<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 601 to 615.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-network-suicide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-media-sites-refuse-indian-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/social-media-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-media-indian-govt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/snooping-to-data-abuse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter">
    <title>Social Notworking - 'Murder by Twitter'</title>
    <link>https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter</link>
    <description>
        &lt;b&gt;Suketu Mehta (@suketumehta) - terrible news about sunanda tharoor. this is murder by twitter. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Malini Nair &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2014-01-19/social-media/46345808_1_sunanda-pushkar-social-media-that-pushkar"&gt;published in the Times of India&lt;/a&gt; quotes Nishant Shah.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even before forensic science has 		declared the reasons behind Sunanda Pushkar's shocking death on 		Friday night, social media has been accused of murder. Writer 		Suketu Mehta wasn't the only one to point fingers. "First 		murder by @TwitterIndia , claps, fellow &lt;a href="http://timesofindia.speakingtree.in/topics/thoughts/twitter"&gt;twitter&lt;/a&gt; matured guns!" is how another tweet went. Besides the deadly 		cocktail of depression, drugs, a strained marriage, questions have 		been raised about whether the vicious banter and collective howls 		of derision on social media over her very public meltdown — again 		on social media — pushed her over the edge. &lt;br /&gt;Have we, the 		tweeple, in our eagerness to share every detail of our lives over 		an internet megaphone, not quite understood what the social media 		can do, especially its pitfalls? Is the line between the public and 		private blurring too fast? Commentators say that the rules that 		govern human and social behaviour haven't changed, and the fault 		lies in how we negotiate the cyber turf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can our digital lives 		have serious offline consequences? Nishant Shah, director, research 		, Centre for Internet &amp;amp; Society, Bangalore, says people need to 		realize that though twitter amplifies everything, but the ability 		to hurt, be mean, fight, question, critique and bully is not new.&lt;/p&gt;
&lt;p&gt;"These are human practices , which replay themselves across 	different media forms. What is perhaps new is that our most personal 	and darkest desires have become available for public spectacle," 	says Shah.&lt;/p&gt;
&lt;div dir="LTR" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;That the twitterati can be brutal has been shown 	often enough this last year. When Tehelka editor Tarun Tejpal was 	mired in allegations of sexual harassment, his daughter was hounded 	on social media. Recently when novelist Lavanya Sankaran wrote an 	op-ed for New York Times defending the decent Indian man, she was 	royally derided, so much so that another journalist Rahul Bhatia 	tweeted in her defence, asking people to lay off.&lt;/p&gt;
&lt;p&gt;Sunanda's 	story hurtled towards a tragedy in a space of 48 hours after she 	went public. As Shah points out it wasn't as though there were no 	affairs and scandals before the dawn of social media but the tangle 	would have spun out differently and less brutally in another time 	and age. It all began, as Pushkar admitted to some papers and later 	denied, with the spilling of alleged BBMs sent by Pakistani 	journalist Mehr Tarar to Tharoor on his twitter account.&lt;/p&gt;
&lt;p&gt;Predictably, the effect of the first round of revelations was 	explosive. In fact, Pushkar herself appeared taken aback by the fact 	that a twitter spat ended up making front page headlines.&lt;/p&gt;
&lt;p&gt;The 	entire drama which, in another age, would have played out at home or 	a circle of family, friends and acquaintances — and at the most in 	far less dramatic gossip columns and on TV— was up on social 	media, provide enormous vicarious pleasure to thousands of social 	media bystanders. That Pushkar herself set the virtual assault in 	motion only adds to the bleak irony of it all. This was also not the 	first time Pushkar took a spat to twitter. @SPTVrocks tweeted about 	her fight with a journalist in Dubai earlier this month.&lt;/p&gt;
&lt;p&gt;Clinical 	psychologist Varkha Chulani says it is the personality behind the 	media usage not the form itself that is to be blamed. "People 	choose to talk about their private lives to impress others, to get 	attention. We forget what is real and what is virtual." Shah, 	however, believes that we live in a world of digital striptease and 	that the ubiquitous and pervasive technologies that surround us have 	forever blurred the lines between real and virtual.&lt;/p&gt;
&lt;p&gt;Activists 	have often pointed out that the social media has everything going 	for it — quick and vast connect and instant response — but what 	it lacks is empathy. It is easy enough to send out an RIP message, 	for instance, for someone you don't know or even care for, 	positioning yourself as a caring, empathetic soul in 140 characters.&lt;/p&gt;
&lt;p&gt;Post Pushkar's death, news anchor Barkha Dutt tweeted that we 	need to limit viciousness , stop judging and use greater compassion 	on twitter.&lt;/p&gt;
&lt;p&gt;Shah makes a similar plea for the human touch.&lt;/p&gt;
&lt;p&gt;"We 	are all so self-involved , creating narratives of our selves, 	bit-stripping every moment , instagramming every event, tweeting 	every encounter, and liking all the various things that happen 	around us, that we don't always have enough time to stop, to 	respond, to think and reflect upon other people's conditions . We 	have become jaded, to the various 'great' moments in people's time 	lines, but we are also becoming jaded to the pain that our 	involvement in these social networks can bring to those who are the 	subject of our attention," he says.&lt;/p&gt;
&lt;/div&gt;
&lt;div dir="LTR" id="mod-a-body-after-second-para" style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;With additional reporting by Shobita Dhar&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter'&gt;https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-04T07:02:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-network-suicide">
    <title>Social Network Suicide</title>
    <link>https://cis-india.org/news/social-network-suicide</link>
    <description>
        &lt;b&gt;Those disillusioned with their virtual friends circle are saying goodbye through web applications that wipe out your net identity. What’s more, you can even have your own memorial page, says Sahana Charan in this article published in the Bangalore Mirror on Sunday, February 6, 2011.&lt;/b&gt;
        
&lt;p&gt;It is funny that even though some young people claim to have a thousand friends on social networking sites, they may actually never socialise with any of their virtual buddies. So when the “net” benefits don’t translate to reality, there is disillusionment. And then they may stop being active on networking sites. That’s the beauty and tragedy of virtual friendships.&lt;/p&gt;
&lt;p&gt;And this is just one of the many reasons why your friend — who was otherwise tweeting her every mundane activity or would update her status message on Facebook every nano-second — might have suddenly become incommunicado.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As pressures to keep up virtual appearances become taxing and unpleasant experiences make social networking sites “not-so-safe” to share intimate details, many young people are opting out of these networks, deactivating their accounts and taking web sanyaas.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore says that in India this is a relatively new phenomenon and only a small group of people have actually committed web suicide using applications that wipe out your virtual identity. But a bigger&amp;nbsp; number of netizens may be killing their networking accounts, because of a variety of resons — ranging from internet stalking to “no guaranteed benefits.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;“Many people may get onto a social networking site to use it for meeting rituals, to look for partners and to get information on jobs. When these are fulfilled they may decide to move out.&amp;nbsp; Some people realise that a lot of their time and energy goes into updating accounts on Facebook, Twitter or Myspace, but it has not helped them get ‘real world’ benefits, so they just stop being active,” says Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Virtual disappearance&lt;/h3&gt;
&lt;p&gt;With the deactivation came some applications which help you go peacefully into a social network death — Web 2.0 Suicide Machine and Sepukkoo.com promise to remove your virtual identity completely so that you can make real friends. While Suicide Machine irreversibly removes all your friends, groups, photos and vidoes one by one and joins you to its “Social Network Suiciders,” Sepukkoo goes one step ahead and creates a memorial page for you.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;What’s ironical is that you are actually going to another network and this one’s&amp;nbsp; called ‘suicide networking’, where you encourage friends to leave their social circles. Both applications have been banned by Facebook but work on other sites.&lt;/p&gt;
&lt;p&gt;So why would a popular guy deactivate his account ? Joe V J, a 28-year-old IT professional, who was regularly uploading pictures of his new bike or parties with friends on Facebook, took himself off the site recently. He realised that people who were not meant to see his profile and candid shots, had access and were posting comments.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;“I got into the site because it was a great place to bond with friends. But then I realised that relatives and acquaintances who I had no clue about, were on the social network, had started pinging. They would look at pictures and express shock and then&amp;nbsp; tell other people. It became a little too much, so I just decided to click the deactivate option,” he says.&lt;/p&gt;
&lt;h3&gt;Privacy concerns&lt;/h3&gt;
&lt;p&gt;It can get really ugly and those being harassed online may just disappear to save their privacy. Tinu Cherian, a techie and Wikipedia administrator speaks of an incident where another administrator was harassed by a cyber troll because he had blocked this guy from making wrong updates on Wiki’s pages.&lt;/p&gt;
&lt;p&gt;“He had no option but to wipe out his Twitter account, which was hacked into&amp;nbsp; and&amp;nbsp;&amp;nbsp; damning information was uploaded.”&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Privacy concerns rise as&amp;nbsp; Facebook decides to share account information with marketeers. “When Facebook first started, only 10 per cent of your information on the site could be seen by an outsider, but in 2011, 90 per cent of your information can be accessed by people other than your friends,” says Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There is another reason why people go off online networks. “When it first came, Facebook was considered the Ivy league and everyone wanted to be there. Youngsters suddenly thought Orkut was infradig and ceased to be on that site. So sometimes, people may just move out because they want to be somewhere else.”&amp;nbsp; And that’s why the networking tamasha continues.&lt;/p&gt;
