arisen that government       departments did not bother to comply with an IT ministry directive       last month to remove the Aadhaar data from websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts point out that criminals can misuse personal data on       Aadhaar and bank account. The data could be used to obtain SIM       cards and carry out transactions online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar, the world's largest bio-metric enrolment in India, will       enrol 1.2 billion people in a 12-digit unique number for each       person to be issued to each resident in the country. The number       with its biometric information – photograph, fingerprints and iris       scan – of each individual is easily verifiable in an online.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people'&gt;https://cis-india.org/internet-governance/news/manorama-may-2-2017-jikku-varghese-jacob-biggest-blast-on-aadhaar-leak-so-far-govt-sites-leaked-data-of-13-crore-people&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-03T14:35:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-dog-is-watching-you">
    <title>BigDog is Watching You! The Sci-fi Future of Animal and Insect Drones</title>
    <link>https://cis-india.org/internet-governance/blog/big-dog-is-watching-you</link>
    <description>
        &lt;b&gt;Do you think robotic aeroplanes monitoring us are scary enough? Wait until you read about DARPA´s new innovative and subtle way to keep us all under the microscope! This blog post presents a new reality of drones which is depicted in none other than animal and insect-like robots, equipped with cameras and other surveillance technologies. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Just when we thought we had seen it all, the US Defence Advanced Research Projects Agency (DARPA) funded another controversial surveillance project which makes even the most bizarre sci-fi movie seem like a pleasant fairy-tale in comparison to what we are facing: animal and insect drones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Up until recently, unmanned aerial vehicles (UAVs), otherwise called drones, depicted the scary reality of surveillance, as robotic pilot-less planes have been swarming the skies, while monitoring large amounts of data without people´s knowledge or consent. Today, DARPA has come up with more subtle forms of surveillance: animal and insect drones. Clearly animal and insect-like drones have a much better camouflage than aeroplanes, especially since they are able to go to places and obtain data that mainstream UAVs can not.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;India´s ´DARPA´, the Defence Research and Development Organisation (DRDO), has been creating &lt;a href="http://www.indiastrategic.in/topstories1369_Unmanned_Aerial_Vehicle.htm"&gt;&lt;span&gt;UAVs&lt;/span&gt;&lt;/a&gt; over the last ten years, while the Indian Army first acquired UAVs from Israel in the late 1990s. Yet the use of all UAVs in India is still poorly regulated! Drones in the U.S. are regulated by the &lt;a href="http://www.faa.gov/"&gt;&lt;span&gt;Federal Aviation Administration (FAA)&lt;/span&gt;&lt;/a&gt;, whilst the &lt;a href="https://www.easa.europa.eu/what-we-do.php"&gt;&lt;span&gt;European Aviation Safety Agency (EASA)&lt;/span&gt;&lt;/a&gt; regulates drones in the European Union. In India, the &lt;a href="http://www.civilaviation.gov.in/MocaEx/faces/index.html;jsessionid=BLvyRvDp2NJzl4Q264fTNkXdynJkvJGF6bK1rSJtCrcJzwq1pym2!-750232318?_adf.ctrl-state=buu3l8xph_4"&gt;&lt;span&gt;Ministry of Civil Aviation&lt;/span&gt;&lt;/a&gt; regulates drones, whilst the government is moving ahead with plans to&lt;a href="http://indiatoday.intoday.in/story/aviation-ministry-moots-to-replace-dgca-with-a-super-regulator/1/224097.html"&gt;&lt;span&gt; replace the Directorate General of Civil Aviation (DGCA)&lt;/span&gt;&lt;/a&gt; with a Civil Aviation Authority. However, current Indian aviation laws are vague in regards to data acquired, shared and retained, thus not only posing a threat to individual´s right to privacy and other human rights, but also enabling the creation of a secret surveillance state.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The DRDO appears to be following DARPA´s footsteps in terms of surveillance technologies and the questions which arise are: will animal and insect drones be employed in India in the future? If so, how will they be regulated?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;BigDog/LS3&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/40gECrmuCaU" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Apparently having UAVs flying above us and monitoring territories and populations without our knowledge or consent was not enough. DARPA is currently funding the &lt;a href="http://defensetech.org/2012/02/08/video-the-latest-terrifying-drone-dog/"&gt;BigDog project&lt;/a&gt;, which is none other than a drone dog, a four-legged robot equipped with a camera and capable of surveillance in disguise. DARPA and Boston Dynamics are working on the latest version of BigDog, called the &lt;a href="http://www.darpa.mil/Our_Work/TTO/Programs/Legged_Squad_Support_System_%28LS3%29.aspx"&gt;Legged Squad Support System (LS3)&lt;/a&gt;, which can carry 400 pounds of gear for more than 20 miles without refuelling. Not only can the LS3 walk and run on all types of surfaces, including ice and snow, but it also has ´vision sensors´ which enable it to autonomously maneuver around obstacles and follow soldiers in the battle field. The LS3 is expected to respond to soldiers' voice commands, such as 'come', 'stop' and 'sit', as well as serve as a battery charger for electronic devices.