<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 516 to 530.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy">
    <title>Sustainable Development Goals (SDGs) and Internet Economy</title>
    <link>https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Multistakeholder Advisory Group (MAG) is organizing a session on “Sustainable Development Goals (SDGs) and Internet Economy” on November 11, 2015 from 9.30 a.m. to 12.30 p.m. Sunil Abraham is participating in this session as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussions at the IGF session aim to reflect the importance of Internet Economy and Internet Enablement for the fulfillment of different SDGs and also identify some best practices to inform policy makers on the ways in which Internet can serve broader and more strategic developmental objectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session will include discussions on the following :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Vision toward 2030: Sustainable Development long term opportunities and challenges&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Internet Economy &amp;amp; Internet Role in Delivering the SDGs (Key opportunities &amp;amp; key Success Factors): Human Capital (a) Internet Entrepreneurship (b) Equality (c) ICT Capacity building: Applications (d) Right to Health, Education, timely Justice, environment protection, society engagement (e) Access to Information (f) Availability of Local Content Online (g) Intellectual Property Right: Access and Infrastructure - Internet Availability and Affordability: Policy and Regulatory Support and Business eco-system: To enable Access, Applications and Content development and usage, Entrepreneurship and Capacity building.&lt;/li&gt;
&lt;li&gt;Aligning the next phase of IGF with the SDGs /Post 2015 UN Develpment Agenda: Optimizing Eco System and Multistakeholder approach&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;About IGF 2015&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet Governance Forum (IGF) is a multistakeholder, democratic and transparent forum which facilitates discussions on public policy issues related to key elements of Internet governance. IGF provides enabling platform for discussions among all stakeholders in the Internet governance ecosystem, including all entities accredited by the World Summit on the Information Society (WSIS), as well as other institutions and individuals with proven expertise and experience in all matters related to Internet governance.&lt;br /&gt;&lt;br /&gt;After consulting the wider Internet community and discussing the overarching theme of the 2015 IGF meeting, the Multistakeholder Advisory Group decided to retain the title “Evolution of Internet Governance: Empowering Sustainable Development”. This theme will be supported by eight sub-themes that will frame the discussions at the João Pessoa meeting&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy'&gt;https://cis-india.org/internet-governance/news/sustainable-development-goals-sdgs-and-internet-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-16T15:40:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime">
    <title>Survey on Data Protection Regime</title>
    <link>https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime</link>
    <description>
        &lt;b&gt;We request you to take part in this survey aimed at understanding how various organisations view the changes in the Data Protection Regime in the European Union. Recently the General Data Protection Regulation (EU) 2016/679 was passed, which shall replace the present Data Protection Directive DPD 95/46/EC. This step is likely to impact the way of working for many organisations. We are grateful for your voluntary contribution to our research, and all information shared by you will be used for the purpose of research only. Questions that personally identify you are not mandatory and will be kept strictly confidential. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The survey form below can also be accessed &lt;a href="https://goo.gl/forms/61d4W0kPQ8SqNaMO2" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://docs.google.com/forms/d/e/1FAIpQLSepvhTUkkc7s3jFDfJZ90wFJAIuVexrbVSO5icV4kW0-1uyNA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="800" width="600"&gt;Loading...&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime'&gt;https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>General Data Protection Regulation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2017-02-10T10:47:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security">
    <title>Surveillance: Privacy Vs Security </title>
    <link>https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security</link>
    <description>
        &lt;b&gt;The Foundation for Media Professionals is organizing a debate at the India International Centre, New Delhi on August 17, 2013. Shri Kapil Sibal will give the opening speech. Natgrid chief Raghu Raman is one of the debaters. Pranesh Prakash is participating in this event as a panelist.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://fmp.org.in/index.php/events"&gt;published by the Foundation for Media Professionals&lt;/a&gt; on their website. Also read the &lt;a class="external-link" href="http://fmp.org.in/index.php/events/eventDetail/51"&gt;blog post&lt;/a&gt; by Vivian Fernandes and Ninglun Hanghal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the backdrop of the recent disclosures by US defense contractor Edward Snowden about the activity of the National Security Agency (NSA) and reports that NSA may have collaborated with India on surveillance program in the country that have raised concerns about privacy and right of citizens, Foundation for Media Professionals (FMP) in partnership with Friedrich Ebert Stiftung (FES) invited Pranesh Prakash to a panel discussion on "Surveillance: Privacy vs. Security".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Speaker&lt;/b&gt;&lt;br /&gt;Kapil Sibal, Union Minister for Communications and Information Technology, Govt. of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/li&gt;
&lt;li&gt;Saikat Datta, Resident Editor, DNA&lt;/li&gt;
&lt;li&gt;Capt. Raghu Raman, National Intelligence Grid (Natgrid)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Moderator&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Paranjoy Guha Thakurta&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security'&gt;https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-19T05:32:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india">
    <title>Surveillance technology companies operating in India - spreadsheet</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has started investigating surveillance technology companies operating in India! This spreadsheet entails the first 77 companies which are being researched. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india'&gt;https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-27T16:29:14Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies">
    <title>Surveillance Technologies </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies</link>
    <description>
        &lt;b&gt;The following post briefly looks at different surveillance technologies, and the growing use of the them in India. &lt;/b&gt;
        
&lt;h3&gt;Surveillance...&lt;/h3&gt;
&lt;p&gt;New security technologies are constantly emerging that push the edge between privacy and a reasonable level of security. Society's tolerance level is constantly being tested by governments who use surveillance and monitoring technologies to protect the nation. Governments claim that they need absolute access to citizens life. They need to monitor phones, look through emails, peer into files – in-order to maintain security and protect against terrorism. Though as a side note, in an Economic Times article published on Nov. 4&amp;nbsp;2010 it was reported that government computers were being hacked into through viruses, and top secret documents were being stolen. The irony of the story is that the viruses were introduced to the computers through porn websites visited by officials.&lt;/p&gt;
&lt;h3&gt;...In a Car? On the Street? In an Airport?&lt;/h3&gt;
&lt;p&gt;Despite the fact that governmental monitoring might make the common man uncomfortable, the reality is that governments will always win the national security vs privacy fight. The story becomes more complicated when it moves from the government directly monitoring individuals, to security agencies monitoring individuals. For instance the use of full body scanners at airports, or trucks equipped with scatter x-ray machines used to control crime in neighborhoods - is a much more heated debate. There are other ways in which to check passengers for banned items, and other ways to keep crime off the streets without mandating that individuals submit themselves to invasive scans, or scanning unaware individuals.&lt;/p&gt;
&lt;h3&gt;...In the Movie Theater????..for Marketing Purposes????&lt;/h3&gt;
&lt;p&gt;Surveillance technology has now been taken even another step further. No longer is it being just used to prevent violent crimes or terrorist attacks. Today the movie industry is using controversial anti-piracy tools to protect the films they produce. For instance the security company Aralia Systems manufacturers products such as: CCTV cameras and anti-camcorder systems that shine infrared light beams on audiences as they watch a movie. The light beams reflect off camcorders and alerts the theater that there are camcorders present. Though this practice can be seen as invasive - individuals might be opposed to being probed by light beams throughout movies, the extent of potential privacy invasion does not stop there. Aralia Systems has partnered with Machine Vision Lab and has created a system that harvests audiences emotions and movements as they watch movies. The data can then be used by market researchers to better tailor their behavioral advertising schemes. Essentially movie theater monitoring has merged surveillance technologies with behavioral marketing technologies in a twisted invasion of movie watchers personal privacy.&lt;/p&gt;
&lt;h3&gt;Is this technology in India?&lt;/h3&gt;
&lt;p&gt;Though behavioral monitoring and piracy technologies such as ones produced by Aralia Systems are not yet used in Indian movie theaters – security measures against piracy are used. Movie theaters across India are equipped with metal detectors at the door, and security personel check your handbag or back pack for camcorders. According to a Indian Express article, the organization Allegiance Against Copyright Theft believes one of the reasons monitoring technology is not yet used in theaters is because there is no present Indian legislation that penalizes recording in halls. Once legislation is passed, they speculate there will be a push to use these technologies. Even though monitoring technology is not yet used in theaters, monitoring of consumers behavior is increasing. Recently in India the WPP owned research agency IMRB International has developed an online audience measurement system that uses tailored metering technology to track the sites that users visit. The Web Audience Measurement System has launched this technology in a sample size of 21,000 Indian households, covering 90,000 individuals. IMRB has said that the meters are capable of capturing usage data from multiple computers, and that they can then use the information to market to the individual. Does it seem ironic to anyone that companies now charge for a service – movie tickets, internet services, telephone services – and make an extra profit by data mining at the expense of a persons privacy?&lt;/p&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;http://economictimes.indiatimes.com/news/politics/nation/Govt-depts-asked-not-to-store-sensitive-info-on-Net-connected-computers/articleshow/6874631.cms&lt;/li&gt;&lt;li&gt;http://www.research-live.com/news/technology/imrb-unveils-web-measurement-service-for-indian-market/4003941.article&lt;/li&gt;&lt;li&gt;http://blogs.computerworld.com/17276/anti_piracy_tool_will_harvest_market_your_emotions?source=rss_blogs&lt;/li&gt;&lt;li&gt;&amp;nbsp;http://www.indianexpress.com/news/antipiracy-unit-joins-hands-with-cinema-halls-to-curb-camcording/695439/2&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies'&gt;https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:40:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance">
    <title>Surveillance Stories: Optimizing rights and governance</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance</link>
    <description>