&lt;p&gt;Read the article in the &lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=81&amp;amp;contentid=201102062011020607474371421797a6c"&gt;Bangalore Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-network-suicide'&gt;https://cis-india.org/news/social-network-suicide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:54:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore">
    <title>Social media, SMS are not why NE students left Bangalore</title>
    <link>https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore</link>
    <description>
        &lt;b&gt;I woke up one morning to find that I was living in a city of crisis. Bangalore, where the largest public preoccupations to date have been about bad roads, stray dogs, and occasionally, the lack of night-life, the city was suddenly a space that people wanted to flee and occupy simultaneously.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's article on North East exodus was &lt;a class="external-link" href="http://www.firstpost.com/tech/social-media-sms-are-not-why-ne-students-left-bangalore-423151.html"&gt;published&lt;/a&gt; in FirstPost on August 20, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Through technology mediated gossip mill that produced rumours faster than the speed of a digital click, imagination of terror, of danger and of material harm found currency and we found thousands of people suddenly leaving the city to go back to their imagined homelands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The media spectacle of this exodus around questions of religion, ethnicity and regionalism only emphasised the fact that there is a new wave of connectedness that we live in – the social web, or what have you – that can no longer be controlled, contained or corrected by official authorities and their voices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite a barrage of messages from the law enforcement and security authorities, on email, on large screens on the roads, and on the comfort of our cell-phones, there was a growing anxiety and a spiralling information mill that was producing an imaginary situation of precariousness and bodily harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much has been said about the eruption of this irrationality that pokes holes in the mantle of cosmopolitanism that Bangalore (and other such ‘global cities’) is enveloped in, in its quest to represent the India that is supposed to shine. It has been heartening to see how communities that were supposed to be in conflict have worked so hard in the last few days, at building human contacts and providing assurances of safety and inclusion, which are far more effective than the official word.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There has been a rich discourse on what this means for India’s modernity, especially when such an event marks the so-called neo-liberal cities, showing the darker undercurrents of discrimination and suspicion that seem to lie just beneath the surface of networked neighbourhoods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is much to be unpacked about the political motivations and the ecologies of fear that our immigrant lives are enshrined in, I want to focus on two aspects of this phenomenon which need more attention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is the fierce localisation of our global technologies. There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging us in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us towards an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the times, these networks are so naturalised and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility, In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The visibility of the networks, when they suddenly crop up for public viewing, for those of us who are outside of that network, it signals that something has gone wrong. There is a glitch in the matrix and we need to start unpacking the local, the specific and the particular that signals the separation of these networks from our habits of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point I want to make is about the need to look at the ellipsis that occurs in this spectacular emergence of the network and the apparatus that is set into place to control and regiment it. The hyper-visibility of the information and technology network destabilises the ways in which we think of our everyday, thus emerging not only as a sign of the crisis but a crisis unto itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These ellipses of the crisis – replacing the crisis with the network – as well as the collusion between the crisis and the network are the easy solution that state authorities pick up on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a problem about the nation-wide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The solution, however, is offered at the level of technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of addressing the larger issues of conservative parochialism, an increasing back-lash by conservative governments and a growing hostility that emerges from these cities which nobody possesses and nobody belongs to, the efforts are being made to blame technology as the site where the problem is located and the object that needs to be controlled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So what we have is redundant regulation that controls the number of text messages we are able to send, or policing of internet for those spreading rumours. The entire focus has been on information management, as if the reason for mass exodus of people from the North East Indian states and the sense of fragility that the city has suddenly been immersed in, is all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in peer-2-peer environments outside of the control of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital Technologies have become the de facto scapegoats of many problems in our past. It invites more regulation, containment and censorship of the freedom that digital technologies allow you – from the infamous Delhi Public School MMS Scandal in the early 2000s to the recent attempts at filtering the social web – we have seen the repeated futility of such measures of technology control, and yet it appears as a constant trope in the State’s solution to the problems of the contemporary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This obsession with governance of technology to resolve a much more nuanced problem is akin to fabulous stories of mad monarchs banishing spinning wheels from their kingdoms or sentencing hammers to imprisonment for the potential and possibility of crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And these solutions are always going to fail, because they fail to recognise either the intimate penetration of digital technologies in our everyday life, or the ways in which our local structures are constructed through the presence of ubiquitous technologies and gadgets and screens and networks.&lt;/p&gt;
&lt;div id="_mcePaste"&gt; 
&lt;p style="text-align: justify; "&gt;There has been a rich discourse on what this means for India’s modernity, especially when such an event marks the so-called neo-liberal cities, showing the darker undercurrents of discrimination and suspicion that seem to lie just beneath the surface of networked neighbourhoods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is much to be unpacked about the political motivations and the ecologies of fear that our immigrant lives are enshrined in, I want to focus on two aspects of this phenomenon which need more attention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is the fierce localisation of our global technologies. There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging us in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us towards an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the times, these networks are so naturalised and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility, In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The visibility of the networks, when they suddenly crop up for public viewing, for those of us who are outside of that network, it signals that something has gone wrong. There is a glitch in the matrix and we need to start unpacking the local, the specific and the particular that signals the separation of these networks from our habits of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point I want to make is about the need to look at the ellipsis that occurs in this spectacular emergence of the network and the apparatus that is set into place to control and regiment it. The hyper-visibility of the information and technology network destabilises the ways in which we think of our everyday, thus emerging not only as a sign of the crisis but a crisis unto itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These ellipses of the crisis – replacing the crisis with the network – as well as the collusion between the crisis and the network are the easy solution that state authorities pick up on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a problem about the nation-wide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The solution, however, is offered at the level of technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of addressing the larger issues of conservative parochialism, an increasing back-lash by conservative governments and a growing hostility that emerges from these cities which nobody possesses and nobody belongs to, the efforts are being made to blame technology as the site where the problem is located and the object that needs to be controlled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So what we have is redundant regulation that controls the number of text messages we are able to send, or policing of internet for those spreading rumours. The entire focus has been on information management, as if the reason for mass exodus of people from the North East Indian states and the sense of fragility that the city has suddenly been immersed in, is all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in peer-2-peer environments outside of the control of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital Technologies have become the de facto scapegoats of many problems in our past. It invites more regulation, containment and censorship of the freedom that digital technologies allow you – from the infamous Delhi Public School MMS Scandal in the early 2000s to the recent attempts at filtering the social web – we have seen the repeated futility of such measures of technology control, and yet it appears as a constant trope n the State’s solution to the problems of the contemporary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This obsession with governance of technology to resolve a much more nuanced problem is akin to fabulous stories of mad monarchs banishing spinning wheels from their kingdoms or sentencing hammers to imprisonment for the potential and possibility of crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And these solutions are always going to fail, because they fail to recognise either the intimate penetration of digital technologies in our everyday life, or the ways in which our local structures are constructed through the presence of ubiquitous technologies and gadgets and screens and networks.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore'&gt;https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-28T10:48:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility">
    <title>Social media undermining journalistic credibility?</title>
    <link>https://cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility</link>
    <description>