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;BigDog/LS3 is undoubtedly an impressive technological advancement in terms of aiding squads with surveillance, strategic management and a mobile auxiliary power source, as well as by carrying gear. Over the last century most technological developments have manifested through the military and have later been integrated in societies. Many questions arise around the BigDog/LS3 and its potential future use by governments for non-military purposes. Although UAVs were initially used for strictly military purposes, they are currently also being used by governments on an international level for &lt;a href="http://www.nasa.gov/centers/dryden/pdf/111760main_UAV_Assessment_Report_Overview.pdf"&gt;civil purposes&lt;/a&gt;, such as to monitor climate change and extinct animals, as well as to surveille populations. Is it a matter of time before BigDog is used by governments for ´civil purposes´ too? Will robotic dogs swarm cities in the future to provide ´security´?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Like any other surveillance technology, the LS3 should be legally regulated and current lack of regulation could create a potential for abuse. Is authorisation required to use a LS3? If so, who has the legal right to authorise its use? Under what conditions can authorisation be granted and for how long? What kind of data can legally be obtained and under what conditions? Who has the legal authority to access such data? Can data be retained and if so, for how long and under what conditions? Do individuals have the right to be informed about the data withheld about them? Just because it´s a ´dog´ should not imply its non-regulation. This four-legged robot has extremely intrusive surveillance capabilities which may breach the right to privacy and other human rights when left unregulated.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Humming Bird Drone&lt;/span&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/hummingbirddronepic.png/@@images/f6c4be7f-597d-4909-914e-6470256cb1c9.png" style="text-align: justify; " title="Humming bird drone" class="image-inline" alt="Humming bird drone" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Source:&lt;a class="external-link" href="http://www.hightech-edge.com/aerovironment-nano-humming-bird-flapping-wing-uav-video-clip/10309/"&gt; HighTech Edge&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;TIME magazine recognised DARPA for its Hummingbird nano air vehicle (NAV) and named the drone bird&lt;a href="http://www.darpa.mil/newsevents/releases/2011/11/24.aspx"&gt;&lt;span&gt; one of the 50 best inventions of 2011&lt;/span&gt;&lt;/a&gt;. True, it is rather impressive to create a robot which looks like a bird, behaves like a bird, but serves as a secret spy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;During the presentation of the humming bird drone, &lt;a href="http://www.ted.com/talks/regina_dugan_from_mach_20_glider_to_humming_bird_drone.html"&gt;&lt;span&gt;Regina Dugan&lt;/span&gt;&lt;/a&gt;, former Director of DARPA, stated:&lt;/p&gt;
&lt;p class="callout" dir="ltr" style="text-align: justify; "&gt;&lt;i&gt;"&lt;/i&gt;Since we took to the sky, we have wanted to fly faster and farther. And to do so, we've had to believe in impossible things and we've had to refuse to fear failure&lt;i&gt;."&lt;/i&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Although believing in 'impossible things' is usually a prerequisite to innovation, the potential implications on human rights of every innovation and their probability of occurring should be examined. Given the fact that drones already exist and that they are used for both military and non-military purposes, the probability is that the hummingbird drone will be used for civil purposes in the future. The value of data in contemporary information societies, as well as government's obsession with surveillance for ´national security´ purposes back up the probability that drone birds will not be restricted to battlefields.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;So should innovation be encouraged for innovation’s sake, regardless of potential infringement of human rights? This question could open up a never-ending debate with supporters arguing that it´s not technology itself which is harmful, but its use or misuse. However the current reality of drones is this: UAVs and NAVs are poorly regulated (if regulated at all in many countries) and their potential for abuse is enormous, given that &lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;´what happens to our data happens to ourselves....who controls our data controls our lives.´&lt;/span&gt;&lt;/a&gt; If UAVs are used to surveille populations, why would drone birds not be used for the same purpose? In fact, they have an awesome camouflage and are potentially capable of acquiring much more data than any UAV! Given the surveillance benefits, governments would appear irrational not to use them.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;MeshWorms and Remote-Controlled Insects&lt;/span&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/picofmeshworm.png" alt="MeshWorm" class="image-inline" title="MeshWorm" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Source: &lt;a class="external-link" href="http://www.nydailynews.com/news/national/scientists-create-resilient-robot-worm-medicine-electronics-spy-missions-roboticists-leading-universities-wroking-pentagon-grant-created-super-durable-synthetic-worm-call-meshworm-robot-article-1.1134361"&gt;NY Daily News&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Think insects are creepy? Now we can have a real reason to be afraid of them. Clearly robotic planes, dogs and birds are not enough.