        &lt;b&gt;Sunil Abraham gave a talk at the National Centre for Biological Sciences, Tata Institute of Fundamental Research, Bangalore on October 16, 2018. Sunil used a series of stories to explain how surveillance works and fails in the context of theft, murder, insider trading, terrorism, demonetization and encounter killings. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Abraham.jpg/@@images/27cd9d50-b82d-4556-aad2-431d99174b07.jpeg" alt="Surveillance Talk" class="image-inline" title="Surveillance Talk" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These stories were used to explore multiple technical solutions for solving the “surveillance optimization problem”. Policy makers have to simultaneously maximize various rights — the right to privacy, the right to transparency, the right to free speech — and uphold the imperatives of the nation state: national security, law enforcement and effective governance. &lt;br /&gt; &lt;br /&gt;Two decades ago, Lawrence Lessig introduced a socioeconomic theory of regulation called the ‘pathetic dot theory’, which discusses how individuals in a society are regulated by four forces — law, code or technical infrastructure, market and social norms. The talk will explore how these four regulatory options contribute to solving the surveillance optimization problem.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was published on the website of &lt;a class="external-link" href="https://www.ncbs.res.in/events/apls-20181016-surveillance-abraham"&gt;National Centre for Biological Sciences&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance'&gt;https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:39:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats">
    <title>Surveillance rises, privacy retreats</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats</link>
    <description>
        &lt;b&gt;WikiLeaks founder Julian Assange and former US National Security Agency contractor Edward Snowden have, at considerable personal cost, revealed how surveillance has eroded the private space in a world driven by digital technology.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/surveillance-rises-privacy-retreats-115041200669_1.html"&gt;Business Standard&lt;/a&gt; on April 12, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In India, the extent of surveillance became evident after Union human resource development minister &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smriti+Irani" target="_blank"&gt;Smriti Irani &lt;/a&gt;walked into the trial room of a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Fabindia" target="_blank"&gt;FabIndia &lt;/a&gt;outlet  in Goa last week, only to discover closed-circuit television (CCTV)  cameras pointed towards the trial room. The country woke up to the  porous divide between privacy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, senior officials of FabIndia find themselves embroiled in a case of  voyeurism and seven of them have taken interim anticipatory bail from a  district court. They claim the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cctv+Cameras" target="_blank"&gt;CCTV cameras &lt;/a&gt;were in the retail area, not the trial room.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FabIndia incident might have blown the lid on how flimsily our  privacy is protected but there is no doubt that India is slowly but  surely moving towards a surveillance regime, both in the private and the  public spheres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“After the Snowden episode, there are only two kinds of nations: Ones  that know they are being watched, and others that don’t,” said Pavan  Duggal, an advocate at the  Supreme Court of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the surge in surveillance, there are hardly any specific laws governing this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A few laws&lt;/b&gt;&lt;br /&gt; In 2000, India enacted the Information Technology Act, primarily to  bring e-commerce under legal framework. After the Mumbai terrorist  attack in 2008, the Act was amended, to give the government sweeping  powers for mass surveillance.&lt;br /&gt; &lt;br /&gt; In the context of private surveillance, the 2008 amendment added two definitions: (a) communication device; (b) intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A communication device, according to the law, means cell phones,  personal digital assistance, or a combination of both or any other  device used to communicate, send or transmit any text, video, audio, or  image. An intermediary was defined as any person who, on behalf of  another person, stores or transmits message or provides any service with  respect to that message.&lt;br /&gt; &lt;br /&gt; Rules regarding CCTV surveillance are governed by the IT Act, 2008, as  CCTVs are considered to be communication devices, with computerised  memory. However, the laws in relation to a communication device and  intermediary deal mostly with third-party data sharing.&lt;br /&gt; &lt;br /&gt; “&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Article+21" target="_blank"&gt;Article 21 &lt;/a&gt;of  the Constitution guards the right to privacy as a Fundamental Right. We  do not have an explicit Act in this regard, but Section 43A of the IT  Act, 2000, along with the IT Rules, 2011, protects data privacy in  India,” said Prashant Mali, a cyber law and cyber security lawyer.&lt;br /&gt; &lt;br /&gt; There were no amendments of the laws governing CCTVs.&lt;br /&gt; &lt;br /&gt; However, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Section+66e" target="_blank"&gt;Section 66E &lt;/a&gt;of  the IT Act, states: “Whoever, intentionally or knowingly, captures,  publishes or transmits, the image of a private area of any person,  without his or her consent, under circumstances violating the privacy of  that person, shall be punished with imprisonment, which may extend to  three years, or with a fine not exceeding Rs 2 lakh, or both, with  explanation.”&lt;br /&gt; &lt;br /&gt; “The IT Act is not a privacy enabling law. Hence, the challenges to  privacy in surveillance are not fully addressed in it,” said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internationally, there are more stringent laws governing CCTV cameras.  For example, in the UK, there is a prescribed code. A person filmed by a  surveillance camera can seek the footage. In the US, too, there are  state-specific laws which prohibit the unauthorised installation or use  of cameras in private places, like restrooms and trial rooms.&lt;br /&gt; &lt;br /&gt; “Privacy laws must be compliant with international practices. Laws  governing CCTVs should be more comprehensive. It should not be specific  to voyeurism,” said Sunil Abraham, the executive director of  Bengaluru-based research organisation, the Centre for Internet and  Society.&lt;br /&gt; &lt;br /&gt; The government has been working on a Privacy (Protection) Bill, which  provides safeguards on personal data of individuals and sets conditions  under which surveillance is allowed. It is expected that the Bill will  lead to the creation of the offices of privacy commissioner and data  protection commissioner. However, it is mostly silent on laws governing  CCTV usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, the concern over enacting privacy laws, implementing them and  our understanding of privacy are low, compared to the global context.  The Privacy Protection Bill, 2013 is pending before Parliament. When  this gets enacted, our laws would be at par with those in the West,”  said Mali. “But doubts remain about their implementation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government surveillance&lt;/b&gt;&lt;br /&gt; Amendments to the IT Act in 2008 gave the government wide powers of  interception, encryption and blocking. The amendment introduced Section  66A, which made sending “offensive” messages through a computer or any  other communication device, such as a cell phone or a tablet, a  punishable offense.&lt;br /&gt; &lt;br /&gt; The Supreme Court recently struck down the provision as infringing the constitutional right of freedom of speech.&lt;br /&gt; &lt;br /&gt; “Every nation is under the classical dilemma to balance national  security with privacy and freedom of expression. Always, when there is a  conflict between the two, national security wins hands down. However,  apart from international consensus, we need customise national  solutions,” said Duggal.&lt;br /&gt; &lt;br /&gt; Today, some of the biggest government projects based on the powers  vested to it under the IT Act. It has enabled the progression of  surveillance procedures like the Central Monitoring System (CMS) and  National Intelligence Grid (Natgrid), enabled through information on  Aadhar card or unique identification number.&lt;br /&gt; &lt;br /&gt; The CMS gives the government access to records of any mobile to landline  calls, to read private emails, texts, and even browsing history through  telecom operators. Natgrid could make the information available to  nearly 11 central agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is reported that the CMS can monitor close to 900 million people at  one go. There is neither confirmation nor denial from the government,”  said Duggal. However, compared to the US and China, that practice  blanket surveillance, India is still considered a low-surveillance  category nation.&lt;br /&gt; &lt;br /&gt; “India is still low on surveillance. In India, we have targeted  surveillance. At any given point in time, less than 200,000 phone calls  are being intercepted. Not more than a couple of lakh of surveillance  orders are given by both state and central governments,” said Abraham.&lt;br /&gt; &lt;br /&gt; Surely, with so many surveillance devices around,  it is a closely watched world like never before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;SALIENT FEATURES ON PRIVACY IN THE IT ACT, 2008&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Communication Device: Cell phones, personal digital assistance, or  combination of both or any other device used to communicate, send or  transmit any text, video, audio, or image&lt;/li&gt;
&lt;li&gt; Intermediary: Any person, who on behalf of another person, stores or transmits messages or provides any service&lt;/li&gt;
&lt;li&gt; Sections 66A to 66F: Added to Section 66, prescribing punishment  for offences such as sending obscene messages, identity theft, cheating  by impersonation using computer resources, violation of privacy and  cyber terrorism&lt;/li&gt;
&lt;li&gt; Section 69: Amended to give power to the state to issue directions  for interception or monitoring or decryption of any information through  any computer resource&lt;/li&gt;
&lt;li&gt; Sections 69A and B: These grant power to the state to issue  directions for blocking public access of any information through any  computer resource and to authorise to monitor and collect traffic data  or information through any computer resource for cyber security.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats'&gt;https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-05-02T06:43:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project">
    <title>Surveillance Project</title>
    <link>https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project</link>
    <description>
        &lt;b&gt;The Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article will be &lt;a class="external-link" href="http://www.frontline.in/cover-story/surveillance-project/article8408866.ece"&gt;published in Frontline&lt;/a&gt;, April 15, 2016 print edition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Zero&lt;/strong&gt;. The probability of some evil actor breaking into the central store of authentication factors (such as keys and passwords) for the Internet. Why? That is because no such store exists. And, what is the probability of someone evil breaking into the Central Identities Data Repository (CIDR) of the Unique Identification Authority of India (UIDAI)? Greater than zero. How do we know this? One, the central store exists and two, the Aadhaar Bill lists breaking into this central store as an offence. Needless to say, it would be redundant to have a law that criminalises a technological impossibility. What is the consequence of someone breaking into the central store? Remember, biometrics is just a fancy word for non-consensual and covert identification technology. High-resolution cameras can capture fingerprints and iris information from a distance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In other words, on March 16, when Parliament passed the Bill, it was as if Indian lawmakers wrote an open letter to criminals and foreign states saying, “We are going to collect data to non-consensually identify all Indians and we are going to store it in a central repository. Come and get it!” Once again, how do I know that the CIDR will be compromised at some date in the future? How can I make that policy prediction with no evidence to back it up? To quote Sherlock Holmes, “Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth.” If a back door to the CIDR exists for the government, then the very same back door can be used by an enemy within or from outside. In other words, the principle of decentralisation in cybersecurity does not require repeated experimental confirmation across markets and technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Zero&lt;/strong&gt;. The chances that you can fix with the law what you have broken with poor technological choices and architecture. And, to a large extent vice versa. Aadhaar is a surveillance project masquerading as a development intervention because it uses biometrics. There is a big difference between the government identifying you and you identifying yourself to the government. Before UID, it was much more difficult for the government to identify you without your knowledge and conscious cooperation. Tomorrow, using high-resolution cameras and the power of big data, the government will be able to remotely identify those participating in a public protest. There will be no more anonymity in the crowd. I am not saying that