<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 96 to 110.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/why-india-snubbed-facebooks-free-internet-offer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-news-minute-september-3-2019-manasa-rao-why-having-more-cctv-cameras-does-not-translate-to-crime-prevention"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/why-having-more-cctv-cameras-does-not-translate-to-crime-prevention"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bangalore-citizen-matters-august-2-2016-akshatha-why-experts-are-worried-about-aadhaar-based-authentication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-march-3-2019-why-entrepreneurs-are-wary-of-new-draft-e-commerce-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/newsminute-october-1-2019-theja-ram-why-conviction-rate-for-cyber-crime-cases-in-karnataka-is-abysmally-low"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/whose-data-is-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy_wholebodyimagingcomparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/whoswholegal-profiles-malavika-jayaram"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/why-india-snubbed-facebooks-free-internet-offer">
    <title>Why India snubbed Facebook's free Internet offer</title>
    <link>https://cis-india.org/internet-governance/news/why-india-snubbed-facebooks-free-internet-offer</link>
    <description>
        &lt;b&gt;The social media giant wanted to give the people of India free access to a chunk of the Internet, but the people weren't interested.&lt;/b&gt;
        &lt;p&gt;The blog post by Daniel Van Boom was &lt;a class="external-link" href="http://www.cnet.com/news/why-india-doesnt-want-free-basics/"&gt;published by Cnet&lt;/a&gt; on February 26, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Mark Zuckerberg's ambitious mission to provide free Internet access to rural India was rejected by the people it was intended to help long before the country's regulators banned it earlier this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around the country, farmers, labourers and office workers scorned Facebook's offer. Called Free Basics, it provided only limited access to the Internet through a suite of websites and services that, unsurprisingly, included Facebook. They felt the limited service didn't follow the open nature of the Internet, where all sites and online destinations should be equally accessible, so they organized real-world protests and an online Save The Internet campaign, with the message that Zuckerberg's efforts weren't welcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You might think people would jump at the opportunity to access Facebook for free, especially since more than a billion people use the social network every day. But it's that hitch -- that they can't access everything else -- which is precisely the problem, said Sunil Abraham, the executive director of the Centre for Internet and Society India. "Even if somebody spends 90 percent of their time on Facebook, that 10 percent is equally as important."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian regulators sided with popular opinion and &lt;a href="http://www.cnet.com/news/facebook-free-basics-gets-blocked-in-india/"&gt;&lt;span&gt;cut off Free Basics&lt;/span&gt;&lt;/a&gt; in the world's second-most populous country on February 8. The ruling by the Telecom Regulatory Authority of India (TRAI) forbids all zero-rating plans, meaning anyone offering customers free access to only a limited set of services of sites are banned. It was championed as a victory for Net neutrality, the principle that everyone should have equal access to all content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision was undoubtedly a blow for Facebook, which says it wants to connect the billions of have-nots around the world to the Internet through the program. While more than half the world's online population uses Facebook each month, the company's efforts to connect with the developing world -- with Free Basics also being available in over 30 other countries, such as Kenya and Iraq -- could be a boon for business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"[The Internet] must remain neutral for everyone, individuals and businesses alike. Everyone must have equal access to it," said Rajesh Sawhney, a Mumbai-based tech entrepreneur, in support of TRAI's decision to reject Free Basics. He believes the zero-rating scheme can be misused by telcos and other companies to create divisive ecosystems, where certain brands or companies are included and others aren't.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The package wasn't without its supporters though, with some being disappointed with the government's intervention in the marketplace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is generally assumed that there is something sinister behind violations of Net neutrality...but that is not always true," says software engineer Shashank Mehra. "ISPs trying to match consumer demand isn't something sinister, it is a market process."