        &lt;b&gt; The line separating journalists and bloggers is being increasingly blurred due to the growth of social media, said Nelson Moses, who was a panelist at a discussion on the credibility of social media as a journalistic tool.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://http//newindianexpress.com/cities/bangalore/article1487619.ece"&gt;published&lt;/a&gt; in the New Indian Express on March 4, 2013. Snehashish Ghosh was a panelist.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The talk titled, “Is social media credible?” comprising a panel of  professionals from various media houses from across India, was held as a  part of the alumni reunion at the Indian Institute of Journalism and  New Media (IIJNM) recently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel included Snehashish Ghosh, a  policy associate at the Centre for Internet and Society, Bangalore,  Nelson Moses, who has had stints with numerous media houses and now  works at Yahoo, Subhash Rai, web editor of the Economic and Political  Weekly, and Tresa Morera, the deputy editor of the global online desk at  Reuters, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion, moderated by Professor Mark  Austin of IIJNM, revolved around the crucial issues surrounding the  Indian media industry and the use of social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Talking points  included the role social media like Twitter and Facebook played in  populist movements across the Middle East, such as the Arab Spring and  also the exodus of people of Manipuri and Assamese descent from  Bangalore last year, due to a series of phone messages which purportedly  threatened them with violence.Other issues covered in the discussion  were whether bloggers could be cited as credible sources of information  and also if their roles in shaping public perception was influencing how  media houses and journalists function.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the course of the  discussion, which centered around the drawbacks of a digitally  interlinked media landscape, Subhash Rai, said that though it was  clearly the work of “right-wing fundamental elements” which led to the  circulation of provocative messages against people from the north  eastern part of the country, the incident also pointed to the failure of  neoliberalism in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Journalists are one of the  beneficiaries of neoliberalism,” said Shubash Rai, while arguing that  often, urban concerns take precedence over more&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;pressing issues  occurring outside the big cities, leading to these issues either not  being reported or not given the same importance. “For example, nobody is  reporting the agrarian crisis,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tresa Morera, an IIJNM  alumna, said that she believed that “transparency” in the Indian media,  and a series of “checks and balances” within media organizations could  help in better reporting by the media.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility'&gt;https://cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-06T04:41:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-media-sites-refuse-indian-censorship">
    <title>Social media sites refuse Indian censorship request</title>
    <link>https://cis-india.org/news/social-media-sites-refuse-indian-censorship</link>
    <description>
        &lt;b&gt;The Indian government's proposal to crack down on offensive internet content has sparked anger among the population.&lt;/b&gt;
        
&lt;p&gt;Telecommunications minister Kapil Sibal asked providers of social media sites like Facebook and Twitter to screen out content that might be considered defamatory to religious and political leaders. But the move has been decried as a gag on freedom of speech.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Presenter&lt;/strong&gt;: Kanaha Sabapathy&lt;br /&gt;&lt;strong&gt;Speakers&lt;/strong&gt;: Kapil Sibal, &lt;em&gt;India's Telecommunications Minister&lt;/em&gt;; Milind Deora, &lt;em&gt;Minister of State for Communications and IT&lt;/em&gt;; Varun Gandhi, &lt;em&gt;Member of Parliament for the Opposition, BJP&lt;/em&gt;; Sunil Abraham, &lt;em&gt;Executive Director of the policy research group, the Centre for Internet and Society &lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="" /&gt; Listen to the audio &lt;a href="https://cis-india.org/internet-governance/indian-censorship.asx" class="internal-link" title="Social media sites refuse Indian censorship request"&gt;here &lt;/a&gt;(Microsoft ASF video, 591 bytes)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Sunil Abraham spoke to Radio Australia. Follow the original broadcast by ABC Australia Radio &lt;a class="external-link" href="http://www.radioaustralia.net.au/connectasia/stories/201112/s3386803.htm"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-media-sites-refuse-indian-censorship'&gt;https://cis-india.org/news/social-media-sites-refuse-indian-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-08T08:26:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too">
    <title>Social media promotions can backfire, too</title>
    <link>https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too</link>
    <description>
        &lt;b&gt;Social media is a highly effective marketing tool for companies but its very ubiquity and the speed with which messaging goes viral has meant that it can hurt them badly as well, especially since platforms are not always moderated and can be hacked or misused.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ratna Bhushan and Varuni Khosla was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-11-11/news/43930106_1_star-india-pepsico-india-social-media-interactions"&gt;published in the Times of India&lt;/a&gt; on November 11, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It's not just bad language and racially or socially insensitive messages  seemingly originating from official Twitter handles, some companies are  guilty of poorly judged promotions resulting in consumer backlash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the eve of the country's largest broadcaster Star India  rebranding its sport channels last week, the Star Sports Twitter handle  posted abusive language. Star India said the account had had been  hacked, but by then the tweet had gone viral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just before that,  the Board of Control for Cricket in India Twitter handle had cricket  legend Sachin Tendulkar's digital autograph along with bad language on  the eve of his retirement from the sports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two days before  Diwali, beverage and snacks maker PepsiCo ran a contest on Twitter  asking contestants to tweet their version of the Ramayana. That caused  outrage on social media, led by writer Chetan Bhagat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PepsiCo  quickly apologised and removed the promotion but not before it got  flooded by tweets from those who were upset by the move. While Star and  BCCI blamed hackers and PepsiCo's scored an own goal, social media  experts say companies need to be more responsible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Our intent was to involve young Indians in one of India's most loved  festivals. We took immediate action and withdrew the contest," the  beverage maker's spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AStar Sports spokesperson  also said the firm had apologised for the offensive tweet. "We have  investigated the issue. A thirdparty vendor had abused his privileged  access to the account. We are in the process of taking necessary action  and will ensure that no such event recurs."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But ensuring  third-party quality control may be easier said than done. "Many  companies are unable to handle their social media operations because  they usually outsource these to companies that don't get paid well  enough (say Rs 50,000 to Rs 60,000 per month).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence the people  handling the accounts could be anyone from an untrained 22-year-old  fresh out of college or someone who has no skill set in the social media  space," said Gaba.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sometimes humour can turn offensive too. In the middle of last year,  when Sachin Tendulkar made his eagerly awaited 100th international  century, a tweet from insurance services firm Bajaj Allianz went:  Congrats to Sachin for his long awaited 100th ton. Now don't delay your  retirement planning. #RetireRich #JiyoBefikar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That caused much offence to Tendulkar's fans. Or take the case of  Fortis, which sought to promote breast feeding week last year with the  hashtag AgarMaKaDudhPia-HaiTo. Predictably, this one too ran into  trouble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Social media by definition, unlike broadcast media, cannot be  controlled. Therefore, even if you take all conceivable precautions  there can be unintended consequences. But India is culturally as  complicated as a continent — therefore, it requires a very sophisticated  understanding and nuance to pull off humour that is universally  appealing and does not offend anyone," said Abraham. Last week, the  seven-year-old Twitter's stock rose 73% on its debut, with a market  value of $31 billion, making it one of the most successful IPOs of the  year and beating even its own expectations. Globally, examples abound of  companies or institutions making on Twitter bloopers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Companies  shouldn't always come up with the excuse that their account was  hacked... they need to be accountable. A senior member of the team  should always oversee tweets before they're sent out," said Ankita Gaba,  co-founder of socialsamosa.com, an Indian social media knowledge  storehouse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Centre for  Internet and Society, a non-profit research organisation that works on  policy issues relating to freedom of expression and privacy, said, "The  BCCI disaster is because they have taken automation too far. Automation  of social media interactions can be useful but without careful human  oversight, it can very easily be gamed by rogue elements online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A PepsiCo India spokesman said the firm's #Ramayana140 Twitter contest "unintentionally caused some concern to consumers".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too'&gt;https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-14T05:24:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/social-media-monitoring">
    <title>Social Media Monitoring</title>
    <link>https://cis-india.org/internet-governance/blog/social-media-monitoring</link>
    <description>