law-enforcement agencies and intelligence agencies should not use these powerful technologies to ensure national security, uphold the rule of law and protect individual rights. I am only saying that this type of surveillance technology is inappropriate for everyday interactions between the citizen and the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some software engineers believe that there are technical fixes for these concerns; they point to the consent layer in the India stack developed through a public-private partnership with the UIDAI. But this is exactly what Evgeny Morozov has dubbed “technological solutionism”—fundamental flaws like this cannot be fixed by legal or technical band-aid. If you were to ask the UIDAI how do you ensure that the data do not get stolen between the enrolment machine and the CIDR, the response would be, we use state-of-the-art cryptography. If cryptography is good enough for the UIDAI why is it not good enough for citizens? That is because if citizens use cryptography [on smart cards] to identify themselves to the state, the state will need their conscious cooperation each time. That provides the feature that is required for better governance without the surveillance bonus. If you really must use biometrics, it could be stored on the smart card after being digitally signed by the enrolment officer. If there is ever a doubt whether the person has stolen the smart card, a special machine can be used to read the biometrics off the card and check that against the person. This way the power of biometrics would be leveraged without any of the accompanying harms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Zero&lt;/b&gt;. This time, for the utility of biometrics as a password or authentication factor. There are two principal reasons for which the Act should have prohibited the use of biometrics for authentication. First, biometric authentication factors are irrevocable unlike passwords, PINs, digital signatures, etc. Once a biometric authentication factor has been compromised, there is no way to change it. The security of a system secured by biometrics is permanently compromised. Second, our biometrics is so easy to steal; we leave our fingerprints everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, if I upload my biometric data onto the Internet, I can then plausibly deny all transactions against my name in the CIDR. In order to prevent me from doing that, the government will have to invest in CCTV cameras [with large storage] as they do for passport-control borders and as banks do at ATMs. If you anyway have to invest in CCTV cameras, then you might as well stick with digital signatures on smart cards as the previous National Democratic Alliance (NDA) government proposed the SCOSTA (Smart Card Operating System Standard for Transport Application) standard for the MNIC (Multipurpose National ID Card). Leveraging smart card standards like EMV will ensure harnessing greater network effects thanks to the global financial infrastructure of banks. These network effects will drive down the cost of equipment and afford Indians greater global mobility. And most importantly when a digital signature is compromised the user can be issued a new smart card. As Rufo Guerreschi, executive director of Open Media Cluster, puts it, “World leaders and IT experts should realise that citizen freedoms and states’ ability to pursue suspects are not an ‘either or’ but a ‘both or neither’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Near zero&lt;/b&gt;. We now move biometrics as the identification factor. The rate of potential duplicates or “False Positive Identification Rate” which according to the UIDAI is only 0.057 per cent. Which according to them will result in only “570 resident enrolments will be falsely identified as duplicate for every one million enrolments.” However, according to an article published in &lt;i&gt;Economic &amp;amp; Political Weekly&lt;/i&gt; by my colleague at the Centre for Internet and Society, Hans Verghese Mathews, this will result in one out of every 146 people being rejected during enrolment when total enrolment reaches one billion people. In its rebuttal, the UIDAI disputes the conclusion but offers no alternative extrapolation or mathematical assumptions. “Without getting too deep into the mathematics” it offers an account of “a manual adjudication process to rectify the biometric identification errors”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This manual adjudication determines whether you exist and has none of the elements of natural justice such as notice to the affected party and opportunity to be heard. Elimination of ghosts is impossible if only machines and unaccountable humans perform this adjudication. This is because there is zero skin in the game. There are free tools available on the Internet such as SFinGe (Synthetic Fingerprint Generator) which allow you to create fake biometrics. The USB cables on the UIDAI-approved enrolment setup can be intercepted using generic hardware that can be bought online. With a little bit of clever programming, countless number of ghosts can be created which will easily clear the manual adjudication process that the UIDAI claims will ensure that “no one is denied an Aadhaar number because of a biometric false positive”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Near zero&lt;/b&gt;. This time for surveillance, which I believe should be used like salt in cooking. Essential in small quantities but counterproductive even if slightly in excess. There is a popular misconception that privacy researchers such as myself are opposed to surveillance. In reality, I am all for surveillance. I am totally convinced that surveillance is good anti-corruption technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But I also want good returns on investment for my surveillance tax rupee. According to Julian Assange, transparency requirements should be directly proportionate to power; in other words, the powerful should be subject to more surveillance. And conversely, I add, privacy protections must be inversely proportionate to power—or again, in other words, the poor should be spared from intrusions that do not serve the public interest. The UIDAI makes the exact opposite design assumption; it assumes that the poor are responsible for corruption and that technology will eliminate small-ticket or retail corruption. But we all know that politicians and bureaucrats are responsible for most of large-ticket corruption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why does not the UIDAI first assign UID numbers to all politicians and bureaucrats? Then using digital signatures why do not we ensure that we have a public non-repudiable audit trail wherein everyone can track the flow of benefits, subsidies and services from New Delhi to the panchayat office or local corporation office? That will eliminate big-ticket or wholesale corruption. In other words, since most of Aadhaar’s surveillance is targeted at the bottom of the pyramid, there will be limited bang for the buck. Surveillance is the need of the hour; we need more CCTVs with microphones turned on in government offices than biometric devices in slums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Instantiation technology &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;One&lt;/b&gt;. And zero. In the contemporary binary and digital age, we have lost faith in the old gods. Science and its instantiation technology have become the new gods. The cult of technology is intolerant to blasphemy. For example, Shekhar Gupta recently tweeted saying that part of the opposition to Aadhaar was because “left-libs detest science/tech”. Technology as ideology is based on some fundamental articles of faith: one, new technology is better than old technology; two, expensive technology is better than cheap technology; three, complex technology is better than simple technology; and four, all technology is empowering or at the very least neutral. Unfortunately, there is no basis in science for any of these articles of faith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me use a simple story to illustrate this. I was fortunate to serve as a member of a committee that the Department of Biotechnology established to finalise the Human DNA Profiling Bill, 2015, which was to be introduced in Parliament in the last monsoon session. Aside: the language of the Act also has room for the database to expand into a national DNA database circumventing 10 years of debate around the controversial DNA Profiling Bill, 2015. The first version of this Bill that I read in January 2013 said that DNA profiling was a “powerful technology that makes it possible to determine whether the source of origin of one body substance is identical to that of another … without any doubt”. In other words, to quote K.P.C. Gandhi, a scientist from Truth Labs, “I can vouch for the scientific infallibility of using DNA profiling for carrying out justice.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, though, the infallible science is conducted by fallible humans. During one of the meetings, a scientist described the process of generating a biometric profile. The first step after the laboratory technician generated the profile was to compare the generated profile with her or his own profile because during the process of loading the machine with the DNA sample, some of the laboratory technician’s DNA could have contaminated the sample. This error would not be a possibility in much older, cheaper and rudimentary biometric technology for example, photography. A photographer developing a photograph in a darkroom does not have to ensure that his or her own image has not accidentally ended up on the negative. But the UIDAI is filled with die-hard techno-utopians; if you tell them that fingerprints will not work for those who are engaged in manual labour, they will say then we will use iris-based biometrics. But again, complex technologies are more fragile and often come with increased risks. They may provide greater performance and features, but sometimes they are easier to circumvent. A gummy finger to fool a biometric scanner can be produced using glue and a candle, but to fake a passport takes a lot of sophisticated technology. Therefore, it is important for us as a nation to give up our unquestioning faith in technology and start to debate the exact technological configurations of surveillance technology for different contexts and purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;One&lt;/b&gt;. This time representing a monopoly. Prior to the UID project, nobody got paid when citizens identified themselves to the state. While the Act says that the UIDAI will get paid, it does not specify how much. Sooner or later, this cost of identification will be passed on to the citizens and residents. There will be a consumer-service provider relationship established between the citizen and the state when it comes to identification. The UIDAI will become the monopoly provider of identification and authentication services in India which is trusted by the government. That sounds like a centrally planned communist state to me. Should not the right-wing oppose the Act because it prevents the free market from working? Should not the free market pick the best technology and business model for identification and authentication? Will not that drive the cost of identification and authentication down and ensure higher quality of service for citizens and residents?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competing providers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Competing providers can also publish transparency reports regarding their compliance with data requests from law-enforcement and intelligence agencies, and if this is important to consumers they will be punished by the market. The government can use mechanisms such as permanent and temporary bans and price regulation as disincentives for the creation of ghosts. There will be a clear financial incentive to keep the database clean. Just like the government established a regulatory framework for digital certificates in the Information Technology Act allowing for e-commerce and e-governance. Ideally, the Aadhaar Bill should have done something similar and established an ecosystem for multiple actors to provide services in this two-sided market. For it is impossible for a “small government” to have the expertise and experience to run one of the world’s largest database of biometric and transaction records securely for perpetuity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, I support the use of biometrics. I support government use of identification and authentication technology. I support the use of ID numbers in government databases. I support targeted surveillance to reduce corruption and protect national security. But I believe all these must be put in place with care and thought so that we do not end up sacrificing our constitutional rights or compromising the security of our nation state. Unfortunately, the Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better. Our children will pay a heavy price for our folly in the years to come. To quote the security guru Bruce Schneier, “Data is a toxic asset. We need to start thinking about it as such, and treat it as we would any other source of toxicity. To do anything else is to risk our security and privacy.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project'&gt;https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-05T15:21:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice">