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The social media giant further defends itself by pointing out that Free Basics is &lt;a href="https://info.internet.org/en/2015/11/19/internet-org-myths-and-facts/" target="_blank"&gt;&lt;span&gt;open to any and all developers&lt;/span&gt;&lt;/a&gt;, including competitors Twitter and Google, as long as they meet the program's &lt;a href="https://developers.facebook.com/docs/internet-org/platform-technical-guidelines" target="_blank"&gt;&lt;span&gt;technical standards.&lt;/span&gt;&lt;/a&gt; This evidently wasn't enough to convince much of India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The problem persists&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Facebook disputes claims that its interest in India is commercial, saying its efforts are humanitarian. In speeches over the past few months, Zuckerberg has painted Internet access as a tool for global good. "The research has shown on this that for every 10 people who get access to the internet, about one person gets a new job, and about one person gets lifted out of poverty," &lt;a href="https://www.youtube.com/watch?v=nqkKiGhIyXs#t=4m03s" target="_blank"&gt;&lt;span&gt;he said at a Townhall Q&amp;amp;A&lt;/span&gt;&lt;/a&gt; in Delhi last October. "Connecting things in India is one of the most important things we can do in the world."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zuckerberg appears to have taken the loss in stride. &lt;a href="http://www.cnet.com/news/mark-zuckerberg-internet-org-telecoms-project-mobile-world-congress-2016/"&gt;&lt;span&gt;During a keynote address at the Mobile World Conference in Barcelona&lt;/span&gt;&lt;/a&gt; earlier this week, he admitted to being disappointed by the ruling, but added, "We are going to focus on different programs [in India]...we want to work with all the operators there." A Facebook spokesperson said the company "will continue our efforts to eliminate barriers and give the unconnected an easier path to the Internet and the opportunity it brings."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those ideals could certainly help in India, where around &lt;a href="http://data.worldbank.org/indicator/SP.RUR.TOTL.ZS" target="_blank"&gt;&lt;span&gt;68 percent&lt;/span&gt;&lt;/a&gt; of its population -- about 880 million people -- live in rural conditions or poverty. The promise of free access to health, education, local and national news through an Internet connection could potentially improve quality of live. So what's the problem?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The service providers would also be granting free Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Peggy Wolff, a volunteer coordinator at education NGO Isha Vidhya, says Facebook is just the latest in a long line of international companies hoping to crack rural India, where the bulk of the country's poor live.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While admitting that low cost or free Internet is imperative in rural areas, that "smart villages" are needed to help ease the human burden on India's increasingly overcrowded cities, she says, "Free basics is just a bit suspicious to most people. There's just too much vested interest."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The big question." Sawhney says, "is how do we give fast and free Internet to a large section of society in India?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are alternatives. United States-based Jana, for instance, developed an Android app called mCent that allows its growing userbase of 30 million to earn data by downloading and using certain apps or watching advertisements from sponsors. Unlike Free Basics, that data can be expended on any online destination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jana's CEO Nathan Eagle, like Zuckerberg, says his mission is to bring Internet connectivity to the next billion people. "Today, Internet connectivity in emerging markets is much more an issue of affordability, rather than access," he explains. "1.3 billion people in emerging markets now have Android phones...it's the cost of data that is prohibitive."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/why-india-snubbed-facebooks-free-internet-offer'&gt;https://cis-india.org/internet-governance/news/why-india-snubbed-facebooks-free-internet-offer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-02-27T07:49:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-news-minute-september-3-2019-manasa-rao-why-having-more-cctv-cameras-does-not-translate-to-crime-prevention">
    <title>Why having more CCTV cameras does not translate to crime prevention</title>
    <link>https://cis-india.org/internet-governance/news/the-news-minute-september-3-2019-manasa-rao-why-having-more-cctv-cameras-does-not-translate-to-crime-prevention</link>
    <description>