        &lt;b&gt;We see a trend of social media and communication monitoring and surveillance initiatives in India which have the potential to create a chilling effect on free speech online and raises question about the privacy of individuals. In this paper, Amber Sinha looks at social media monitoring as a tool for surveillance, the current state of social media surveillance in India, and evaluate how the existing regulatory framework in India may deal with such practices in future.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Social Media Monitoring: &lt;a href="http://cis-india.org/internet-governance/files/social-media-monitoring/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;In 2014, the Government of India launched the much lauded and popular citizen outreach website called MyGov.in. A press release by the government announced that they had roped in global consulting firm PwC to assist in the data mining exercise to process and filter key points emerging from debates on Mygov.in. While this was a welcome move, the release also mentioned that the government intended to monitor social media sites in order to gauge popular opinion. Further, earlier this year, the government set up National Media Analytics Centre (NMAC) to monitor blogs, media channels, news outlets and social media platforms. The tracking software used by NMAC will generate tags to classify post and comments on social media into negative, positive and neutral categories, paying special attention to “belligerent” comments, and also look at the past patterns of posts. A project called NETRA has already been reported in the media a few years back which would intercept and analyse internet traffic using pre-defined filters. Alongside, we see other initiatives which intend to use social media data for predictive policing purposes such as CCTNS and Social Media Labs.&lt;/p&gt;
&lt;p&gt;Thus, we see a trend of social media and communication monitoring and surveillance initiatives announced by the government which have the potential to create a chilling effect on free speech online and raises question about the
privacy of individuals. Various commentators have raised concerns about the legal validity of such programmes and whether they were in violation of the fundamental rights to privacy and free expression, and the existing surveillance laws in India. The lack of legislation governing these programmes often translates into an absence of transparency and due procedure. Further, a lot of personal communication now exists in the public domain which
renders traditional principles which govern interception and monitoring of personal communications futile. In the last few years, the blogosphere and social media websites in India have also changed and become platforms for more dissemination of political content, often also accompanied by significant vitriol, ‘trolling’ and abuse. Thus, we see greater policing of public or semi-public spaces online. In this paper, we look at social media monitoring as a
tool for surveillance, the current state of social media surveillance in India and evaluate how the existing regulatory framework in India may deal with such practices in future.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/social-media-monitoring'&gt;https://cis-india.org/internet-governance/blog/social-media-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-01-16T14:23:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014">
    <title>Social media may influence 160 LS seats in 2014</title>
    <link>https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014</link>
    <description>
        &lt;b&gt;Social media is likely to influence politics and elections in 160 of India’s 543 Parliament constituencies, making Facebook and Twitter users the nation’s newest voting bloc, a new study suggests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Social-media-may-play-decisive-role-in-2014-polls/Article1-1042982.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on April 12, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In these mostly urbanizing constituencies, social-media usage is now  “sufficiently widespread” to influence the outcome of a general election  slated for 2014, the study by IRIS Knowledge Foundation and supported  by the Internet and Mobile Association of India (IAMAI), indicates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 4, Congress scion Rahul Gandhi’s high-profile address to the  Confederation of Indian Industry, a leading business forum, was trending  topmost on Twitter in India that day, some posts by rivals mocking him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A series of lectures by Gujarat chief minister Narendra Modi, a  presumptive PM, this week too garnered strong social-media attention,  with his and Gandhi’s supporters competing online to run the other down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A deeply polarizing figure still, Modi is often accused of watching  over a carnage that killed nearly 2000 people in 2002, mostly Muslims.  Yet, he has pulled off a stunning online strategy to showcase Gujarat as  India’s Guandong, a south China province with top GDP rankings and  investment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research shows that social media is more persuasive than television  ads. Nearly 100 million Indians, or more than Germany’s population, use  the Internet each day. Of this, 40 million have assured broadband, the  ones most likely to have at least one social media account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unlike Obama, who used social media directly for votes, Indian  politicians have tended to use it more to mould public discourse,” says  Sunil Abraham, the CEO of The Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is likely to change in 2014. Not surprisingly, Modi became the  third politician globally, a fter Obama and Australian PM Julia Gillard,  to host a political conference on Google+ hangout.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief ministers in states are also leveraging social media. Bihar has  unveiled a re-branded campaign called, “Bihar ka haq” or Bihar’s  Rightful Cause, on Facebook.&lt;/p&gt;
&lt;p&gt;Social-media-impacted  constituencies, according to the study, are those where Facebook users  are more than the victory margin of the winner in the last Lok Sabha  election, or where such users account for over 10% of the voting  population.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014'&gt;https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-15T07:13:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue">
    <title>Social Media Aids Rescue Efforts in Flood-Hit Kashmir </title>
    <link>https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue</link>
    <description>
        &lt;b&gt;As flood-ravaged Indian Kashmir faces a communication blackout, social media posts on Facebook and Twitter are playing a huge role in tracing people stranded in the region.&lt;/b&gt;
        &lt;p&gt;The article by &lt;span&gt;Anjana Pasricha was &lt;a class="external-link" href="http://www.voanews.com/content/kashmir-flood-social-media-aids-rescue/2445235.html"&gt;published in Voice of America&lt;/a&gt; on September 10, 2014. Sunil Abraham gave his inputs.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;More than 400 people in India and Pakistan have been killed in the  floods which have engulfed the mountainous region, and tens of thousands  are waiting to be rescued.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aijaz Qaisar, who works in Bangalore, is desperate for news of his  ailing, elderly parents and his brother’s family. They had to scramble  to the third floor of their home in Kashmir’s summer capital, Srinagar,  after floodwaters inundated the lower two floors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s a kind of attic, they are in an attic. It was again through  Facebook, my brother, youngest brother, he had posted pictures of water  all around…and after that no communication at all," he said. "[I am]  completely, completely helpless.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Qaisar has posted an SOS plea on Facebook, “please rescue Mr.  Qaisar-ud-Din’s family” and given their address. Until Wednesday  afternoon, he was still waiting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I am hoping, I am hoping that somebody would respond," he said. "I  am hoping one call back telling me that water has not gone beyond, and  there is food being supplied or at least water being supplied.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like Qaisar, tens of thousands of distressed relatives have flooded  Facebook and Twitter with cries for help, urging rescuers and army  personnel working in Indian Kashmir to reach their loved ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With phone and power lines down, those stranded are unable to call  for help. And so such posts are helping to point rescue teams in the  right direction. At the moment rescuers have virtually no way of  identifying victims most urgently in need of help - the sick, the  elderly and children.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Qaisar has not yet been lucky, many others have. A Facebook  exchange between the army and the sister of a woman, who is nine months  pregnant, shows that soldiers responded to her plea on social media and  rescued the stranded woman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Army officials say all messages for help being received on its  website are being forwarded to a group that includes senior commanders  in the region. Starting Monday, the army also began putting up a list of  rescued people on one of its Facebook accounts to keep relatives  informed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Self-help groups have also sprung up on Facebook sharing information  on missing people. Google has allied with the National Disaster Response  Force to create a &lt;a href="https://google.org/personfinder/2014-jammu-kashmir-floods" target="_blank"&gt;database of stranded and missing people. &lt;/a&gt;People wanting to donate are connecting on the hashtag &lt;a href="https://twitter.com/hashtag/kashmirfloods" target="_blank"&gt;#Kashmirfloods&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham at the Center of Internet and Society says social media  can be a powerful tool for collaboration in situations like the ones  faced by Kashmir.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Through features like hashtag, you can form dynamic, express  community,' he said. "Here social media has a marked advantage because  an express platform for collaboration can be set up instantaneously.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 50,000 people have been rescued so far - 40,000 of them by the  armed forces.  But tens of thousands are still trapped in their homes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The army, posted in huge numbers in the Himalayan region that borders  Pakistan, is at the forefront of the massive rescue effort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Atul Bhatia, an army official in Jammu region who turned a generator  on an army truck into a mobile recharge point, told an Indian television  channel that lack of communication is the biggest problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The connect with relatives of theirs outside this area was the most  important thing for the relatives and them to be assured that everything  is fine," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"With no electricity for five days out here, it was important their mobiles start working.”&lt;/p&gt;
&lt;p&gt;The floods engulfed the region a week ago, devastating villages and  towns, and destroying roads and bridges in the scenic mountain region.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue'&gt;https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-12T05:10:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-media-indian-govt">
    <title>Social Media 1, Indian Government 0</title>
    <link>https://cis-india.org/news/social-media-indian-govt</link>
    <description>
        &lt;b&gt;The futility of the Indian government’s attempts to control what is posted on Facebook, YouTube and other social media sites was thrown into high relief this week, after a video purportedly showing Congress spokesman Abhishek Manu Singvi having sex in his office resulted in his resignation.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://india.blogs.nytimes.com/2012/04/26/social-media-1-indian-government-0/"&gt;The article by Heather Timmons was published in the New York Times on April 26, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Mr. Singhvi, who also is a prominent lawyer, said the video was a fake, but resigned from his spokesman spot and from a parliamentary law committee he headed Monday evening, to “&lt;a class="external-link" href="http://in.reuters.com/article/2012/04/23/abhishek-manu-singhvi-cd-scandal-resigna-idINDEE83M0HH20120423"&gt;prevent even the slightest possible parliamentary disruption&lt;/a&gt;,” he said in a statement.&lt;/p&gt;