    <title>Surveillance in India: Policy and Practice</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice</link>
    <description>
        &lt;b&gt;The National Institute of Public Finance and Policy organized a brainstorming session on net neutrality on February 8, 2017 and a public seminar on surveillance in India the following day on February 9, 2017 in New Delhi. Pranesh Prakash gave a talk. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh presented a narrative of the current state of surveillance law, our knowledge of current surveillance practices (including noting where programmes like Natgrid, CMS, etc. fit in), and charted a rough map of reforms needed and outstanding policy research questions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pranesh Prakash&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash is a Policy Director at - and was part of the founding team of - the Centre for Internet and Society, a non-profit organisation that engages in research and policy advocacy. He is also the Legal Lead at Creative Commons India and an Affiliated Fellow at the Yale Law School's Information Society Project, and has been on the Executive Committee of the NCUC at ICANN. In 2014, he was selected by Forbes India for its inaugural "30 under 30"​ list of young achievers, and in 2012 he was recognized as an Internet Freedom Fellow by the U.S. government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His research interests converge at the intersections of technology, culture, economics, law, and justice. His current work focuses on interrogating, promoting, and engaging with policymakers on the areas of access to knowledge (primarily copyright reform), 'openness' (including open government data, open standards, free/libre/open source software, and open access), freedom of expression, privacy, digital security, and Internet governance. He is a prominent voice on these issues, with the newspaper Mint calling him “one of the clearest thinkers in this area”, and his research having been quoted in the Indian parliament. He regularly speaks at national and international conferences on these topics. He has a degree in arts and law from the National Law School in Bangalore, and while there he helped found the Indian Journal of Law and Technology, and was part of its editorial board for two years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/workshop-on-net-neutrality"&gt;Click here&lt;/a&gt; to see the agenda for the brainstorming session on net neutrality.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video &lt;br /&gt; &lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/6KfyQ7y6TNE" width="560"&gt;&lt;/iframe&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice'&gt;https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-03-15T01:05:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar">
    <title>Surveillance Enabling Identity Systems in Africa: Tracing the Fingerprints of Aadhaar</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar</link>
    <description>
        &lt;b&gt;Biometric identity systems are being introduced around the world with a focus on promoting human development and social and economic inclusion, rather than previous goals of security. As a result, these systems being encouraged in developing countries, particularly in Africa and Asia, sometimes with disastrous consequences.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In this report, we       identify the different external actors that influencing this       “developmental” agenda. These range from philanthropic       organisations, private companies, and technology vendors, to state       and international institutions. Most notable among these is the       World Bank, whose influence we investigated in the form of case       studies of Nigeria and Kenya. We also explored the role played by       the “success” of the Aadhaar programme in India on these new ID       systems. A key characteristic of the growing “digital identity for       development” trend is the consolidation of different databases       that record beneficiary data for government programmes into one       unified platform, accessed by a unique biometric ID. This “Aadhaar       model” has emerged as a default model to be adopted in developing       countries, with little concern for the risks it introduces. Read       and download the full report &lt;a href="https://cis-india.org/internet-governance/surveillance-enabling-identity-systems-in-africa" class="internal-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar'&gt;https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad and Vrinda Bhandari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-08-09T08:17:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance">
    <title>Surveillance Camp: Privatized State Surveillance</title>
    <link>https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance</link>
    <description>
        &lt;b&gt;This is the second in a series of posts mapping global surveillance challenges discussed at EFF’s Surveillance Camp in Rio de Janeiro, Brazil.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Katitza Rodriguez's blog post was &lt;a class="external-link" href="https://www.eff.org/deeplinks/2013/01/surveillance-camp-privatize-state-surveillance"&gt;published by the Electronic Frontier Foundation&lt;/a&gt; on their website on January 28, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In December 2012, EFF organized a&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;Surveillance and Human Rights Camp&lt;/a&gt; in Brazil that brought together the expertise of a diverse group of people concerned about state electronic surveillance in Latin American and other countries. Among other concerns, participants spotlighted the many ways in which the private sector is increasingly playing a role in state surveillance. Here are a few examples:&lt;/p&gt;
&lt;h3 class="western"&gt;Voluntary Agreements Between Law Enforcement and Private Companies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Often law enforcement agencies will approach companies asking for voluntary disclosure of information for investigative purposes. Those requests may look and sound more like &lt;a href="http://blog.privacylawyer.ca/2011/11/dealing-with-police-letters-of-request.html"&gt;threats&lt;/a&gt;, with a great deal of &lt;a href="http://blog.privacylawyer.ca/2011/11/police-pipeda-requests-for-customer.html"&gt;moral pressure&lt;/a&gt; applied on the companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This voluntary assistance remains out of the public eye and shrouded in secrecy, as notification of state access is never given to the individual concerned, is not codified in law, and is not clearly disclosed in the company's terms of service or user agreement. Currently there is minimal, if any, oversight over such voluntary cooperation, so the scope of assistance provided is not well-documented.&lt;/p&gt;
&lt;h4 class="western"&gt;Canada&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Canadian ISPs &lt;a href="http://www.canlii.org/en/on/onca/doc/2012/2012onca660/2012onca660.html"&gt;have jointly decided&lt;/a&gt; to provide identifying data about &lt;a href="http://www.cippic.ca/agents_of_the_state"&gt;Canadian Internet users&lt;/a&gt; to law enforcement in child exploitation investigations. In fact, &lt;a href="http://www.cba.org/cba/newsletters-sections/pdf/2011-11-privacy1.pdf"&gt;several Canadian ISPs&lt;/a&gt; have developed a formal protocol in conjunction with various law enforcement agencies to be used when those authorities are seeking identification information associated with a given IP address at a specific date and time. Since the adoption of this protocol, some ISPs have expanded their information sharing practices to cover customer identification data in other contexts, such as &lt;a href="http://www.cippic.ca/sites/default/files/AgentsoftheState-Roundtable_Presentation.ppt"&gt;online harassment cases&lt;/a&gt;.&lt;/p&gt;
&lt;h3 class="western"&gt;Law Enforcement Approaching Service Providers Without Legally-Required Authorization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A growing concern is the number of law enforcement officers skirting the law by asking service providers to simply fork over information without any sort of search warrant. Even when legal procedures, such as a search warrant, exist, police increasingly request information without obtaining a legal authorization. Nevertheless, they often expect full compliance from service providers.&lt;/p&gt;
&lt;h4 class="western"&gt;Chile&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a Chilean website called&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; (“strike” in English) was approached by the Cyber Crime Section of the Chilean Police. The site is an online space for coordinating union actions. The agency demanded that the webmaster hand over data related to pseudonymous user accounts, such as IP addresses, records of previous connections, real names, and physical addresses. The targeted users had left comments on a website about an ongoing strike.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case, because police did not have a court order to back up the request for information,&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; took a stand by resisting police pressure and refusing to hand over the data without a fight. For legal assistance, they turned to Derechos Digitales, a Chilean online human rights nonprofit organization, and managed to resist the request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another case, the Regional Director of the Chilean Department of Labor, the agency responsible for ensuring the enforcement of labor laws, sent&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt;a letter&lt;/a&gt; to Huelga.cl simply demanding the removal of “inappropriate content” from their website along with the disclosure of user information, but it was only for administrative purposes as opposed to serious criminal investigations. Huegal.cl again &lt;a href="http://www.derechosdigitales.org/2010/09/20/huelga-cl-resiste-presion-de-direccion-del-trabajo-por-entregar-informacion-de-usuarios/"&gt;refused to&lt;/a&gt; comply and instead, made the director’s demands public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not always the case that service providers can resist extralegal government requests, find legal advice or have enough economic resources to fight against those demands as Huelga.cl did. Huelga.cl should be praised for speaking up and managing to make the request from law enforcement public.&lt;/p&gt;
&lt;h3 class="western"&gt;Governments Pressure Private Sector&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments frequently impose heavy fines for non-compliance with their requests for data access. This form of coercion acts as a mechanism of enforcement over service providers and can raise serious concerns for free expression. The service provider is left with little incentive or option to resist illegitimate requests from the government when they are threatened with heavy fines.&lt;/p&gt;
&lt;h4 class="western"&gt;Brazil&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2012, a judge from northern Brazil &lt;a href="http://diariodonordeste.globo.com/materia.asp?codigo=1028611"&gt;froze Google's accounts&lt;/a&gt; and imposed a fine on the company for refusing to remove three anonymous blogs or reveal contact details of the bloggers.  The content of the blogs &lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;state&lt;/a&gt;&lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;d&lt;/a&gt; the mayor of Varzea Alegre of corruption and embezzlement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While some companies might be able to withstand governmental pressure, alarms were raised that this won’t be the case for smaller companies that lack resources and influence. This is particularly true in contexts where heavy fines for noncompliance are written into legislation, and companies are not given legal avenues to appeal or fight the fine.&lt;/p&gt;