        &lt;b&gt;Can technology substitute addressing social, psychological, economic and other individual factors that largely lead to criminality? And what are the perils of over-reliance on technology to fight crime?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Manasa Rao published by the &lt;a class="external-link" href="https://www.thenewsminute.com/article/why-having-more-cctv-cameras-does-not-translate-crime-prevention-108276"&gt;News Minute&lt;/a&gt; quotes Pranav M. Bidare of CIS.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In August, a couple from Tamil Nadu’s Tirunelveli district made national headlines for their bravery. True to the Tamil adage ‘vallavanukku pullum aayudham’ (for the strong man, even a blade of grass is a weapon), when thieves entered their home, they fought them with chairs, slippers and even a bucket. Despite being armed with sickles, the masked miscreants fled the scene unable to match the counter-attack mounted by 70-year-old Shanmugavel and 65-year-old Senthamarai. The incident was caught on CCTV camera and the couple, whose video quickly went viral, was&lt;a href="https://www.thenewsminute.com/article/video-elderly-tn-couple-bravely-fends-armed-robbers-plastic-chairs-107105"&gt; celebrated&lt;/a&gt; for their valour and made for the perfect social media feel-good story. However, as the news cycle was focused on them, senior police officers from the state and many commentators pointed to the importance of the CCTV camera footage. After all, the whole world watched their courage thanks to the CCTV camera affixed on the couple's front yard.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Since 2017, the Tamil Nadu Police has been aggressively&lt;a href="https://www.youtube.com/watch?v=fphSW8SBCh8"&gt; pushing&lt;/a&gt; for citizens to install CCTV cameras. A techno-futuristic awareness campaign&lt;a href="https://www.youtube.com/watch?v=iPYzXSLbYYQ"&gt; video&lt;/a&gt; released last year even roped in popular Kollywood star Vikram to help the police force. “If there are CCTV cameras, crimes are prevented, evidenced and importantly, it provides evidence in court. So, each of us will compulsorily fix a CCTV camera wherever we are,” says Vikram. In a bold declaration, the motto of the campaign affirms, “With CCTV everywhere, Tamil Nadu has become a place without crime.” At the end of the video Vikram suggests Big Brother is watching, stating, “Everything. Everywhere. We're watching.”&lt;/p&gt;
&lt;p class="_yeti_done" dir="ltr" style="text-align: justify; "&gt;But do more CCTV cameras necessarily translate to crime prevention and deterrence? Can technology substitute addressing social, psychological, economic and other individual factors that largely lead to criminality? And what are the perils of over-reliance on technology to fight crime?&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;What the numbers say&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;A&lt;a href="https://www.comparitech.com/vpn-privacy/the-worlds-most-surveilled-cities/"&gt; study&lt;/a&gt; released in August by tech research group Comparitech ranked Chennai as 32nd out of 50 of the most surveilled cities in the world. The research group, with the use of government reports, police websites and news articles, puts the total number of cameras in the city at 50,000. With a 2016 estimated population of 1.07 crore in Chennai, that is 4.67 cameras per 1,000 people.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;With the help of &lt;a href="https://www.numbeo.com/crime/rankings_current.jsp"&gt;Numbeo&lt;/a&gt;, a crowd-sourced database of perceived crime rates, the study puts Chennai’s crime index at 40.39. On a scale of 0 to 100, this is an estimation of overall level of crime in a given city. This score means Chennai’s crime index is ranked ‘moderate’. Similarly, on a 100 point scale, the city's safety index— quite the opposite of crime index— is at 59.61. The higher the safety index, the safer a city is considered to be.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The two other Indian cities on the list of 50 are New Delhi ranked No. 20 with 1,79,000 cameras for 1.86 crore people (9.62 cameras per 1,000 people) and Lucknow ranked at No. 40 with 9,300 cameras for 35.89 lakh people (2.59 cameras per 1,000 people). The capital's crime index is at 58.77 while its safety index is 41.23. The UP city on the other hand has a crime index of 45.30 and a safety index of 54.70.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Stating that the higher number of cameras ‘just barely correlates’ with a higher safety index and lower crime index, the study concludes, “Broadly speaking, more cameras doesn’t necessarily result in people feeling safer.” While the presence of CCTV cameras may not inherently be bad, experts say that they cannot become a substitute for tackling crime and its causes which transcend the realm of technology. These involve tailored and specific approaches which stem from community building.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;The infallible CCTV myth&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Pranav MB, policy officer at the Centre for Internet and Society in Bengaluru observes that in the long run, over-reliance on CCTV cameras would merely propel criminals to innovate, as opposed to helping deter the crime from taking place. He says, “While it seems intuitive that the presence of a CCTV camera will have a deterring effect on criminal activity, numerous studies over the past decade have concluded that this is not really the case. The idea of a deterring effect also relies on the assumption that the actors are making educated intelligent choices about their future, which is often not the case with persons that commit criminal acts. So the deterring effect of CCTV cameras is not likely to be much more than the already deterring effect that exists because of criminal law and law enforcement.