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;DARPA´s &lt;a href="http://www.bbc.co.uk/news/technology-19200285"&gt;&lt;span&gt;MeshWorm project&lt;/span&gt;&lt;/a&gt; entails the creation of earthworm-like robots that crawl along surfaces by contracting segments of their bodies. The MeshWorm can squeeze through tight spaces and mold its shape to rough terrain, as well as absorb heavy blows. This robotic worm will be used for military purposes, while future use for ´civil purposes´ remains a probability.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Robots, however, are not only the case. Actual insects are being wirelessly controlled, such as &lt;a href="http://www.technologyreview.com/news/411814/the-armys-remote-controlled-beetle/"&gt;&lt;span&gt;beetles with implanted electrodes&lt;/span&gt;&lt;/a&gt; and a radio receiver on their back. The giant flower beetle´s size enables it to carry a small camera and a heat sensor, which constitutes it as a reliable mean for surveillance.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Other&lt;/span&gt;&lt;a href="http://www.wired.com/dangerroom/2012/06/ff_futuredrones/"&gt; drone insects&lt;/a&gt;&lt;span&gt; look and fly like ladybugs and dragonflies. Researchers at the Wright State University in Dayton, Ohio, have been working on a butterfly drone since 2008. Former software engineer Alan Lovejoy has argued that the US is developing &lt;/span&gt;&lt;a href="http://www.businessinsider.com/the-future-of-micro-drones-is-getting-pretty-scary-according-to-alan-lovejoy-2012-6"&gt;mosquito drones&lt;/a&gt;&lt;span&gt;. Such a device could potentially be equipped with a camera and a microphone, it could use its needle to abstract a DNA sample with the pain of a mosquito bite and it could also inject a micro RFID tracking device under peoples´ skin. All such micro-drones could potentially be used for both military and civil purposes and could violate individuals´ right to privacy and other civil liberties.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Security vs. Privacy: The wrong debate&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;09/11 was not only a pioneering date for the U.S., but also for India and most countries in the world. The War on Terror unleashed a global wave of surveillance to supposedly enable the detection and prevention of crime and terrorism. Governments on an international level have been arguing over the last decade that the use of surveillance technologies is a prerequisite to safety. However, security expert, &lt;a href="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;, argues that the trade-off of privacy for security is a false dichotomy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Everyone can potentially be a suspect within a surveillance state. Analyses of Big Data can not only profile individuals and populations, but also identify ‘branches of communication’ around every individual. In short, if you know someone who may be considered a suspect by intelligence agencies, you may also be a suspect. The mainstream argument &lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;&lt;span&gt;“I have nothing to hide, I am not a terrorist’&lt;/span&gt;&lt;/a&gt; is none other than a psychological coping mechanism when dealing with surveillance. The reality of security indicates that when an individual’s data is being intercepted, the probability is that those who control that data can also control that individual’s life. Schneier has argued that&lt;a href="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;&lt;span&gt; privacy and security are not on the opposite side of a seesaw&lt;/span&gt;&lt;/a&gt;, but on the contrary, the one is a prerequisite of the other. Governments should not expect us to give up our privacy in exchange for security, as loss of privacy indicates loss of individuality and essentially, loss of freedom. We can not be safe when we trade-off our personal data, because privacy is what protects us from abuse from those in power. Thus the entire War on Terror appears to waged through a type of phishing, as the promise of ´security´ may be bait to acquire our personal data.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Since the &lt;a href="http://www.thenational.ae/news/world/south-asia/mumbai-police-to-get-aerial-drones-to-help-fight-crime"&gt;2008 Mumbai terrorist attacks&lt;/a&gt;, India has had more reasons to produce, buy and use  surveillance technologies, including drones. Last New Year´s Eve, the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-12-31/mumbai/36078903_1_surveillance-cameras-terror-outfits-netra"&gt;Mumbai police used UAVs&lt;/a&gt; to monitor hotspots, supposedly to help track down revellers who sexually harass women. The Chennai police recently procured &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/it-flies-it-swoops-it-records-and-monitors/article4218683.ece"&gt;three UAVs from Anna University &lt;/a&gt;to assist them in keeping an eye on the city´s vehicle flow. Raj Thackeray´s rally marked&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-08-22/news/33322409_1_mumbai-police-uav-unmanned-aerial-vehicle"&gt; the biggest surveillance exercise ever