&lt;h3 class="western"&gt;Foreign Governments Access To Individuals’ Data in the Cloud&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments are increasingly seeking to negotiate access or interceptation capabilities to user data with companies that do not lie within their jurisdictions. This form of access is complicated because it is not always clear which country’s laws apply or to what extent. Because of the complex nature of these requests, governments often look for "easy" solutions that call for voluntary disclosure of information or simply allow full access to the user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, government officials in India have been pushing  for real time interception capabilities for all BlackBerry services. In response to the demands from the Indian Government, after a number of unsatisfactory proposals, in 2012 RIM set up a NOC in &lt;a href="http://crackberry.com/rim-installs-blackberry-server-mumbai"&gt;Mumbai&lt;/a&gt;, providing security agencies with access to &lt;a href="http://articles.economictimes.indiatimes.com/2012-12-30/news/36063501_1_lawful-access-lawful-interception-vendors-blackberry-internet-service"&gt;BlackBerry Messenger services&lt;/a&gt;, and created a solution for access to Blackberry Internet Services. In addition to asking RIM for real time access to communications, the Government of India had required Service Providers in India to adopt the solution provided by RIM by end of 2012 or risk being shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Elonnai Hickok from the &lt;a href="https://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in Bangalore, India, the discussions between &lt;a href="http://articles.economictimes.indiatimes.com/2012-10-29/news/34798663_1_interception-solution-blackberry-interception-blackberry-services"&gt;RIM and the Indian Government&lt;/a&gt; is just one example of how governments are trying to negotiate their interests in light of the challenges posed by communications stored in the cloud and in multiple jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Internet is technically borderless, in reality, state actors impose their sovereignty onto online environments with increasing frequency. The &lt;a href="https://www.eff.org/document/cloudy-jurisdiction-addressing-thirst-cloud-data-domestic-legal-processes"&gt;exercise of sovereignty&lt;/a&gt; over shared spaces can subject individuals to the laws of another country without any awareness on their part that this has happened. This in effect transforms the surveillance efforts of one country into privacy risks for all the world’s citizens.&lt;/p&gt;
&lt;h3 class="western"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State agencies and law enforcement are increasingly outsourcing investigations to private companies who are not under the same sort of judicial oversight as official law enforcement entities would be. The increasingly close and non-transparent connection between the private sector and law enforcement needs to be addressed, as it poses a risk to the rights and freedoms of the individual.  Of major concern to all Camp participants was the notion that private companies are routinely complying with the requests of law enforcement in the absence of due process. We encourage further research and documentation of this phenomenon. To highlight on this issue, we will be blogging next about the privatization of public security in Latin America.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance'&gt;https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-01-29T06:51:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy">
    <title>Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy</link>
    <description>
        &lt;b&gt;This is the fourth in a series of posts mapping global surveillance challenges discussed at EFF's State Surveillance and Human Rights Camp in Rio de Janeiro, Brazil. This article has been co-written with Elonnai Hickok — Centre for Internet and Society India, and a speaker at EFF's Camp.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Katitza Rodriguez and Elonnai Hickok was originally &lt;a class="external-link" href="https://www.eff.org/deeplinks/2013/02/disproportionate-state-surveillance-violation-privacy"&gt;published by the Electronic Frontier Foundation&lt;/a&gt; on February 13, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;States around the world are faced daily with the challenge of  protecting their populations from potential and real threats. To detect  and respond to them, many governments surveil communication networks,  physical movements, and transactional records. Though surveillance by  its nature compromises individual privacy, there are exceptional  situations where state surveillance is justified. Yet, if state  surveillance is unnecessary or overreaching, with weak legal safeguards  and a failure to follow due process, it can become disproportionate to  the threat—infringing on people's privacy rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internationally, regulations concerning government surveillance of  communications vary in approach and effectiveness, often with &lt;a href="https://www.eff.org/deeplinks/2012/12/2012-in-review-state-surveillance-around-globe" target="_blank"&gt;very weak or nonexistent legal safeguards&lt;/a&gt;.  Some countries have strong regulations for the surveillance of  communications, yet these regulations may be largely ineffective or  unenforceable in practice. Other countries have no legal safeguards or  legal standards differing vastly according to the type of communication  data targeted. This is why, EFF organized at the end of last year a &lt;a href="https://www.eff.org/issues/surveillance-human-rights" target="_blank"&gt;State Surveillance and Human Rights Camp&lt;/a&gt; in Brazil to build upon this discussion and focused on how states are  facilitating unnecessary and disproportionate surveillance of  communications in ways that lead to privacy violations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;State-Mandated Identity Verification&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2012 the Constitutional Court in South Korea &lt;a href="https://www.nytimes.com/2012/08/24/world/asia/south-korean-court-overturns-online-name-verification-law.html?_r=1&amp;amp;" target="_blank"&gt;declared&lt;/a&gt; that country's "real-name identification system" unconstitutional. The  system had mandated that any online portal with more than 100,000 daily  users had to verify the identity of their users.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;This meant that the individual has to provide their real name before  posting comments online. The legal challenge to this system was raised  by &lt;a href="https://en.wikipedia.org/wiki/People%E2%80%99s_Solidarity_for_Participatory_Democracy" target="_blank"&gt;People's Solidarity for Participatory Democracy&lt;/a&gt; (PSPD)'s Public Law Center and &lt;a href="https://en.wikipedia.org/wiki/Korean_Progressive_Network_%28Jinbonet%29%20" target="_blank"&gt;Korean Progressive Network&lt;/a&gt;—Jinbonet among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Korea University professor Kyung-shin Park, Chair of PSPD's Law  Center told EFF that portals and phone companies would disclose  identifying information about six million users annually—in a country of  only 50 million people. The South Korean Government was using perceived  online abuses as a convenient excuse to discourage political criticism,  professor Park told EFF:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The user information shared with the police most commonly has been used  by the government to monitor the anti-governmental sentiments of  ordinary people. All this has gone on because the government, the  legislature, and civil society have not clearly understood the privacy  implications of turning over identifying information of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision by the South Korean Constitutional Court to declare the "real identification system" unconstitutional was a win for user privacy and anonymity because it clearly showed that blanket mandates for the disclosure of identifying information, and the subsequent sharing of that data without judicial authorization, are a disproportionate measure that violates the rights of individuals.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;States Restrict Encryption and Demand Backdoors&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some States are seeking to block, ban, or discourage the use of  strong encryption and other privacy enhancing tools by requiring  assistance in decrypting information. In India service providers are  required to ensure that bulk encryption is not deployed. Additionally,  no individual or entity can employ encryption with a key longer than 40  bits. If the  encryption equipments is higher than this limit, the  individual or entity will need prior written permission from the  Department of Telecommunications and &lt;a href="https://www.dot.gov.in/isp/internet-licence-dated%2016-10-2007.pdf" target="_blank"&gt;must deposit&lt;/a&gt; the decryption keys with the Department.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;The limitation on encryption in India means that technically any encrypted material over 40 bits &lt;a href="http://www.dot.gov.in/isp/internet-licence-dated%2016-10-2007.pdf" target="_blank"&gt;would be accessible&lt;/a&gt; by the State. Ironically, the Reserve Bank of India&lt;b&gt; &lt;/b&gt;&lt;a href="http://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0" target="_blank"&gt;issued security recommendations&lt;/a&gt; that banks should use strong encryption as higher as 128-bit for securing browser.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;In the United States, under the &lt;a href="http://wiki.surveillancehumanrights.org/Background_on_lawful_interception_mandates_and_government_access_to_encryption_keys" target="_blank"&gt;Communications Assistance for Law Enforcement Act&lt;/a&gt;,  telecommunication carriers are required to provide decryption  assistance only if they already possess the keys (and in many  communications system designs, there's no reason carriers should need to  possess the keys at all). In 2011, the &lt;a href="https://www.eff.org/pages/legal-struggles-over-interception-rules-united-states" target="_blank"&gt;US Government proposed a bill&lt;/a&gt; that would place new restrictions on domestic development or use of  cryptography, privacy software, and encryption features on devices. The  bill has not been adopted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Allowing only low levels of encryption and requiring service  providers to assist in the decryption of communications, facilitates  surveillance by enabling States easier access to data and preventing  individuals from using crypto tools to protect their personal  communications.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;States Establish Blanket Interception Facilities&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In Colombia, telecommunications network and service providers carrying out business within the national territory &lt;a href="https://www.eff.org/pages/mapping-laws-government-access-citizens-data-colombia" target="_blank"&gt;must implement&lt;/a&gt; and ensure that interception facilities are available at all times to  state agencies as prescribed by law. This is to enable authorized state  agencies to intercept communications at any point of time. In addition  to providing interception facilities, service providers must also retain  subscriber data for a period of five years, and  provide information  such as subscriber identity, invoicing address, type of connection on  request, and geographic location of terminals when requested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though Colombia has put in place regulations for the surveillance of  communications, these regulations allow for broad surveillance and do  not afford the individual clear rights in challenging the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The examples above demonstrate that, although state surveillance of  communications can be justified in exceptional instances, it leads to  the violation of individual privacy when implemented without adequate  legal safeguards. Clearly there is a need for international principles  articulating critical and necessary components of due process for the  surveillance of communications. Those strong legal safeguards are  necessary not only in countries that don't have laws in place, but also  in countries where laws are lacking and fail to adequately protect  privacy. Last year, EFF &lt;a href="https://www.eff.org/deeplinks/2012/12/tackling-state-surveillance-and-human-rights-protecting-universal-freedoms" target="_blank"&gt;organized the State Surveillance and Human Rights Camp&lt;/a&gt; to discuss a set of &lt;a href="http://necessaryandproportionate.net/" target="_blank"&gt;International Principles on State Surveillance of Communications&lt;/a&gt;,  a global effort led by EFF and Privacy International, to define,  articulate, and promote legal standards to protect individual privacy  when the state carries out surveillance of communications.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Constitutional Court's Decision 2010 Hunma 47, 252 (consolidated) announced August 28, 2012.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].The illegality of this practice was proved by a High Court decision  handed down 2 months after the Constitutional Court's decision in August  2012. Seoul Appellate Court 2011 Na 19012, Judgment Announced October  18, 2012. This case &lt;a href="http://www.peoplepower21.org/English/955480" target="_blank"&gt;was prepared and followed singularly&lt;/a&gt; by PSPD Public Interest Law Center.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].&lt;a href="http://www.dot.gov.in/isp/internet-licence-dated%2016-10-2007.pdf"&gt;License Agreement for Provision of Internet Services Section 2.2 (vii)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].Reserve Bank of India. &lt;a href="http://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0" target="_blank"&gt;Internet Banking Guidelines&lt;/a&gt;. Section (f (2)).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy'&gt;https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-19T12:37:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3">
    <title>Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court’s Wrong Turn</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3</link>