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Busting the myth that CCTV cameras are foolproof, Pranav adds that public infrastructure as simple as a streetlight could aid in safer neighbourhoods. “The fact remains, however, that if you are not using advanced technology, a simple mask will render you unidentifiable by most basic CCTV cameras. As more advanced and more expensive technology is used, you are only necessitating the need for innovation among criminals to identify new loopholes that they can exploit in the technology. This is not an argument that generally holds against the use of technology, but in the case of CCTV cameras, it has been seen that simple street lights much better serve the goal of deterrence of crimes,” he says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;However, cops disagree with the findings. One IPS officer who works with the police’s Law and Order department in Chennai tells TNM that the presence of CCTV cameras has helped them nab a range of criminals from chain-snatchers to stalkers who have hacked women to death. Praising the use of facial recognition software like FaceTagr that was introduced a few years ago, the officer says, “CCTV cameras have a dissuading effect on criminals. At the very least they serve as a warning but in most cases, we can easily match them to criminals on our existing local, station-wise database. Especially when it comes to areas like T Nagar, Purasawalkam or other crime-prone suburbs, CCTV cameras are an invaluable tool for law enforcement.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“Even in cases of sexual abuse, street harassment or trafficking, private CCTV cameras have been helpful. Shop owners or residents have come forward with the footage in public interest,” he says, admitting that the Centre’s release of the long-pending National Crime Records Bureau (NCRB) statistics could show a correlation between the push to install CCTVs and crime rates.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;With a lack of NCRB data, there are no statistical answers to whether indeed installation of CCTV cameras has helped lowering of crime rates. However, as per one report in &lt;a href="https://www.thehindu.com/news/national/tamil-nadu/cctv-cameras-crime-fighter-or-big-brother/article26226129.ece"&gt;The Hindu&lt;/a&gt;, the police report a 30% drop in the crime rate in the city following the installation of CCTV cameras. According to their estimate for chain snatching alone, the city police claims that the number of cases have dropped from 792 in 2012 to 538 following the installation of CCTV cameras in 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Over-reliance on technology&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Agreeing that law enforcement must be cautious while employing technology to solve crimes, Dr M Priyamvadha, associate professor at the Department of Criminology, University of Madras says her detailed interviews with over 200 incarcerated burglars across Tamil Nadu reveal that they are always on the lookout for a CCTV camera. “They simply use a jammer worth Rs 2,000 (a handy device that disrupts the signal range of a camera) to skirt the presence of a CCTV camera,” she reports. However, the professor cautions that one must not over-sell the capabilities of a CCTV camera in crime prevention.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“We must remember that CCTV cameras don't deter all crimes. If there is family or domestic violence, there won't be a CCTV camera inside the four walls of a house to reveal it. For burglaries, robberies and such offences, you can rely on CCTV cameras. How far it helps is a question mark. You can neither completely say it prevents crime nor that it is a waste,” she says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The professor points out that even when deploying CCTV cameras across the city, law enforcement does not account for wear and tear and maintenance which forms an important part of monitoring security.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Echoing the sentiment, Pranav says that CCTV cameras primarily serve as sources of electronic evidence in criminal cases. “Their deterring effect has repeatedly been observed to not balance out the costs of installing and running them.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;Privacy, data protection concerns&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Chennai-based independent tech researcher Srikanth points to the inherent surveillance dangers thanks to the centralised way in which the city police collects the CCTV data. “There is something concerning especially about Chennai City Traffic Police and other various city police’s approach to CCTV. The fundamental shift is that, at least in the city, these cameras are connected to the police control room. So data gets centrally collated. When centralization kicks in, power abuse isn't far away. This way it is far easier for police to destroy evidence,” he alleges.