launched for a single event&lt;/a&gt;, which included UAVs. The Chandigarh police are the first Indian police force to use the &lt;a class="external-link" href="http://www.indianexpress.com/news/UAV--Chandigarh-police-spread-wings-with--Golden-Hawk-/779043/"&gt;´Golden Hawk´&lt;/a&gt; - a UAV which will keep a ´bird´s eye on criminal activities´. This new type of drone was manufactured by the &lt;span&gt;Aeronautical Development Establishment (one of DRDO's premier laboratories based in Bangalore) and as of 2011 is being used by Indian law enforcement agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Although there is no evidence that India currently has any animal or insect drones, it could be a probability in the forthcoming years. Since India is currently using many UAVs either way, why would animal and/or insect drones be excluded? What would prevent India from potentially using such drones in the future for ´civil purposes´? More importantly, how are ´civil purposes´ defined? Who defines ´civil purposes´and under what criteria? Would the term change and if so, under what circumstances? The term ´civil purposes´ varies from country to country and is defined by many political, social, economic and cultural factors, thus potentially enabling extensive surveillance and abuse of human rights.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Drones can potentially be as intrusive as other communications surveillance technologies, depending on the type of technology they´re equipped with, their location and the purpose of their use. As they can potentially violate individuals´ right to privacy, freedom of expression, freedom of movement and many other human rights, they should be strictly regulated. In&lt;a href="http://www.uavs.org/regulation"&gt;&lt;span&gt; Europe UAVs&lt;/span&gt;&lt;/a&gt; are regulated based upon their weight, as unmanned aircraft with an operating mass of less than 150kg are exempt by the EASA Regulation and its Implementation Rules. This should not be the case in India, as drones lighter than 150kg can potentially be more intrusive than other heavier drones, especially in the case of bird and insect drones.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Laws which explicitly regulate the use of all types of drones (UAVs, NAVs and micro-drones) and which legally define the term ´civil purposes´ in regards to human rights should be enacted in India. Some thoughts on the authorisation of drones include the following: A Special Committee on the Use of All Drones (SCUAD) could be established, which would be comprised of members of the jury, as well as by other legal and security experts of India. Such a committee would be the sole legal entity responsible for issuing authorisation for the use of drones, and every authorisation would have to comply with the constitutional and statutory provisions of human rights.  Another committee, the Supervisory Committee on the Authorisation of the Use of Drones (lets call this ´SCAUD´), could also be established, which would also be comprised by (other) members of the jury, as well as by (other) legal and security experts of India. This second committee would supervise the first and it would ensure that SCUAD provides authorisations in compliance with the laws, once the necessity and utility of the use of drones has been adequately proven.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;It´s not about ´privacy vs. security´. Nor is it about ´privacy or security´. In every democratic state, it should be about ´privacy and security´, since the one cannot exist without the other. Although the creation of animal and insect drones is undoubtedly technologically impressive, do we really want to live in a world where even animal-like robots can be used to spy on us? Should we be spied on at all? How much privacy do we give up and how much security do we gain in return through drones? If drones provided the ´promised security´, then India and all other countries equipped with these technologies should be extremely safe and crime-free; however, that is not the case.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In order to ensure that the use of drones does not infringe upon the right to privacy and other human rights, strict regulations are a minimal prerequisite. As long as people do not require that the use of these spying technologies are strictly regulated, very little can be done to prevent a scary sci-fi future. That´s why this blog has been written.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-dog-is-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-dog-is-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:38:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-rajat-kathuria-isha-suri-big-tech-consumers-privacy-policy">
    <title>Big Tech’s privacy promise to consumers could be good news — and also bad news</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-rajat-kathuria-isha-suri-big-tech-consumers-privacy-policy</link>
    <description>