    <description>
        &lt;b&gt;After its decision in Gobind, the Supreme Court's privacy floodgates opened; a series of claims involving private parties came before its docket, and the resulting jurisprudence ended up creating confusion between state-individual surveillance, and individual-individual surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Gautam Bhatia's blog post was originally &lt;a class="external-link" href="http://indconlawphil.wordpress.com/2013/12/17/privacy-and-surveillance-in-india-iii-the-publicprivate-distinction-and-the-supreme-courts-wrong-turn/"&gt;published on Indian Constitutional Law and Philosophy Blog&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We have seen that &lt;i&gt;Gobind &lt;/i&gt;essentially crystallized a constitutional right to privacy as an aspect of personal liberty, to be infringed only by a narrowly-tailored law that served a compelling state interest. After the landmark decision in &lt;i&gt;Gobind&lt;/i&gt;, &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/971635/"&gt;Malak Singh v State of P&amp;amp;H&lt;/a&gt; &lt;/i&gt;was the next targeted-surveillance history-sheeter case to come before the Supreme Court. In that case, Rule 23 of the Punjab Police Rules was at issue. Its vires was not disputed, so the question was a direct matter of constitutionality. An order of surveillance was challenged by two individuals, on the ground that there were no reasonable bases for suspecting them of being repeat criminals, and that their inclusion in the surveillance register was politically motivated.  After holding that entry into a surveillance sheet was a purely administrative measure, and thus required no prior hearing (&lt;i&gt;audi alteram partem&lt;/i&gt;), the Court then embarked upon a lengthy disquisition about the scope and limitations of surveillance, which deserves to be reproduced in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;But all this does not mean that the police have a licence to enter the names of whoever they like (dislike?) in the surveillance register; nor can the surveillance be such as to squeeze the fundamental freedoms guaranteed to all citizens or to obstruct the free exercise and enjoyment of those freedoms; nor can the surveillance so intrude as to &lt;/i&gt;&lt;i&gt;&lt;span&gt;offend the dignity of the individual&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. Surveillance of persons who do not fall within the categories mentioned in Rule 23.4 or for reasons unconnected with the prevention of crime, or excessive surveillance falling beyond the limits prescribed by the rules, will entitle a citizen to the Court’s protection which the court will not hesitate to give. The very rules which prescribe the conditions for making entries in the surveillance register and the mode of surveillance appear to recognise the caution and care with which the police officers are required to proceed. The note following R. 23.4 is instructive. It enjoins a duty upon the police officer to construe the rule strictly and confine the entries in the surveillance register to the class of persons mentioned in the rule. Similarly R.23.7 demands that there should be no illegal interference in the guise of surveillance. Surveillance, therefore, has to be unobstrusive and within bounds. Ordinarily the names of persons with previous criminal record alone are entered in the surveillance register. &lt;/i&gt;&lt;i&gt;&lt;span&gt;They must be proclaimed offenders, previous convicts, or persons who have already been placed on security for good behaviour. In addition, names of persons who are reasonably believed to be habitual offenders or receivers of stolen property whether they have been convicted or not may be entered&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. It is only in the case of this category of persons that there may be occasion for abuse of the power of the police officer to make entries in the surveillance register. But, here, the entry can only be made by the order of the Superintendent of Police who is prohibited from delegating his authority under Rule 23.5. Further it is necessary that the Superintendent of Police must entertain &lt;/i&gt;&lt;i&gt;&lt;span&gt;a reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt; that persons whose names are to be entered in Part II are habitual offenders or receivers of stolen property. While it may not be necessary to supply the grounds of belief to the persons whose names are entered in the surveillance register it may become necessary in some cases to satisfy the Court when an entry is challenged &lt;/i&gt;&lt;i&gt;&lt;span&gt;that there are grounds to entertain such reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. In fact in the present case we sent for the relevant records and we have satisfied ourselves that there were sufficient grounds for the Superintendent of Police to entertain a reasonable belief. In the result we reject both the appeals subject to our observations regarding the mode of surveillance. There is no order as to costs.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three things emerge from this holding: &lt;i&gt;first&lt;/i&gt;, the Court follows &lt;i&gt;Gobind&lt;/i&gt; in locating the right to privacy within the philosophical concept of individual &lt;i&gt;dignity&lt;/i&gt;, found in Article 21’s guarantee of personal liberty. &lt;i&gt;Secondly&lt;/i&gt;, it follows &lt;i&gt;Kharak Singh, Malkani and Gobind&lt;/i&gt; in insisting that the surveillance be targeted, limited to fulfilling the government’s crime-prevention objectives, and be limited – not even to suspected criminals, but – repeat offenders or serious criminals. And &lt;i&gt;thirdly&lt;/i&gt;, it leaves open a role for the Court – that is, &lt;i&gt;judicial review&lt;/i&gt; – in examining the grounds of surveillance, if challenged in a particular case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After &lt;i&gt;Malak Singh, &lt;/i&gt;there is another period of quiet. &lt;a href="http://www.indiankanoon.org/doc/304068/"&gt;&lt;i&gt;LIC v Manubhai D Shah&lt;/i&gt;&lt;/a&gt;, in 1993, attributed – wrongly – to &lt;i&gt;Indian Express Newspapers &lt;/i&gt;the proposition that Article 19(1)(a)’s free expression right included privacy of communications (&lt;i&gt;Indian Express &lt;/i&gt;itself had cited a  UN Report without incorporating it into its holding).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soon afterwards, &lt;i&gt;&lt;a href="http://www.indiankanoon.org/doc/501107/"&gt;R. Rajagopal v State of TN&lt;/a&gt; &lt;/i&gt;involved the question of the publication of a convicted criminal’s autobiography by a publishing house; Auto Shankar, the convict in question, had supposedly withdrawn his consent after agreeing to the book’s publication, but the publishing house was determined to go ahead with it. Technically, this wasn’t an Article 21 case: so much is made clear by the very manner in which the Court frames its issues: the question is whether a &lt;i&gt;&lt;span&gt;citizen&lt;/span&gt;&lt;/i&gt; of the country can prevent &lt;i&gt;&lt;span&gt;another person&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;from writing his biography, or life story. (Paragraph 8) The Court itself made things clear when it held that the right of privacy has two aspects: the &lt;i&gt;tortious &lt;/i&gt;aspect, which provides damages for a breach of individual privacy; and the &lt;i&gt;constitutional aspect&lt;/i&gt;, which protects privacy against &lt;span&gt;&lt;b&gt;unlawful governmental intrusion.&lt;/b&gt;&lt;/span&gt; (Paragraph 9) Having made this distinction, the Court went on to cite a number of American cases that were precisely about the right to privacy against governmental intrusion, and therefore – ideally – irrelevant to the present case (Paras 13 – 16); and then, without quite explaining how it was using these cases – or whether they were relevant at all, it switched to examining the law of defamation (Para 17 onwards). It would be safe to conclude, therefore, in light of the clear distinctions that it made, the Court was concerned in &lt;i&gt;R. Rajagopal &lt;/i&gt;about an action between private parties, and therefore, privacy in the context of tort law. It’s confusing observations, however, were to have rather unfortunate effects, as we shall see.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We now come to a series of curious cases involving privacy and medical law. In &lt;a href="http://indiankanoon.org/doc/382721/"&gt;&lt;i&gt;Mr X v Hospital Z&lt;/i&gt;&lt;/a&gt;, the question arose whether a Hospital that – in the context of a planned marriage – had disclosed the appellant’s HIV+ status, leading to his social ostracism – was in breach of his right to privacy. The Court cited &lt;i&gt;Rajagopal&lt;/i&gt;, but unfortunately failed to understand it, and turned the question into one of the &lt;i&gt;constitutional right to privacy, and not the private right. &lt;/i&gt;Why the Court turned an issue between two private parties – adequately covered by the tort of breach of confidentiality – into an Article 21 issue is anybody’s guess. &lt;i&gt;Surely&lt;/i&gt; Article 21 – the right to life and personal liberty – is not horizontally applicable, because if it was, we might as well scrap the entire Indian Penal Code, which deals with exactly these kinds of issues – individuals violating each others’ rights to life and personal liberty. Nonetheless, the Court cited &lt;i&gt;Kharak Singh, Gobind &lt;/i&gt;&lt;span&gt;&lt;b&gt;and&lt;/b&gt;&lt;/span&gt; Article 8 of the European Convention of Human Rights, further muddying the waters, because Article 8 – in contrast to American law – embodies a &lt;i&gt;proportionality test&lt;/i&gt; for determining whether there has been an impermissible infringement of privacy. The Court then came up with the following observation:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;Where there is a clash of two Fundamental Rights, as in the instant case, namely, the appellant’s right to privacy as part of right to life and Ms. Akali’s right to lead a healthy life which is her Fundamental Right under Article 21, the RIGHT which would advance the public morality or public interest, would alone be enforced through the process of Court, for the reason that moral considerations cannot be kept at bay.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect, this is utterly bizarre. If there is a clash of two rights, then that clash must be resolved by referring to the &lt;i&gt;Constitution&lt;/i&gt;, and not to the Court’s opinion of what an amorphous, elastic, malleable, many-sizes-fit “public morality” says. The mischief caused by this decision, however, was replicated in &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/1309207/"&gt;Sharda v Dharmpal&lt;/a&gt;, &lt;/i&gt;decided by the Court in 2003. In that case, the question was whether the Court could require a party who had been accused of unsoundness of mind (as a ground for divorce under the wonderfully progressive Hindu Marriage Act) to undergo a medical examination – and draw an adverse inference if she refused. Again, whether this was a case in which Article 21 ought to be invoked is doubtful; at least, it is arguable, since it was the Court making the order. Predictably, the Court cited from &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;extensively. It cited &lt;i&gt;Gobind&lt;/i&gt; (compelling State interest) &lt;i&gt;and&lt;/i&gt; the ECHR (proportionality). It cited a series of cases involving custody of children, where various Courts had used a “balancing test” to determine whether the best interests of the child overrode the privacy interest exemplified by the client-patient privilege. It applied this balancing test to the case at hand by balancing the “right” of the petitioner to obtain a divorce for the spouse’s unsoundness of mind under the HMA, vis-à-vis the Respondent’s right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above analysis, it is submitted that although the outcome in &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;and &lt;i&gt;Sharda v Dharmpal &lt;/i&gt;might well be correct, the Supreme Court has misread what &lt;i&gt;R. Rajagopal &lt;/i&gt;actually held, and its reasoning is deeply flawed. Neither of these cases are Article 21 cases: they are private tort cases between private parties, and ought to be analysed under private law, as &lt;i&gt;Rajagopal&lt;/i&gt; itself was careful to point out. In private law, also, the balancing test makes perfect sense: there are a series of interests at stake, as the Court rightly understood, such as certain rights arising out of marriage, all of a private nature. In any event, whatever one might make of these judgments, one thing is clear: they are both logically and legally irrelevant to the &lt;i&gt;Kharak Singh &lt;/i&gt;line of cases that we have been discussing, which are to do with the Article 21 right to privacy &lt;i&gt;against the State&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T23:02:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2">
    <title>Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2</link>
    <description>