&lt;p&gt;The video, which has now been viewed by hundreds of thousands of people on YouTube and other social media sites, is neither explicit, nor immediately incriminating – most of it appears to show little more than the top of Mr. Singhvi’s balding head, in profile, bobbing above the top of his desk. He might be waxing his office floor, or searching somewhat frantically for a dropped contact lens.&lt;/p&gt;
&lt;p&gt;Still, a Delhi High Court injunction on April &lt;a class="external-link" href="http://news.biharprabha.com/2012/04/court-bans-broadcast-of-abhishek-manu-singhvi-tape/"&gt;13 banned television stations from broadcasting the video&lt;/a&gt;, which was originally distributed to media outlets on a CD. Perhaps frustrated by their inability to show the footage in question, India’s television news stations have been engaged in &lt;a class="external-link" href="http://www.ndtv.com/video/player/left-right-centre/singhvi-cd-row-does-it-involve-parliamentary-ethics/230260"&gt;unusually highbrow debate&lt;/a&gt; about whether India actually needs stricter privacy laws for public figures.&lt;/p&gt;
&lt;p&gt;There’s no such talk on social media sites, though.&lt;br /&gt;&lt;br /&gt;The video was quickly posted on Facebook, Pirate’s Bay and other social media and video-sharing sites. While a Facebook page especially created for it has been taken down, there are now dozens of versions of the video on YouTube, in increasingly pixelated versions as users copy and post it again and again. (One YouTube user even helpfully posted a video of the Facebook page, and filmed the process of opening all the links on the page.)&lt;br /&gt;&lt;br /&gt;Social media companies received requests from Indian law enforcement officials and court orders asking them to remove the video, which they did, executives in social media companies said on background. But it kept popping up again and again.&lt;br /&gt;&lt;br /&gt;Tejinder Pal Singh Bagga of the Delhi-based Bhagat Singh Kranti Sena, a right-wing group, told wire service IANS that he posted the video on Twitvid, which allows users to distribute videos via Twitter. “I am not afraid of these people and they deserve this,” he said. “I am prepared for any consequences,” he said.&lt;br /&gt;&lt;br /&gt;Facebook officials said they couldn’t comment on the situation. The page in question that featured the Singhvi video was created with by a “fake” user, which is against Facebook’s rules.&lt;br /&gt;&lt;br /&gt;Google received a copy of a generic court order from Mr. Singhvi’s lawyers on April 24 asking it to remove the video, which it followed.&lt;br /&gt;&lt;br /&gt;“Our policy prohibits inappropriate content, on YouTube and our community effectively polices the site for inappropriate material,” the company said in an e-mailed statement. Inappropriate material includes videos that “contain pornography, harassment, content that violates privacy, illegal acts or explicit violence violate the YouTube community guidelines,” it said. Users can flag content they feel is inappropriate, she said, and then the company’s staff reviews the content and removes it if it violates guidelines. “In addition, Google acts to promptly remove an offending video if a court order requires it,” the statement said.&lt;br /&gt;&lt;br /&gt;But since Google has taken down the first offensive videos and copies of videos, others have sprung up. Per Google’s general policy, these will only be removed if YouTube users or others complain about them.&lt;br /&gt;&lt;br /&gt;On Wednesday, the Delhi High Court dismissed a petition by the Bar Council of Delhi (of which Mr. Singhvi is a member) seeking to take action against Mr. Singhvi’s driver, who had allegedly originally distributed the CD.&lt;br /&gt;&lt;br /&gt;Investigating who first introduced the video to social media sites and circulated it there is next to impossible, Internet experts say.&lt;br /&gt;&lt;br /&gt;“No country, even though its law might say so, is able to exercise jurisdiction across the world” on the Internet, said Sunil Abraham, the executive director of Bangalore’s Center for Internet and Society, a research and advocacy group. Because India does not have a bilateral cyber-crime agreement with the United States (as the European Union does), getting American companies like Facebook and Google to take down or investigate the source of content that offends Indian government officials can be a slow and cumbersome process, he said.&lt;br /&gt;&lt;br /&gt;The Indian government may never be able to track down who first posted the video, Mr. Abraham said. “Drawing a chain of causality and trying to arrive at the first person who introduced it onto the Internet is a bit of a complicated task,” he said. “Even if you find one version of the story, there might be another one,” he said. In addition, the Indian government might only be able to access records from Indian telecommunications providers, he said, and related to Indian ISP addresses.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="center"&gt;&amp;nbsp;A screenshot of the YouTube page displaying several video clips that show up with the search terms “Abhishek Manu Singhvi sex CD.” &lt;br /&gt;&lt;img src="https://cis-india.org/home-images/singhvi.jpg/image_preview" alt="Singhvi" class="image-inline image-inline" title="Singhvi" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-media-indian-govt'&gt;https://cis-india.org/news/social-media-indian-govt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-04-27T04:44:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar">
    <title>Social Activist Alleges Threat By Police Officer Over Possession of Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar</link>
    <description>
        &lt;b&gt;Social activist Shabnam Hashmi recorded a policeman telling her those without address proof and Aadhaar could be “eliminated”.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gaurav Vivek Bhatnagar was published in the &lt;a class="external-link" href="https://thewire.in/158107/fear-around-misuse-of-aadhar/"&gt;Wire&lt;/a&gt; on July 16, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Well-known social activist Shabnam Hashmi held a press conference to  say she was threatened on the telephone by a police officer at the  Lajpat Nagar police station warning her that the government had   launched a ‘surround and eliminate’ campaign against people whose  addresses are not known and who do not possess Aadhaar numbers or cards.  This is now a standing instruction to all police stations, Hashmi was  told. Moreover, the officer –  accused of threatening and abusing Hashmi  when she called him on the night of July 14 to know why the husband of a  woman, who learns stitching at a training centre run by the NGO Pehchan  at Jaitpur in south-east Delhi, had been summoned at a late hour –  insisted that police personnel were well within their rights to act in  this way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The police may brush aside this assertion as the concerned officer’s  personal opinion, or they may deny the veracity of the conversation, &lt;a href="https://www.youtube.com/watch?v=Az2WR54QWTE" rel="external nofollow" target="_blank" title="which Hashmi recorded and shared with the media"&gt;which Hashmi recorded and shared with the media&lt;/a&gt;;  but she and other anti-Aadhaar activists say the interaction raises  questions about the consequences – intended or unintended – of the  Centre’s stress on making Aadhaar mandatory for the personal liberty and  civil rights of ordinary residents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many Aadhaar critics have, in the past, expressed the fear that the  irresponsible use or misuse of Aadhaar could lead to India becoming a  ‘surveillance state’ or ‘police state’  by placing enormous  discretionary powers in the hands of unscrupulous state officials.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Petitioners in SC had cautioned against misuse of Aadhaar&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, Communist Party of India leader Binoy Viswam had  filed a petition in the Supreme Court questioning the introduction of  Section 139 AA of the IT Act to link Aadhaar cards with PAN cards.  Subsequently, &lt;a href="http://www.rediff.com/news/interview/aadhaar-is-very-dangerous-for-the-indian-nation/20170425.htm" rel="external nofollow" target="_blank" title="in an interview"&gt;in an interview&lt;/a&gt; in  April this year, he had noted that “the citizens are becoming  instruments in the hands of the state” as “by taking fingerprints, iris  scans and other details of the citizens of the country, the state is  becoming the custodian of its people.” He had also expressed the fear  that “the state can use this data according to its whims and fancies”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Viswam could not have been more correct. Much before the use of data,  “elements” of the state have started using the ruse of creation of data  itself as a convenient tool to threaten and intimidate people and this  is precisely what happened in the case of Hashmi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recalling the incident, Hashmi, who is the founding trustee of  Pehchan, said the NGO runs a small centre in Jaitpur extension where it  teaches school dropouts to appear for class 10 and 12 examinations and  also runs sewing classes for women.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hashmi said that at around 9 pm on July 14, Haseen, the husband of  Mubina, one of the trainees, was summoned by a sub-inspector to the  Lajpat Nagar police station regarding a complaint. When Hashmi called up  the police station to find out what the summons was about, the  policeman allegedly “hurled abuses”, and used “highly derogatory and  uncivilised language” during the conversation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though Hashmi did not have a recorder in her phone at the time of the  first call, she subsequently downloaded one and later recorded her  conversation with the same officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this conversation, the policeman is heard reasoning with Hashmi  that he had not summoned Haseen at a late hour. He claimed that he used  harsh language in the first conversation since she had not identified  herself and had only proclaimed herself to be a social worker. It also  comes across in the conversation that Hashmi had told the man in the  earlier conversation that he was drunk while being on duty and that this  had irked him. It emerged that the cop had got an inkling that she was  recording the later conversation, because of which he apparently  mellowed down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue assumes significance as after declaring twice in the past  that Aadhaar cannot be made mandatory for delivering services, the &lt;a href="http://www.thehindu.com/news/national/supreme-court-upholds-aadhaar-pan-linkage/article18903048.ece" rel="external nofollow" target="_blank" title="Supreme Court had recently upheld"&gt;Supreme Court had recently upheld&lt;/a&gt; the validity of an Income Tax law amendment linking PAN with Aadhaar for filing tax returns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Former Attorney General Mukul Rohatgi had argued that the  government was “entitled to have identification”  and that “as  constituents of society people can’t claim immunity from  identification.” Rohatgi had insisted that “no right is absolute, right  to body is not absolute. Under extreme cases even right to life can be  taken away, under due process.