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Srikanth also points out, “CCTVs (especially connected ones) are usually funded by residents and/or merchants who spend their money in putting up the infrastructure, but freely give away the data to the police (often in good faith). There is no oversight on usage, storage, retention of this data and by sheer monopoly on law and order, the police is able to connect a vast number of private CCTVs on to its network.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Significantly, he expresses concerns about there being no laws that govern the usage of CCTV footage by the police. “Even if one gives into the legitimate state aim to control crime, even if one can argue violation of privacy is proportional, there is no law around use of CCTV by police, let alone using them in investigations. That the state engages with private vendors (such as FaceTagr) and many others also provides these service providers access to data,” he explains.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Pranav also warns, “Furthermore, CCTV cameras also result in compromising the privacy of individuals, and if implemented by the state (as in the case of law enforcement), creates added surveillance risks. Compounding on this is the issue of the recorded video footage, which if stored/transmitted/managed in an non-secure manner creates data protection risks as well. This is especially true in India, where it is difficult to obtain the required infrastructure and expertise in running an effective and secure CCTV camera system.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;'Technology cannot replace interpersonal relationships'&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Advising pragmatic thinking when it comes to crime prevention, professor Priyamvadha says that technology should complement what she calls the ‘human touch'. Junking the ‘holistic’ one-size-fits-all approach that is often paraded as a solution, the criminologist says that each crime requires a tailored method of tackling it. “For each and every crime, there is a different strategy. There maybe crimes committed by juveniles, crimes committed against women. For example, if female foeticide is rampant in a village, it is important to understand the village, the preferences of the people there and the caste practices present among them,” she observes.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While technology often allows law enforcement to cover more ground in cases of limited manpower, there’s also a chance the cameras could be seen as a substitute for forging interpersonal relationships between police and the people they seek to protect. “With quick transferring of cops nowadays, the local police station doesn’t have an understanding of the ongoings. Interpersonal relationships are more important than technological advances,” she notes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-news-minute-september-3-2019-manasa-rao-why-having-more-cctv-cameras-does-not-translate-to-crime-prevention'&gt;https://cis-india.org/internet-governance/news/the-news-minute-september-3-2019-manasa-rao-why-having-more-cctv-cameras-does-not-translate-to-crime-prevention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>manasa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-25T02:13:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/why-having-more-cctv-cameras-does-not-translate-to-crime-prevention">
    <title>Why having more CCTV cameras does not translate to crime prevention</title>
    <link>https://cis-india.org/internet-governance/news/why-having-more-cctv-cameras-does-not-translate-to-crime-prevention</link>
    <description>
        &lt;b&gt;Can technology substitute addressing social, psychological, economic and other individual factors that largely lead to criminality? And what are the perils of over-reliance on technology to fight crime?&lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;The article by Manasa Rao was &lt;a class="external-link" href="https://www.thenewsminute.com/article/why-having-more-cctv-cameras-does-not-translate-crime-prevention-108276"&gt;published the News Minute&lt;/a&gt; on September 3, 2019. Pranav M. Bidare was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In August, a couple from Tamil Nadu’s Tirunelveli district made national headlines for their bravery. True to the Tamil adage ‘vallavanukku pullum aayudham’ (for the strong man, even a blade of grass is a weapon), when thieves entered their home, they fought them with chairs, slippers and even a bucket. Despite being armed with sickles, the masked miscreants fled the scene unable to match the counter-attack mounted by 70-year-old Shanmugavel and 65-year-old Senthamarai. The incident was caught on CCTV camera and the couple, whose video quickly went viral, was&lt;a href="https://www.thenewsminute.com/article/video-elderly-tn-couple-bravely-fends-armed-robbers-plastic-chairs-107105"&gt; celebrated&lt;/a&gt; for their valour and made for the perfect social media feel-good story. However, as the news cycle was focused on them, senior police officers from the state and many commentators pointed to the importance of the CCTV camera footage. After all, the whole world watched their courage thanks to the CCTV camera affixed on the couple's front yard.