        &lt;b&gt;Rajat Kathuria, Isha Suri write: Its use as a tool for market development must balance consumer protection, innovation, and competition.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In February, Facebook, rebranded as Meta, stated that its revenue in 2022 is anticipated to reduce by $10 billion due to steps undertaken by Apple to enhance user privacy on its mobile operating system. More specifically, Meta attributed this loss to a new AppTrackingTransparency feature that requires apps to request permission from users before tracking them across other apps and websites or sharing their information with and from third parties. Through this change, Apple effectively shut the door on “permissionless” internet tracking and has given consumers more control over how their data is used. Meta alleged that this would hurt small businesses benefiting from access to targeted advertising services and charged Apple with abusing its market power by using its app store to disadvantage competitors under the garb of enhancing user privacy.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Access the full article published in the &lt;a class="external-link" href="https://indianexpress.com/article/opinion/columns/big-tech-consumers-privacy-policy-7866701/"&gt;Indian Express&lt;/a&gt; on April 13, 2022&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-rajat-kathuria-isha-suri-big-tech-consumers-privacy-policy'&gt;https://cis-india.org/internet-governance/blog/indian-express-rajat-kathuria-isha-suri-big-tech-consumers-privacy-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rajat Kathuria and Isha Suri</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-01-18T23:25:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou">
    <title>Big Democracy: Big Surveillance - A talk by Maria Xynou</title>
    <link>https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou</link>
    <description>
        &lt;b&gt;Next Tuesday, Maria Xynou will be presenting her latest research on surveillance in India. Come and engage in a discussion on India's controversial surveillance schemes, surveillance industry and much much more! &lt;/b&gt;
        
&lt;p&gt;And so we've heard a lot about the Edward Snowden leaks and about the NSA's controversial mass surveillance projects. But what's happening in India?&lt;/p&gt;
&lt;p&gt;It turns out that the world's largest democracy has some of the most controversial surveillance schemes in the world! Some of India's laws, schemes, projects and technologies are unbeatable when it comes to mass surveillance, censorship and control. While India may be a developing country with issues ranging from poverty to corruption, it nonetheless appears to be at the forefront of surveillance on an international level.&lt;/p&gt;
&lt;p&gt;Join us at the Centre for Internet and Society (CIS) on 3rd December 2013 to hear about India's surveillance laws, schemes and technologies and to engage in a discussion on the potential implications. All that is required is an open mind, critical thought and a will to challenge that which has not been challenged!&lt;/p&gt;
&lt;p&gt;We look forward to seeing you all and to hearing your thoughts, ideas and opinions!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/P6tG8jl6cuo" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou'&gt;https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-12T10:23:21Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state">
    <title>Big Democracy, Big Surveillance: India's Surveillance State</title>
    <link>https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state</link>
    <description>
        &lt;b&gt;In India, surveillance is on the rise by the state to tackle crime and terrorism, and private companies are eager to meet the demand.&lt;/b&gt;
        &lt;p&gt;This article by Maria Xynou was&lt;a class="external-link" href="http://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state"&gt; published by OpenDemocracy&lt;/a&gt; on 10 February 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Worried about the secret, mass surveillance schemes being carried out by the NSA? While we should be, some of the surveillance schemes in the world's largest democracy, India, are arguably&lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt; in the same league&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="http://www.amazon.com/Globalization-Surveillance-Armand-Mattelart/dp/0745645119"&gt;Surveillance is being globalised&lt;/a&gt; to the extent that even India, a country with huge poverty issues, is investing millions of dollars in creating an &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;expansive surveillance regime&lt;/a&gt;. However, why would communications monitoring interest Indian authorities, when the majority of the population lives below the line of poverty and &lt;a href="http://wearesocial.net/tag/india/"&gt;only 17% of the population&lt;/a&gt;&lt;a href="http://wearesocial.net/tag/india/"&gt; has access to the Internet&lt;/a&gt;?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The official political motivation behind surveillance in India appears to be the government's &lt;a href="http://digitaljournal.com/article/268467"&gt;determination to tackle terrorism&lt;/a&gt; in the country. The &lt;a href="http://edition.cnn.com/2013/09/18/world/asia/mumbai-terror-attacks/"&gt;2008 Mumbai terrorist attacks&lt;/a&gt; were arguably a similar landmark to the 9/11 terrorist attacks in the US, and both governments officially announced their intention to carry out surveillance as a counter-terrorism measure. However, unlike in the west, terrorist attacks in India are much more common, and the National Security Adviser reported in 2008 that 800 terrorist cells were operational in the country. With India’s history of &lt;a href="http://www.thenews.com.pk/Todays-News-2-210676-Major-terror-attacks-in-India-during-last-25-years"&gt;major terror attacks in India over the last 25 years&lt;/a&gt;, it's easy for one to be persuaded that terrorism is actually a major threat to national