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Experts have often cautioned against Aadhaar misuse&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to legal experts, the illegalities related to Aadhaar do not just end with such arguments. Writing for &lt;i&gt;The Wire&lt;/i&gt;, Prashant Reddy T., a research associate at the School of Law, Singapore Management University, &lt;a href="https://thewire.in/148687/mandatory-aadhaar-bank-accounts-legality/" rel="noopener noreferrer" target="_blank" title="had noted that"&gt;had noted that&lt;/a&gt; in the past couple of months the “Modi government has increasingly used  its rule-making powers under various laws in a manner which is contrary  to the law of the land.” He was referring to the Centre’s announcement  to mandatorily link Aadhaar numbers to all non-small bank accounts,  failing which, access to the bank accounts would be disabled after  December 31.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As is often the case with this government, the question now is  whether this new mandatory Aadhaar requirement (and the threatened  punishment) is legal,” the expert had asked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, writing for the &lt;i&gt;Hindustan Times&lt;/i&gt;, Pranesh  Prakash, policy director at the Centre for Internet and Society, and an  affiliated fellow at Yale Law School’s Information Society Project, &lt;a href="http://www.hindustantimes.com/india-news/what-s-really-happening-when-you-swipe-your-aadhaar-card-to-make-a-payment/story-2fLTO5oNPhq1wyvZrwgNgJ.html" rel="external nofollow" target="_blank" title="had referred"&gt;had referred&lt;/a&gt; to  the immense potential of Aadhaar for profiling and surveillance. He had  called for fundamentally altering Aadhaar, saying that if the rampant  misuse of surveillance and wilful ignorance of the law by the state were  anything to go by, the future looked bleak.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar'&gt;https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-20T14:31:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose">
    <title>So Much to Lose</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose</link>
    <description>
        &lt;b&gt;Unless you have been hiding under a rock, you have been a witness to the maelstrom of events that accompanied the death of the political leader Bal Thackeray.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;Nishant Shah's &lt;a class="external-link" href="http://www.indianexpress.com/news/so-much-to-lose/1038938/0"&gt;column was published in the Indian Express&lt;/a&gt; on December 2, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Unless you have been hiding under a rock, you have been a witness to  the maelstrom of events that accompanied the death of the political  leader Bal Thackeray. For me, the brouhaha was elbowed out by the case  of the police arresting two women for critiquing the events on Facebook.  The person who wondered about the nature of the enforced mourning and  the state of our public life, and her friend who “liked” the comment on  Facebook, were booked and arrested under charges that can only be  considered preposterous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I will not repeat these arguments because it is needless to say  that I am on the side of the women and think of this as yet another  manifestation of the stringent measures which are being evolved as an  older broadcast way of thinking meets the decentralised realities of  digital technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the midst of this the idea of internet freedom needs to be  revisited. The global Press Freedom Index 2011-12 report compiled by  Reporters Without Borders, ranks India at 131, or as a “partly free”  country, marking us as a country where the notion of internet freedom is  not to be taken for granted, and possibly also one where the concept is  not properly understood.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citing various instances from the central government’s plans to  censor the social web to the authoritarian crackdown on activists and  cultural producers involved in online civic protests, from the  traditional media industry’s stronghold over intellectual property  regimes to the arrest of individuals for voicing their independent  critiques online, the report shows that we not only have an  infrastructure deficit (with only 10 per cent of the people in the  country connected), but also a huge social and political deficit, which  is being exposed by our actions and reactions to the Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take the case of professor Ambikesh Mahapatra dean of the  chemistry department of Jadavpur University, who was picked up by the  police and lodged in the lock up for almost 40 hours for forwarding an  e-mail that contained a cartoon of Trinamool Congress leaders Mamata  Banerjee, Mukul Roy and Dinesh Trivedi. He and his housing society  co-resident Subrata Sengupta were charged with defamation and outraging  the modesty of a woman. While the proceedings are underway with the next  date of hearing slated in February, 2013, the Jadavpur university  professor says, “Section, 66A of the IT Act is  being used for  suppression of the freedom of speech. In my opinion, it is being misused  by the state government, repeatedly. The section does not empower  anyone to arrest those who voice their opinion and never meant to harm  anybody’s image. Prompt action is needed to check the misuse of law.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Likewise, Ravi Srinivasan, a 46-year-old a businessman from  Pondicherry, was arrested for tweeting against Karti Chidambaram, son of  Union Finance Minister P Chidambaram. His arrest and consequent release  has not blunted his spirit. He says, “At the time (of the arrest) I had  not heard of Section 66(A). I still cannot fathom why and how a tweet  sent out to just 12 people — half of them family and friends — caught  the eye of the police. By evening, when I had come home from the police  station, my Twitter following had gone up to 1,700. About 15,000 people  re-tweeted the statement that got me arrested.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the series of incidents that have marked the last year and  the whimsical nature of regulatory injunctions on internet freedom in  the country, it might be a good idea for us to reflect on democracy and  freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We need to examine the fundamental nature of freedom, and how  these attempts at regulating the internet are only a symptom of the  systemic failures of enshrining freedom of speech, information, identity  and dignity in India. However, internet freedom is often a difficult  concept to engage with, because it is one of those phrases that seem to  be self-explanatory but without a straightforward explanation. There are  three axes which might be useful to unpack the baggage that comes with  internet freedom, both for our everyday practices, and our imagined  future:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of: The freedom of the internet is something that is new  and needs more attention. We have to stop thinking of the internet as  merely a medium or a conduit of information. As the Web becomes  inextricably linked with our everyday lives, the internet is no longer  just an appendage or an externality. It becomes a reference point  through which our social, political and economic practices are shaped.  It becomes a defining point through which we draw our meanings of what  it is to be a part of the society, to have rights, to be politically  aware, to be culturally engaged — to be a human. The freedom of the Net  is important because the crackdowns on the Net are an attack on our  rights and freedoms. The silencing of a voice on Facebook, might soon  gag the voices of people on the streets, creating conditions of silence  in the face of violence perpetuated by the powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom to: Freedom to the internet is often confused with access  to the internet. While, of course, access is important in our  imagination of a just society where everybody is equally connected,  freedom is also about creating open and fair societies. If the power of  the internet is in creating alternative spaces of expression,  deliberation and opinion-making, then the freedom to the internet is  about being safe and responsible in these spaces. A society that  controls these spaces of public discussion, under the guise of security  and public safety, is a society that has given up its faith in freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom for: It is often not clear that when popular technologies  of information and communication are regulated and censored, it is not  merely the technology that is being controlled. What is being shaped and  contained is the way people use them. The freedom for the internet is  about the freedom for people. The possibility that Internet Service  Providers are being coerced into revealing personal information of users  to police states, that intermediaries are being equipped to remove  content that they find offensive from the web, and that views expressed  on the social media can lead to legal battles by those who have the  power but not the acumen to exercise it, all have alarming consequences.  There is a need to fight for freedom, not only for the defence of  technology but also for the defence of the rights that we cherish that  risk being eroded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case of these Facebook arrests is not new. It has happened  before and it will continue happening as immature governments are unable  to cope with the real voices of representational democracy. These cases  sometimes get naturalised because they get repeated, and even without  our knowledge, can start creating a life of fear, where we internalise  the regulatory system, not voicing our opinions and ideas for fear of  persecution. And so, whether you agree with their politics or not,  whether you endorse the viewpoints of the people who are under arrest,  whether you feel implicated or not in this case, we have to realise that  even if we might not agree with somebody’s viewpoint, we must defend  their right to have that particular viewpoint. Anything else, and  tomorrow, when you want to say something against powers of oppression,  you might find yourself alone, as your voice gets heard only by those  who will find creative ways of silencing you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;— With inputs from Gopu Mohan, Madhuparna Das and V Shoba&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose'&gt;https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-07T16:39:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology">
    <title>Snooping technology: Will CMS work in India?</title>
    <link>https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology</link>
    <description>