        &lt;b&gt;Gautam Bhatia analyses the first case in which the Supreme Court recognized a constitutional right to privacy, Gobind v. State of Madhya Pradesh, and argues that the holding in that case adopted the three-pronged American test of strict scrutiny, compelling State interest, and narrow tailoring in its approach to privacy violations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After its judgment in Kharak Singh, the Court was not concerned with the privacy question for a while. The next case that dealt – peripherally – with the issue came eleven years later. In &lt;i&gt;R.M. Malkani v State of Maharashtra&lt;/i&gt;, the Court held that attaching a recording device to a person’s telephone did not violate S. 25 of the Telegraph Act, because&lt;/p&gt;
&lt;blockquote class="italized" style="text-align: justify; "&gt;"where a person talking on the telephone allows another person to record it or to hear it, it can-not be said that the other person who is allowed to do so is damaging, removing, tampering, touching machinery battery line or post for intercepting or acquainting himself with the contents of any message. There was no element of coercion or compulsion in attaching the tape recorder to the telephone."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Although this case was primarily about the admissibility of evidence, the Court also took time out to consider – and reject – a privacy-based Article 21 argument, holding that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Article 21 was invoked by submitting that the privacy of the appellant’s conversation was invaded. Article 21 contemplates procedure established by law with regard to deprivation of life or personal liberty. The telephonic conversation of an innocent citizen will be protected by Courts against wrongful or high handed interference by tapping the conversation. The protection is not for the guilty citizen against the efforts of the police to vindicate the law and prevent corruption of public servants. It must not be understood that the Courts will tolerate safeguards for the protection of the citizen to be imperiled by permitting the police to proceed by unlawful or irregular methods."&lt;br /&gt;&lt;br /&gt; Apart from the fact that it joined Kharak Singh in refusing to expressly find a privacy right within the contours of Article 21, there is something else that unites Kharak Singh and R.M. Malkani: they hypothetical in Kharak Singh became a reality in Malkani – what saved the telephone tapping precisely because it was directed at "… a guilty person", with the Court specifically holding that the laws were not for targeting innocent people. Once again, then, the targeted  and specific nature of interception became a crucial – and in this case, a decisive – factor. One year later, in another search and seizure case, Pooran Mal v Inspector, the Court cited M.P. Sharma and stuck to its guns, refusing to incorporate the Fourth Amendment into Indian Constitutional law.&lt;br /&gt;&lt;br /&gt;It is &lt;i&gt;Gobind v State of MP&lt;/i&gt;, decided in 1975, that marks the watershed moment for Indian privacy law in the Constitution. Like Kharak Singh, Gobind also involved domiciliary visits to the house of a history-sheeter. Unlike Kharak Singh, however, in Gobind the Court found that the Regulations did have statutory backing – S. 46(2)(c) of the Police Act, which allowed State Government to make notifications giving effect to the provisions of the Act, one of which was the prevention of commission of offences. The surveillance provisions in the impugned regulations, according to the Court, were indeed for the purpose of preventing offences, since they were specifically aimed at repeat offenders. To that extent, then, the Court found that there existed a valid “law” for the purposes of Articles 19 and 21.&lt;br /&gt;&lt;br /&gt;By this time, of course, American constitutional law had moved forward significantly from eleven years ago, when Kharak Singh had been decided. The Court was able to invoke &lt;i&gt;Griswold v Connecticut&lt;/i&gt; and &lt;i&gt;Roe v Wade&lt;/i&gt;, both of which had found a "privacy" as an "interstitial" or "penumbral" right in the American Constitution – that is, not reducible to any one provision, but implicit in a number of separate provisions taken together. The Court ran together a number of American authorities, referred to Locke and Kant, to dignity, to liberty and to autonomy, and ended by holding, somewhat confusingly:&lt;br /&gt;&lt;br /&gt;“the right to privacy must encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child rearing. This catalogue approach to the question is obviously not as instructive as it does not give analytical picture of that distinctive characteristics of the right of privacy. Perhaps, the only suggestion that can be offered as unifying principle underlying the concept has been the assertion that a claimed right must be a fundamental right implicit in the concept of ordered liberty… there are two possible theories for protecting privacy of home. The first is that activities in the home harm others only to the extent that they cause offence resulting from the mere thought that individuals might he engaging in such activities and that such ‘harm’ is not Constitutionally protective by the state. The second is that individuals need a place of sanctuary where they can be free from societal control. The importance of such a sanctuary is that individuals can drop the mask, desist for a while from projecting on the world the image they want to be accepted as themselves, an image that may reflect the values of their peers rather than the realities of their natures… the right to privacy in any event will necessarily have to go through a process of case-by-case development."&lt;br /&gt;&lt;br /&gt;But if no clear principle emerges out of the Court’s elucidation of the right, it was fairly unambiguous in stressing the importance of the right itself. Interestingly, it grounded the right within the context of the freedom struggle. "Our founding fathers," it observed, "were thoroughly opposed to a Police Raj even as our history of the struggle for freedom has borne eloquent testimony to it." (Para 30) The parallels to the American Fourth Amendment are striking here: in his historical analysis Akhil Amar tells us that the Fourth Amendment was meant precisely to avoid the various abuses of unreasonable searches and seizures that were common in England at the time.&lt;br /&gt;&lt;br /&gt;The parallels with the United States become even more pronounced, however, when the Court examined the grounds for limiting the right to privacy. "Assuming that the fundamental rights explicitly guaranteed to a citizen have penumbral zones and that the right to privacy is itself a fundamental right, that fundamental right must be subject to restriction on the basis of compelling public interest." "Compelling public interest" is an interesting phrase, for two reasons. First, “public interest” is a ground for fundamental rights restrictions under Article 19 (see, e.g., Article 19(6)), but the text of the Article 19 restrictions do not use – and the Court, in interpreting them, has not held – that the public interest must be “compelling”. This suggests a stricter standard of review for an Article 21 privacy right violation than Article 19 violations. This is buttressed by the fact that in the same paragraph, the Court ended by observing: “even if it be assumed that Article 19(5) [restrictions upon the freedom of movement] does not apply in terms, as the right to privacy of movement cannot be absolute, a law imposing reasonable restriction upon it for compelling interest of State must be upheld as valid.” The Court echoes the language of 19(5), and adds the word “compelling”. This surely cannot be an oversight.&lt;br /&gt;&lt;br /&gt;More importantly – the compelling State interest is an American test, used often in equal protection cases and cases of discrimination, where “suspect classes” (such as race) are at issue. Because of the importance of the right at issue, the compelling state interest test goes hand-in-hand with another test: narrow tailoring. Narrow tailoring places a burden upon the State to demonstrate that its restriction is tailored in a manner that infringes the right as narrowest manner that is possible to achieve its goals. The statement of the rule may be found in the American Supreme Court case of Grutter v Bollinger:&lt;br /&gt;&lt;br /&gt;"Even in the limited circumstance when drawing racial distinctions is permissible to further a compelling state interest, government is still constrained under equal protection clause in how it may pursue that end: the means chosen to accomplish the government’s asserted purpose must be specifically and narrowly framed to accomplish that purpose."&lt;br /&gt;&lt;br /&gt; To take an extremely trivial example that will illustrate the point: the State wants to ban hate speech against Dalits. It passes legislation that bans “all speech that disrespects Dalits.” This is not narrowly tailored, because while all hate speech against Dalits necessarily disrespects them, all speech that disrespects Dalits is not necessarily hate speech. It was possible for the government to pass legislation banning only hate speech against Dalits, one that would have infringed upon free speech more narrowly than the “disrespect law”, and still achieved its goals. The law is not narrowly tailored.&lt;br /&gt;&lt;br /&gt;Crucially, then, the Court in Gobind seemed to implicitly accept the narrow-tailoring flip side of the compelling state interest coin. On the constitutionality of the Police Regulations itself, it upheld their constitutionality by reading them narrowly. Here is what the Court said:&lt;br /&gt;&lt;br /&gt;“Regulation 855, in our view, empowers surveillance only of persons against whom reasonable materials exist to induce the opinion that they show a determination, to lead a life of crime – crime in this context being confined to such as involve public peace or security only and if they are dangerous security risks. Mere convictions in criminal cases where nothing gravely imperiling safety of society cannot be regarded as warranting surveillance under this Regulation. Similarly, domiciliary visits and picketing by the police should be reduced to the clearest cases of danger to community security and not routine follow-up at the end of a conviction or release from prison or at the whim of a police officer.”&lt;br /&gt;&lt;br /&gt; But Regulation 855 did not refer to the gravity of the crime at all. Thus, the Court was able to uphold its constitutionality only by narrowing its scope in a manner that the State’s objective of securing public safety was met in a way that minimally infringed the right to privacy.&lt;br /&gt;&lt;br /&gt;Therefore, whether the Gobind bench was aware of it or not, its holding incorporates into Indian constitutional law and the right to privacy, not just the compelling State interest test, but narrow tailoring as well. The implications for the CMS are obvious. Because with narrow tailoring, the State must demonstrate that bulk surveillance of all individuals, whether guilty or innocent, suspected of crimes or not suspected of crimes (whether reasonably or otherwise), possessing a past criminal record or not, speaking to each other of breaking up the government or breaking up a relationship – every bit of data must be collected to achieve the goal of maintaining public security, and that nothing narrower will suffice. Can the State demonstrate this? I do not think it can, but at the very least, it should be made to do so in open Court.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-27T18:03:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1">
    <title>Surveillance and the Indian Constitution - Part 1: Foundations</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1</link>
    <description>
        &lt;b&gt;In this insightful seven-part series, Gautam Bhatia looks at surveillance and the right to privacy in India from a constitutional perspective, tracing its genealogy through Supreme Court case law and compares it with the law in the USA.&lt;/b&gt;