security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance schemes&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India’s surveillance programs mostly started following the 2008 Mumbai terror attacks. That was when the Ministry of Home Affairs first proposed the creation of a &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;National Intelligence Grid (NATGRID)&lt;/a&gt;, which will give &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;11 intelligence and investigative agencies real-time access to 21 citizen data sources&lt;/a&gt; to track terror activities. These citizen data sources will be provided by various ministries and departments, otherwise called “provider agencies”, and will include &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;bank account details, telephone records, passport data and vehicle registration details&lt;/a&gt;, among other types of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Home Affairs has &lt;a href="http://www.deccanherald.com/content/181065/mha-seeks-over-rs-3400.html"&gt;sought over Rs. 3,400 crore&lt;/a&gt; (around USD 540 million!) for the implementation of NATGRID, which aims to create comprehensive patterns of intelligence by collecting sensitive information from databases of departments like the police, banks, tax and telecoms to supposedly track any terror suspect and incident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But NATGRID is far from India's only data sharing scheme. In 2009 the Cabinet Committee on Economic Affairs approved the creation and implementation of the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Crime and Criminal Tracking Network &amp;amp; &lt;/a&gt;&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Systems&lt;/a&gt; (CCTNS), which would facilitate the sharing of databases among &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;14,000 police stations across all 35 states and Union Territories&lt;/a&gt; of India, excluding 6,000 police offices which are high in the police hierarchy. &lt;a href="http://www.thehindu.com/news/national/govt-launches-crime-tracking-pilot-project/article4272857.ece"&gt;Rs. 2,000 crore&lt;/a&gt; (around USD 320 million) have been allocated for the CCTNS, which is being implemented by the National Crime Records Bureau under the national e-governance scheme. The CCTNS not only increases transparency by automating the function of police stations, but also &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;provides the civil police with tools, technology and information&lt;/a&gt; to facilitate the investigation of crime and detection of criminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But apparently, sharing data and linking databases is not enough to track criminals and terrorists. As such, in the aftermath of the 2008 Mumbai terror attacks, the Indian government also implemented various interception systems. In September 2013&lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt; it was reported&lt;/a&gt; that the Indian government has been operating Lawful Intercept &amp;amp; Monitoring (LIM) systems, widely in secret. In particular, &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;mobile operators in India have deployed their own LIM systems&lt;/a&gt; allowing for the so-called “lawful interception” of calls by the government. And possibly to enable this, mobile operators are required to provide &lt;a href="http://telecomtalk.info/dot-tightens-norms-no-mobile-connection-without-physical-verification/102120/"&gt;subscriber verification&lt;/a&gt; to the Telecom Enforcement, Resource and Monitoring (TERM) cells of the Department of Telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Internet traffic, the LIM systems are deployed at the &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;international gateways of large Internet Service Providers (ISPs) &lt;/a&gt;and expand to a broad search across all Internet traffic using “keywords” and “key-phrases”. In other words, security agencies using LIM systems are capable of launching a search for suspicious words, resulting in the indiscriminate monitoring of all Internet traffic, possibly without court oversight and without the knowledge of ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has also automated and centralized the interception of communications through the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System (CMS)&lt;/a&gt;. This project was initially envisioned in 2009, following the 2008 Mumbai terror attacks and was approved in 2011.  The CMS intercepts all telecommunications in India and &lt;a href="https://cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about"&gt;centrally stores the data in national and regional databases&lt;/a&gt;. The CMS will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Agencies&lt;/a&gt; which will have access to the CMS include the Intelligence Bureau (IB), the Central Bureau of Investigation (CBI), the Directorate of Revenue Intelligence (DRI), the Research and Analysis Wing (RAW) and the National Investigation Agency (NIA).