        &lt;b&gt;The Indian government plans to spend $132 million on setting up its brand new Central Monitoring System this year.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pierre Fitter's article was &lt;a class="external-link" href="http://www.firstpost.com/india/snooping-technology-will-cms-work-in-india-962545.html"&gt;published in FirstPost on July 17, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Several articles have raised valid questions about privacy violations, including &lt;a href="http://www.firstpost.com/india/indias-central-monitoring-system-security-cant-come-at-cost-of-privacy-944475.html" target="_blank"&gt;this one by Danish Raza&lt;/a&gt;. Elsewhere, &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/" rel="nofollow" target="_blank"&gt;Pranesh Prakash has raised important points&lt;/a&gt; about how CMS may actually violate several laws and at least one Supreme Court verdict.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I ask a much more basic question: will CMS work? Can it really help  security agencies eavesdrop on criminals and terrorists, despite several  known technical hurdles?&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Daniel.png" title="Daniel" height="250" width="332" alt="Daniel" class="image-inline" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Encryption&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a prominent Brazilian banker and investor named Daniel Dantas  was arrested and charged with money laundering and tax evasion along  with a former mayor of Sao Paulo. For five months, the Brazilian  National Institute of Criminology tried to read the contents of his hard  drive but failed to crack it. Dantas had encrypted his data using a  free program called &lt;a href="https://en.wikipedia.org/wiki/TrueCrypt" rel="nofollow" target="_blank"&gt;Truecrypt&lt;/a&gt;. The &lt;a href="http://www.theregister.co.uk/2010/06/28/brazil_banker_crypto_lock_out/" rel="nofollow" target="_blank"&gt;INC sent the hard drive to the FBI in the US&lt;/a&gt;,  which spent a whole year trying to crack it; it too failed. Dantas’s  use of encryption likely helped him escape the money laundering and tax  evasion charges. He was ultimately &lt;a href="http://news.bbc.co.uk/2/hi/americas/7761823.stm" rel="nofollow" target="_blank"&gt;convicted of attempting to bribe a police officer&lt;/a&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This story illustrates a fundamental loophole at the heart of CMS. A  criminal, using free and easy-to-use software, can protect his data from  even the most advanced surveillance tools available in law enforcement.  NSA whistle blower Edward Snowden himself used encrypted email to  communicate with journalists at the &lt;i&gt;Guardian&lt;/i&gt;. In an &lt;a href="http://discussion.guardian.co.uk/comment-permalink/24384968" rel="nofollow" target="_blank"&gt;online chat where he took questions from the public&lt;/a&gt;, Snowden noted that encryption was “one of the few things that you can rely on” to protect you from the &lt;a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/" rel="nofollow" target="_blank"&gt;eavesdropping behemoth created of the NSA&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should hardly be surprising then, that terror groups have been  encrypting their emails and data for at least the last five years. In  fact &lt;a href="http://intelwire.egoplex.com/2008_02_02_exclusives.html" rel="nofollow" target="_blank"&gt;Al Qaeda developed its own encryption software called ‘Mujahideen Secrets’&lt;/a&gt;,  to encrypt emails, chat sessions and files. Version two of Mujahideen  Secrets even included a tool to delete files securely so that they could  not be recovered using special software if the computer was captured.  Al Qaeda’s links to several terror groups operating in India has been  widely reported in the past. It is not inconceivable that they have  shared their encryption software with their comrades-in-arms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years it has become easier to encrypt one’s communication. &lt;a href="https://www.youtube.com/watch?v=MKehyXaY2XM" rel="nofollow" target="_blank"&gt;YouTube tutorials&lt;/a&gt; train even novice users to set up email encryption within minutes. &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;Phone calls&lt;/a&gt;, &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;text messages&lt;/a&gt; and &lt;a href="http://www.cypherpunks.ca/otr/" rel="nofollow" target="_blank"&gt;online chats&lt;/a&gt; can also be encrypted with free, easy-to-install apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biggest problem with encryption is that it is virtually impossible  to break the code in a time frame that’s useful for law-enforcement  purposes. Without getting too technical, modern encryption relies  calculating the prime factors of very, very large integers. In 2009, a  group of some of the world’s best-known mathematicians and  cryptographers reported that &lt;a href="http://security.stackexchange.com/questions/4518/how-to-estimate-the-time-needed-to-crack-rsa-encryption" rel="nofollow" target="_blank"&gt;it took them four years to factor a 768-bit integer&lt;/a&gt;. They estimated &lt;a href="https://www.digicert.com/TimeTravel/math.htm" rel="nofollow" target="_blank"&gt;it would take 1,000 times longer to factorise a 1024-bit integer&lt;/a&gt;.  GPG, which is the most widely-used email encryption software, allows  users up to 4096-bit encryption. Unless you have the password to the  encrypted files, it would take you a very long time to crack the  encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example to help you understand why encryption makes CMS  redundant. Let’s say the system intercepts an encrypted email sent by a  LeT handler in Karachi to a sleeper cell in Mumbai. The email contains  instructions to detonate a bomb in a specific market at a specific time  four days from now. Even if India’s intelligence agencies managed to  link up every computer they had available to process the encryption,  they would still not be able to crack it in time to learn the details  and stop the attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What about ‘Metadata’?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that encryption only protects the body of the email. The metadata, including the sender’s and receiver’s email addresses remain unencrypted, else the service provider would be unable to send the email to its destination. Law enforcement agencies often partner with email providers to track down the exact computer on which tell-tale emails were read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this method of tracing criminals has a limitation. Programs such as &lt;a href="https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29" rel="nofollow" target="_blank"&gt;TOR&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Hotspot_Shield" rel="nofollow" target="_blank"&gt;Hotspot Shield&lt;/a&gt; disguise the IP address of a user’s PC. For example, when I use TOR,  Facebook will often ask me to confirm my identity as it sees me as  logging in from an unfamiliar location. TOR has thousands of servers  around the world through which it bounces your data before sending it to  its destination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is another limitation to using metadata. Due to obvious legal  hurdles, CMS will only be deployed to capture communication within  India. If terrorists were planning an attack from elsewhere in India’s  neighbourhood (as happened with 26/11), we would have to rely on that  country’s intelligence services for an alert. Good luck with that!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make untraceable phone calls, terrorists have been known to use &lt;a href="https://en.wikipedia.org/wiki/Burner_phone#Privacy_rights_and_prepaid_mobile_phones" rel="nofollow" target="_blank"&gt;“burner” phones&lt;/a&gt;.  These are pre-paid phones that are easily available in the US and other  countries that do not require an ID for such mobile connections. They  can be topped up using cash, which makes their prolonged using even more  untraceable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if CMS allowed spooks to listen to these calls, it would not be  able to tell who was talking to whom. From details that emerged  following the Abbottabad operation that killed Osama bin Laden, we also  know that terrorists have been trained to &lt;a href="http://www.foxnews.com/tech/2011/05/03/bin-laden-grid-govt-help-expert-says/" rel="nofollow" target="_blank"&gt;turn off their phones and remove the battery&lt;/a&gt; to prevent being tracked even while not on a call.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;So what is CMS good for?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If terrorist communications can easily be hidden from CMS, you have  to wonder why the government is going through all the effort and expense  to set up such a system. What good can come off the mass hoovering of  data of ordinary citizens’?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if CMS intercepted a ‘BBM chat’ between two businessmen, who  were discussing a contract that could affect the business interests of a  government MP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine the government getting access to emails exchanged between a  journalist and a source in the IAS who wants to expose a major  corruption scandal involving a cabinet minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if the government had access to phone calls between two opposition politicians discussing election strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What if CMS tracks a PhD candidate who is researching Naxal terror  and has downloaded Naxal pamphlets? What if this researcher has been  able to establish contact with Naxals for an interview. Can the  government use such data to charge him with participating in a Naxal  conspiracy, even if his only intention was to research their  motivations? In a country where chief ministers label their critics as  “Naxals” for merely raising questions, are we certain we want such  unmitigated power in the government’s hands?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions well worth asking, especially since the  ostensible reason for setting up the CMS—monitoring terrorists and  criminals—is a fool’s errand at best.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology'&gt;https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-22T07:19:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/snooping-to-data-abuse">
    <title>Snooping Can Lead to Data Abuse</title>
    <link>https://cis-india.org/internet-governance/blog/snooping-to-data-abuse</link>
    <description>
        &lt;b&gt;THE NATGRID, aiming to link databases of 21 departments and ministries for better counter-terror measures, adopts blunt policy approach, subjecting every citizen to the same level of blanket surveillance, instead of a targeted approach that intelligently focuses on geographic or demographic areas that are currently important, writes Sunil Abraham in this article published by Mail Today on June 9, 2011.&lt;/b&gt;
        
&lt;p&gt;THE NATGRID, aiming to link databases of 21 departments and ministries for better counter- terror measures, adopts blunt policy approach, subjecting every citizen to the same level of blanket surveillance, instead of a targeted approach that intelligently focuses on geographic or demographic areas that are currently important.&lt;br /&gt;&lt;br /&gt;All you manage to do with the current approach help software, hardware and biometric equipment vendors achieve their sales targets. It is quite unlikely that security agencies will learn anything insightful by putting everybody under the same degree of surveillance. There is no scientific evidence to show that we will be a safer nation if the government eavesdropped into all aspects of a citizen’s life. Targeted surveillance, on the other hand, is like good old- fashioned detective work. Put a particular section — of potential troublemakers — under surveillance and leave the others alone.&lt;/p&gt;