        &lt;p&gt;Note: This was originally posted on the &lt;a href="http://indconlawphil.wordpress.com/2013/12/15/surveillance-and-privacy-in-india-i-foundations/"&gt;Indian Constitutional Law and Philosophy blog&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On previous occasions, we &lt;a href="http://indconlawphil.wordpress.com/2013/11/23/surveillance-privacy-association-and-the-constitution-i-oral-arguments-in-aclu-v-clapper/"&gt;have&lt;/a&gt; &lt;a href="http://indconlawphil.wordpress.com/2013/11/24/oral-arguments-in-aclu-v-clapper-ii-how-surveillance-affects-free-speech-and-the-freedom-of-association/"&gt;discussed&lt;/a&gt; the ongoing litigation in &lt;i&gt;ACLU v. Clapper &lt;/i&gt;in the United States, a challenge to the constitutionality of the National Security Agency’s (NSA) bulk surveillance program. Recall that a short while after the initial Edward Snowden disclosures, The Hindu revealed the extent of domestic surveillance in India, under the aegis of the Central Monitoring System (CMS). The CMS (and what it does) is excellently summarized &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;here&lt;/a&gt;. To put thing starkly and briefly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;“With the C.M.S., the government will get &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;centralized access to all communications metadata and content&lt;/a&gt; traversing through all telecom networks in India. This means that the government can listen to all your calls, track a mobile phone and its user’s location, read all your text messages, personal e-mails and chat conversations. It can also see all your Google searches, Web site visits, usernames and passwords if your communications aren’t encrypted.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is not sanctioned by parliamentary legislation. It also raises serious privacy concerns. In order to understand the constitutional implications, therefore, we need to investigate Indian privacy jurisprudence. In a series of posts, we plan to discuss that.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is not mentioned in the Constitution. It plays no part in the Constituent Assembly Debates. The place of the right – if it exists – must therefore be located within the structure of the Constitution, as fleshed out by judicial decisions. The first case to address the issue was &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/1306519/"&gt;M. P. Sharma v. Satish Chandra&lt;/a&gt;, &lt;/i&gt;in 1954. In that case, the Court upheld search and seizure in the following terms:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;"A power of search and seizure is in any system of jurisprudence an overriding power of the State for the protection of social security and that power is &lt;span&gt;necessarily regulated&lt;/span&gt; by law. When the Constitution makers have thought fit not to subject such regulation to Constitutional limitations by recognition of &lt;span&gt;a &lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;&lt;span&gt;fundamental right to privacy, analogous to the American Fourth Amendment&lt;/span&gt;&lt;/i&gt;&lt;i&gt;, we have no justification to import it, into a totally different fundamental right. by some process of strained construction."&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;The right in question was 19(1)(f) – the right to property. Notice here that the Court did not reject a right to privacy altogether – it only rejected it in the context of searches and seizures for documents, the specific prohibition of the American &lt;a href="http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution"&gt;Fourth Amendment&lt;/a&gt; (that has no analogue in India). This specific position, however, would not last too long, and was undermined by the very next case to consider this question, &lt;i&gt;Kharak Singh&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="http://indiankanoon.org/doc/619152/"&gt;&lt;i&gt;Kharak Singh v. State of UP&lt;/i&gt;&lt;/a&gt;, the UP Police Regulations conferred surveillance power upon certain “history sheeters” – that is, those charged (though not necessarily convicted) of a crime. These surveillance powers included secret picketing of the suspect’s house, domiciliary visits at night, enquiries into his habits and associations, and reporting and verifying his movements. These were challenged on Article 19(1)(d) (freedom of movement) and Article 21 (personal liberty) grounds. It is the second ground that particularly concerns us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a preliminary matter, we may observe that the Regulations in question were administrative – that is, they did not constitute a “law”, passed by the legislature. This &lt;i&gt;automatically &lt;/i&gt;ruled out a 19(2) – 19(6) defence, and a 21 “procedure established by law” defence – which were only applicable when the State made a &lt;i&gt;law&lt;/i&gt;. The reason for this is obvious: fundamental rights are extremely important. If one is to limit them, then that judgment must be made by a competent &lt;i&gt;legislature&lt;/i&gt;, acting through the proper, deliberative channels of lawmaking – and not by mere administrative or executive action. Consequently – and this is quite apart from the question of administrative/executive &lt;i&gt;competence &lt;/i&gt; - if the Police Regulations were found to violate Article 19 or Article 21, that made them &lt;i&gt;ipso facto &lt;/i&gt;void, without the exceptions kicking in. (Paragraph 5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also important to note one other thing: as a defence, it was &lt;i&gt;expressly &lt;/i&gt;argued by the State that the police action was reasonable and in the interests of maintaining public order precisely because it was &lt;i&gt;“directed only against those who were on proper grounds suspected to be of proved anti-social habits and tendencies and on whom it was necessary to impose some restraints for the protection of society.” &lt;/i&gt;The Court agreed, observing that this would have &lt;i&gt;“an overwhelming and even decisive weight in establishing that the classification was rational and that the restrictions were reasonable and designed to preserve public order by suitable preventive action” &lt;/i&gt;– &lt;span&gt;if&lt;/span&gt; there had been a law in the first place, which there wasn’t. Thus, this issue itself was hypothetical, but what is crucial to note is that the State argued – and the Court endorsed – the basic idea that what makes surveillance reasonable under Article 19 is the very fact that it is &lt;i&gt;targeted – &lt;/i&gt;targeted at individuals who are specifically suspected of being a threat to society because of a history of criminality.&lt;/p&gt;
&lt;p&gt;Let us now move to the merits. The Court upheld secret picketing on the ground that it could not affect the petitioner’s freedom of movement since it was, well &lt;i&gt;secret&lt;/i&gt; – and what you don’t know, apparently, cannot hurt you. What the Court found fault with was the intrusion into the petitioner’s dwelling, and knocking at his door late at night to wake him up. The finding required the Court to interpret the meaning of the term “&lt;i&gt;personal liberty&lt;/i&gt;” in Article 21. By contrasting the very specific rights listed in Article 21, the Court held that:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;Is then the word “personal liberty” to be construed as excluding from its purview an invasion on the part of the police of the sanctity of a man’s home &lt;span&gt;and an intrusion into his personal security&lt;/span&gt; and &lt;span&gt;his right to sleep which is the normal comfort and a dire necessity for human existence even as an animal&lt;/span&gt;? It might not be inappropriate to refer here to the words of the preamble to the Constitution that it is designed to “&lt;span&gt;assure the dignity of the individual&lt;/span&gt;” and therefore of those cherished human value as the means of ensuring his full development and evolution. We are referring to these objectives of the framers merely to draw attention to the concepts underlying the constitution which would point to such vital words as “personal liberty” having to be construed in a reasonable manner and to be attributed that these which would promote and achieve those objectives and by no means to stretch the meaning of the phrase to square with any preconceived notions or doctrinaire constitutional theories.”&lt;/i&gt; (Paragraph 16)&lt;/p&gt;
&lt;p&gt;A few important observations need to be made about this paragraph. The first is that it immediately follows the Court’s examination of the American &lt;a href="http://en.wikipedia.org/wiki/Fifth_Amendment_to_the_United_States_Constitution"&gt;Fifth&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/Fourteenth_Amendment_to_the_United_States_Constitution"&gt;Fourteenth Amendments&lt;/a&gt;, with their guarantees of “life, liberty and property…” and is, in turn, followed by the Court’s examination of the American &lt;a href="http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution"&gt;&lt;i&gt;Fourth&lt;/i&gt; Amendment&lt;/a&gt;, which guarantees the protection of a person’s houses, papers, effects etc from unreasonable searches and seizures. The Court’s engagement with the Fourth Amendment is ambiguous. It admits that “&lt;i&gt;our Constitution contains no like guarantee…&lt;/i&gt;”, but holds that &lt;i&gt;nonetheless &lt;/i&gt;“&lt;i&gt;these extracts &lt;/i&gt;[from the 1949 case, &lt;a href="http://en.wikipedia.org/wiki/Wolf_v._Colorado"&gt;&lt;i&gt;Wolf v Colorado&lt;/i&gt;&lt;/a&gt;]&lt;i&gt; would show that an unauthorised intrusion into a person’s home and the disturbance caused to him thereby, is as it were the violation of a common law right of a man – an ultimate essential of ordered liberty”&lt;/i&gt;, thus tying its own holding in some way to the American Fourth Amendment jurisprudence. But here’s the crucial thing: &lt;i&gt;at this point&lt;/i&gt;, American Fourth Amendment jurisprudence was &lt;i&gt;propertarian based &lt;/i&gt;– that is, the Fourth Amendment was understood to codify – with added protection – the common law of trespass, whereby a man’s property was held sacrosanct, and not open to be trespassed against. Four years later, in 1967, in &lt;a href="http://en.wikipedia.org/wiki/Katz_v._United_States"&gt;&lt;i&gt;Katz&lt;/i&gt;&lt;/a&gt;, the Supreme Court would shift its own jurisprudence, to holding that the Fourth Amendment protected zones where persons had a “&lt;i&gt;reasonable&lt;/i&gt;&lt;i&gt; expectation of privacy&lt;/i&gt;”, as opposed to simply protecting listed items of property (homes, papers, effects etc). &lt;i&gt;Kharak Singh&lt;/i&gt; was handed down before &lt;i&gt;Katz. &lt;/i&gt;Yet the quoted paragraph expressly shows that the Court anticipated &lt;i&gt;Katz&lt;/i&gt;, and in expressly grounding the Article 21 personal liberty right within the meaning of &lt;i&gt;dignity&lt;/i&gt;, utterly rejected the propertarian-tresspass foundations that it might have had. To use a phrase invoked by later Courts – in this proto-privacy case, the Court already set the tone by holding it to attach to &lt;i&gt;persons&lt;/i&gt;, not &lt;i&gt;places.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;While effectively finding a right to privacy in the Constitution, the Court expressly declined to frame it that way. In examining police action which involved tracking a person’s location, association and movements, the Court upheld it, holding that &lt;i&gt;“the right of privacy is not a guaranteed right under our Constitution &lt;span&gt;and therefore&lt;/span&gt; the attempt to ascertain the movements of an individual which &lt;span&gt;is merely a manner in which privacy&lt;/span&gt; is invaded is not an infringement of a fundamental right guaranteed by Part III.”&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; The “therefore” is crucial. Although not expressly, the Court virtually holds, in terms, that tracking location, association and movements &lt;span&gt;does violate privacy&lt;/span&gt;, and only finds that constitutional because &lt;i&gt;there is no guaranteed right to privacy within the Constitution. &lt;/i&gt;Yet.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In his partly concurring and partly dissenting opinion, Subba Rao J. went one further, by holding that the idea of privacy was, in fact, contained within the meaning of Article 21: &lt;i&gt;“it is true our Constitution does not expressly declare a right to privacy as a fundamental right, but the said right is an essential ingredient of personal liberty.” &lt;/i&gt; Privacy he defined as the right to “&lt;i&gt;be free from restrictions or encroachments on his person, whether those restrictions or encroachments are directly imposed or indirectly brought about by calculated measures.” &lt;/i&gt;On this ground, he held all the surveillance measures unconstitutional.&lt;/p&gt;
&lt;p&gt;Justice Subba Rao’s opinion also explored a proto-version of the &lt;a href="http://en.wikipedia.org/wiki/Chilling_effect"&gt;chilling effect&lt;/a&gt;. Placing specific attention upon the word “&lt;i&gt;freely&lt;/i&gt;” contained within 19(1)(d)’s guarantee of free movment, Justice Subba Rao went specifically against the majority, and observed:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;“The freedom of movement in clause (d) therefore must be a movement in a free country, i.e., in a country where he can do whatever he likes, speak to whomsoever he wants, meet people of his own choice without any apprehension, subject of course to the law of social control. The petitioner under the shadow of surveillance is certainly deprived of this freedom. &lt;span&gt;He can move physically, but he cannot do so freely, for all his activities are watched and noted. The shroud of surveillance cast upon him perforce engender inhibitions in him and he cannot act freely as he would like to do. &lt;/span&gt;We would, therefore, hold that the entire Regulation 236 offends also Art. &lt;/i&gt;&lt;i&gt;19(1)(d) of the Constitution.”&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;This early case, therefore, has all the aspects that plague the CMS today. What to do with administrative action that does not have the sanction of law? What role does targeting play in reasonableness – assuming there is a law? What is the philosophical basis for the implicit right to privacy within the meaning of Article 21’s guarantee of personal liberty? And is the chilling effect a valid constitutional concern?&lt;/p&gt;
&lt;p&gt;We shall continue with the development of the jurisprudence in the next post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;You can follow Gautam Bhatia &lt;a href="https://twitter.com/gautambhatia88"&gt;on Twitter&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-23T15:12:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