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike mainstream interception, where service providers are required to intercept communications and provision interception requests to law enforcement agencies, the Central Monitoring System will automate the entire process of interception. This means that the CMS authority will have centralized access to all intercepted data and that the authority can also bypass service providers in gaining such access. Once security agencies have access to this data, they are equipped with &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Direct Electronic Provisioning, filters and alerts on the target numbers&lt;/a&gt;, as well as with Call Details Records (CDR) analysis and data mining tools to identify the personal information of target numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that roughly &lt;a href="http://wearesocial.net/tag/india/"&gt;73% of India's population uses mobile phones&lt;/a&gt;, this means that the Central Monitoring System can potentially affect about 893 million people, more than double the population of the United States! However, how is it even possible for Indian authorities to mine the data of literally millions of people? Who supplies Indian authorities with the technology to do this and what type of technology is actually being used?&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance industry&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has the world's second largest population, consisting of more than a billion people and an expanding middle class. Undoubtedly, India is a big market and many international companies aspire in investing in the country. Unfortunately though, along with everything else being imported into India, surveillance technologies are no exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the biggest and most notorious surveillance technology companies in the world, such as ZTE, Utimaco and Verint, have offices in India. Even &lt;a href="https://citizenlab.org/2013/04/for-their-eyes-only-2/"&gt;FinFisher command and control servers&lt;/a&gt; have been found in India. However, in addition to allowing foreign surveillance technology companies to create offices and to sell their products and solutions in the country, local companies selling controversial spyware appear to be on the rise too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kommlabs Dezign is an Indian company which loves to show off its Internet monitoring solutions at&lt;a href="http://www.kommlabs.com/events.asp"&gt; various ISS trade shows&lt;/a&gt;, otherwise known as &lt;a href="http://www.wired.com/beyond_the_beyond/2011/12/at-the-wiretappers-ball/"&gt;“the Wiretapper's Ball”&lt;/a&gt;. In particular, Kommlabs Dezign sells VerbaNET, an Internet Interception Solution, as well as VerbaCENTRE, which is a Unified Monitoring Centre that can even detect cognitive and emotional stress in voice calls and flag them! In other words, Kommlabs Dezign makes a point that not only should we worry about what we text and say over our phones, but that we should also worry about what we sound like when on the phone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vehere is another Indian company which sells various surveillance solutions and notably sells vCRIMES, which is a Call Details Records (CDR) analysis system. VCRIMES is used to analyse and gather intelligence and to unveil hidden interconnections and relations through communications. This system also includes a tool for detecting sleeper cells through advanced statistical analysis and &lt;a href="http://www.veheretech.com/products/vcrimes/"&gt;can analyse more than 40 billion records in less than 3 seconds&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.paladion.net/"&gt;Paladion Networks&lt;/a&gt; is headquartered in Bangalore, India and sells various Internet Monitoring Systems, Telecom Operator Interception Systems, SSL Interception and Decryption Systems and Cyber Cafe Monitoring Systems to law enforcement agencies in India and abroad. In fact, Paladion Networks even states in its website that its &lt;a href="http://www.paladion.net/client_list.html"&gt;customers include India's Ministry of Information Technology and the U.S Department of Justice&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail Technologies is yet another Indian company which not only &lt;a href="http://www.issworldtraining.com/iss_europe/sponsors.html"&gt;sponsors global surveillance trade shows&lt;/a&gt; but also sells a wide range of monitoring solutions to law enforcement agencies in India and abroad. ComTrail is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;centralised mass interception and monitoring of voice and data networks&lt;/a&gt;, including Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls. Furthermore, ComTrail is equipped to handle millions of communications per day, correlating identities across multiple networks, and can instantly analyse data across thousands of terabytes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail also sells xTrail, which is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;targeted interception, decoding and analysis of data traffic over IP networks&lt;/a&gt; and which enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. Interestingly, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apparently, some the biggest challenges that law enforcement agencies face when monitoring communications include cases when targets operate from public Internet networks and/or use encryption. However, it turns out that ClearTrail's QuickTrail solution is designed to &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;gather intelligence from public Internet networks&lt;/a&gt;, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. This device can remotely deploy spyware into a target's computer and supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, QuickTrail can identify a target machine on the basis of metadata, such as an IP address, and can monitor Ethernet