&lt;p&gt;With round- the- clock, 100- per cent, 360- degree surveillance, all the data is scrutinised all the time. The more effective approach is to sample and collect data while maintaining data trails. If anything suspicious is noticed, the rest of the trail can be dug up. Blanket surveillance only leads to leaks and abuse and tremendous distraction. The surveillance infrastructure will be overburdened as 99 per cent of the records and files scanned will be of no interest terms of fighting terrorism, etc.&lt;/p&gt;
&lt;p&gt;The 21 databases need to be opened only when there is anything suspicious in any of the extracted and scrutinised samples or subsets. If there is a suspicious pattern, it should lead to opening of subsets in all the databases. Obviously, there should be ways in which the databases can talk to each other — demand for a particular subset, and not for all the records to be available to agencies all the time.&lt;/p&gt;
&lt;p&gt;The NATGRID has to be able to let investigators selectively go in and out of the necessary subsets data. No one should be able to have a 360 degree view of all activities of all Indians. AS OF now, the NATGRID design does not appear to have a safeguard for data abuse. And no matter what you see Hollywood movies, this configuration does not exist in Europe or the US. Two important forms of protections that should be available in democracies with robust privacy laws are missing in India. The first is breach notification.&lt;/p&gt;
&lt;p&gt;If intelligence agencies and the police have looked up your files, you have a right to be informed. Secondly, you can request for a copy of the information that is maintained on you and request modifications if the data is inaccurate, so as to prevent harassment. Such checks and balances are necessary an intelligent and appropriate surveillance regime.&lt;/p&gt;
&lt;p&gt;Merging all 21 databases for 1.2 billion people into a single system only provides a juicy target for any internal or external enemy. From the perspective national security, it is a foolish thing to do. Terrorist groups will be able to target a single failure point destroy over a billion lives. Since the current configuration of the NATGRID only undermines national security, one is forced conclude that national security is a false pretext.&lt;/p&gt;
&lt;p&gt;This explains the deep scepticism among many the intelligence agencies involved. The real purpose of the project is to scare citizens in the age of Arab springs. The NATGRID is a disciplinary measure aimed at social engineering of citizens’ behaviour. Unfortunately, our media has been misled by the corporate cheerleaders of this humongous waste of money.&lt;/p&gt;
&lt;p&gt;The writer is executive director at the Centre for Internet and Society in Bangalore.&lt;br /&gt;( As told to Max Martin)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://epaper.mailtoday.in/epaperhome.aspx?issue=962011"&gt;Follow on Mail Today&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/publications/snooping-data-abuse.pdf" class="internal-link" title="Snooping Can Lead to Data Abuse (PDF)"&gt;Download the original here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/snooping-to-data-abuse'&gt;https://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:39:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech">
    <title>SMS Block as Threat to Free Speech</title>
    <link>https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech</link>
    <description>
        &lt;b&gt;If you could text just one or two people in a day, who would you choose? Many of us have had to make this choice thanks to the order limiting us to five texts a day. Short Message Service (SMS) is not used primarily to send staccato messages like the telegraph was. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;(This article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/article3845405.ece"&gt;published&lt;/a&gt; in the Business Line print edition dated September 1, 2012)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Whole conversations take place across SMS, and language has mutated to facilitate this. Anyone accustomed to this universe of parallel conversation, relationships and support must have found the five texts, and perhaps even the 20 texts, limit very restrictive. It isolated the hearing-impaired and created chaos for those who use bulk-texts to schedule classes or meetings, or run businesses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such a ban on communication must be examined to see whether it violates our right to freedom of speech and expression. The texting limit had a direct restrictive effect on our freedom of speech, since it limited communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We need to consider whether our rights were restricted legitimately, for reasons permitted by the Constitution. The Indian judiciary has created guidelines to help evaluate the reasonability of restrictions on free speech. The SMS block will be examined against these guidelines to see whether the restriction of communication was justified.&lt;/p&gt;
&lt;h3&gt;‘Reasonable’ curbs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Constitution permits restriction of the right to freedom of speech only for limited permitted reasons, one of which is ‘public order’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, any such restriction must also qualify as reasonable when measured against the standard created by the Supreme Court. For instance, banning publication of all newspapers for a month because of some newspapers carrying material that may incite riots would most certainly not be reasonable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question then arises as to what would amount to a reasonable restriction. The judiciary has considered this question several times and stated that it will take into account, among other things, the nature of the rights infringed, the circumstances under which the restriction has been imposed, the extent and urgency of evil sought to be remedied and the proportionality of the imposition. The order restricting freedom must also have a proximate relationship with the achievement of public order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Examining the situation at hand from this perspective, we find that people of north-east Indian origin in southern India have been receiving threats — via SMS and other communication channels — of such severity, that it has prompted them to uproot themselves from their lives and their homes en masse. That so many citizens were made to feel unsafe in their own country is cause for concern and the Government is right to take it seriously. It can be argued that this is a public order problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However the reasonability of the restriction on SMS is much harder to prove. For such a wide restriction on the freedom of speech to be reasonable, there would need to be a demonstrable nexus or proximate relationship between the bulk-text ban and the resolution of the public order problem. Additionally, the proportionality of the restriction is questionable since it is unclear why such a universal block of bulk-texts was necessary, instead of filtration of texts based on keywords, or identification of a pool of mobile users who pose a greater risk.&lt;/p&gt;
&lt;h3&gt;SMS and public order&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The nexus between texting and restoration of public order appears remote for two reasons. The first is that SMS is not the only way to spread rumours and threats. The block was unlikely to go a long way in protecting anyone from harm since other ways of threatening and rumour-mongering remained available: Third-generation mobile technology, telephone calls and good old-fashioned word-of-mouth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second reason is that the dissemination of rumours and threats by themselves would be of less concern if they did not cause the exodus, which had little to do with technology. The problem lies less in SMS technology’s facilitation of rapid communication, and more in the reality of how people of north-eastern origin are treated in other parts of India and why the state security forces like the police do not inspire much confidence in them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this socio-political reality, restricting the number of reassuring texts and information that people of northeastern origin may send each other was hardly going to help them feel safer.&lt;/p&gt;
&lt;h3&gt;Universal embargo&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the universality of the block is particularly vulnerable to being challenged as unconstitutional. The Delhi High Court has recently declared that an order blocking bulk-SMS unreasonably restricts the right to freedom of speech because such a universal embargo, even if directed at protecting consumers’ privacy, is too broad since it affects not just telemarketers but also people sending non-commercial bulk messages.&lt;/p&gt;
&lt;p&gt;The Court felt that since all categories of texts were blocked regardless of their connection to the harm in question, the bulk-text ban unjustifiably affected citizens’ legitimate free speech rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The order limiting everyone to 200 texts a day was therefore set aside to the extent that it affected people other than the specific group at which it should have been directed. Imagine how this principle might apply to an order that limits the bulk of mobile phone users to five, or even 20, texts a day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The trouble with new communications technology is that it takes some time for policy-makers and interested parties to learn to balance the various rights affected. The SMS block, which was been lifted on August 30, unsuccessfully to protect a group of citizens from harm at the cost of many people’s freedom of speech rights. However laudable the motives, this block was an illustration of the worrying lack of accountability and procedural safeguards that lie between our rights and state excesses.&lt;/p&gt;
&lt;h3&gt;Right to communicate&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If Arab Spring made headlines on how mobile phones were use to mobilise, Bahrain’s silenced revolution demonstrated use of the same technology to unravel mobilisation by blocking communication. Our constitution protects our right to communicate freely as well as our right to assemble. As technology evolves to better enable communication, we need to protect its infrastructure, by embedding our rights in the new communication framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is to be hoped that India provides better protection of constitutional rights across communication networks. Restriction of communication needs to be proportionate, justified and within the constitutional accountability mechanism, so that citizens’ rights are not violated any more than strictly necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Without this, we are powerless in the face of what may come — be it the mass surveillance that was once the stuff of dystopic novels or the throttling of communication in the public sphere reminiscent of China.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;b&gt;However, laudable the motives, the SMS block was an illustration of the lack of accountability and procedural safeguards that lie between our rights and state excesses.&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech'&gt;https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Chinmayi Arun</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-02T09:02:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