LANs in real time, as well as monitor Gmail, Yahoo and all other HTTPS-based communications. ClearTrail's mTrail is designed for the passive &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;'off-the-air' interception of GSM communications&lt;/a&gt;, including the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information. MTrail also identifies a target's location by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation of so-called “lawfully intercepted” calls in near real-time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, it looks like India is reaching the top league when it comes to surveillance technologies, especially since many of its companies and their products appear to be just as scary as some of the most sophisticated spying gear sold by the West. India may be the world's largest (by population) democracy, but that means that it has a huge population with way too many opinions...and apparently, the private and public sectors in India appear to be joining forces to do something about it.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So do Indians have nothing to hide?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A very popular rhetoric in both India and the west is that citizens should &lt;i&gt;not&lt;/i&gt; be concerned about surveillance because, after all, if they are not terrorists, they should have nothing to hide. However, privacy advocate &lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;Caspar Bowden&lt;/a&gt; has rightfully stated that this rhetoric is fundamentally flawed and that we should all indeed “have something to hide”. But is privacy just about “having something to hide”? &lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;Jacob Appelbaum&lt;/a&gt; has stated that this rhetoric is merely a psychological copying mechanism when dealing with security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's probably rather comforting and reassuring to think that we are not special or important enough for surveillance to affect us personally. But is that really up to us to decide? Unfortunately not. The very point of data mining is to match patterns, create profiles of individuals and to unveil hidden interconnections and relations. A data analyst can uncover more information about us than what we are even aware of and it is they who decide if our data is “incriminating” or not. Or even worse: in many cases it's up to &lt;i&gt;data mining software&lt;/i&gt; to decide how “special” or “important” we are. And unfortunately, technology is &lt;i&gt;not&lt;/i&gt; infallible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The world's largest democracy, which is also &lt;a href="http://www.hindustantimes.com/india-news/india-less-corrupt-than-pakistan-ranks-94th-in-world-survey/article1-1158513.aspx"&gt;one of the most corrupt countries in the world&lt;/a&gt;, is implementing many controversial surveillance schemes which lack transparency, accountability and adequate legal backing, and which are largely being carried out in secret. And to make matters worse, India lacks privacy legislation. Over a billion people in a democratic regime are exposed to inadequately regulated surveillance schemes, while a local surveillance industry is thriving without any checks or balances whatsoever. What will this mean for the global future of democracy?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state'&gt;https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-02-28T10:35:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/big-data-in-the-global-south-international-workshop">
    <title>Big Data in the Global South International Workshop</title>
    <link>https://cis-india.org/internet-governance/events/big-data-in-the-global-south-international-workshop</link>
    <description>
        &lt;b&gt;Institute for Technology and Society of Rio de Janeiro welcomes you to an international workshop on Big Data at Hotel Windsor Florida, Rua Ferreira Viana, Flamengo, Rio de Janeiro, Brazil on November 16 and 17, 2015. Open Society Foundations and British Embassy Brasilia are sponsors for the event. The Centre for Internet &amp; Society (CIS) is a research partner. Sunil Abraham, Pranesh Prakash and Vipul Kharbanda will be speaking at this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event will bring together key representatives from government, civil society, the business sector and academia from Brazil, India, United Kingdom and several other countries. &lt;b&gt;This is a closed multistakeholder round-table&lt;/b&gt; to discuss and map international examples of Big Data uses and regulation, both by private and public sectors, in order to develop practical strategies to promote adoption of harmonized rules by different actors. The event will also map existing initiatives involving the use of Big Data and present the results of a joint research initiative conducted by ITS and CIS in this field.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/big-data-in-global-south-international-workshop-agenda.pdf"&gt;Workshop Agenda and Other Details&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/big-data-global-south-international-workshop-bios-and-photos.pdf"&gt;Bios and Photos of Speakers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/big-data-in-the-global-south-international-workshop'&gt;https://cis-india.org/internet-governance/events/big-data-in-the-global-south-international-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2015-11-06T02:04:49Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