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Since 2017, the Tamil Nadu Police has been aggressively&lt;a href="https://www.youtube.com/watch?v=fphSW8SBCh8"&gt; pushing&lt;/a&gt; for citizens to install CCTV cameras. A techno-futuristic awareness campaign&lt;a href="https://www.youtube.com/watch?v=iPYzXSLbYYQ"&gt; video&lt;/a&gt; released last year even roped in popular Kollywood star Vikram to help the police force. “If there are CCTV cameras, crimes are prevented, evidenced and importantly, it provides evidence in court. So, each of us will compulsorily fix a CCTV camera wherever we are,” says Vikram. In a bold declaration, the motto of the campaign affirms, “With CCTV everywhere, Tamil Nadu has become a place without crime.” At the end of the video Vikram suggests Big Brother is watching, stating, “Everything. Everywhere. We're watching.”&lt;/p&gt;
&lt;p class="_yeti_done" dir="ltr" style="text-align: justify; "&gt;But do more CCTV cameras necessarily translate to crime prevention and deterrence? Can technology substitute addressing social, psychological, economic and other individual factors that largely lead to criminality? And what are the perils of over-reliance on technology to fight crime?&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;What the numbers say&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;A&lt;a href="https://www.comparitech.com/vpn-privacy/the-worlds-most-surveilled-cities/"&gt; study&lt;/a&gt; released in August by tech research group Comparitech ranked Chennai as 32nd out of 50 of the most surveilled cities in the world. The research group, with the use of government reports, police websites and news articles, puts the total number of cameras in the city at 50,000. With a 2016 estimated population of 1.07 crore in Chennai, that is 4.67 cameras per 1,000 people.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;With the help of &lt;a href="https://www.numbeo.com/crime/rankings_current.jsp"&gt;Numbeo&lt;/a&gt;, a crowd-sourced database of perceived crime rates, the study puts Chennai’s crime index at 40.39. On a scale of 0 to 100, this is an estimation of overall level of crime in a given city. This score means Chennai’s crime index is ranked ‘moderate’. Similarly, on a 100 point scale, the city's safety index— quite the opposite of crime index— is at 59.61. The higher the safety index, the safer a city is considered to be.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The two other Indian cities on the list of 50 are New Delhi ranked No. 20 with 1,79,000 cameras for 1.86 crore people (9.62 cameras per 1,000 people) and Lucknow ranked at No. 40 with 9,300 cameras for 35.89 lakh people (2.59 cameras per 1,000 people). The capital's crime index is at 58.77 while its safety index is 41.23. The UP city on the other hand has a crime index of 45.30 and a safety index of 54.70.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Stating that the higher number of cameras ‘just barely correlates’ with a higher safety index and lower crime index, the study concludes, “Broadly speaking, more cameras doesn’t necessarily result in people feeling safer.” While the presence of CCTV cameras may not inherently be bad, experts say that they cannot become a substitute for tackling crime and its causes which transcend the realm of technology. These involve tailored and specific approaches which stem from community building.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;The infallible CCTV myth&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Pranav MB, policy officer at the Centre for Internet and Society in Bengaluru observes that in the long run, over-reliance on CCTV cameras would merely propel criminals to innovate, as opposed to helping deter the crime from taking place. He says, “While it seems intuitive that the presence of a CCTV camera will have a deterring effect on criminal activity, numerous studies over the past decade have concluded that this is not really the case. The idea of a deterring effect also relies on the assumption that the actors are making educated intelligent choices about their future, which is often not the case with persons that commit criminal acts. So the deterring effect of CCTV cameras is not likely to be much more than the already deterring effect that exists because of criminal law and law enforcement.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Busting the myth that CCTV cameras are foolproof, Pranav adds that public infrastructure as simple as a streetlight could aid in safer neighbourhoods. “The fact remains, however, that if you are not using advanced technology, a simple mask will render you unidentifiable by most basic CCTV cameras. As more advanced and more expensive technology is used, you are only necessitating the need for innovation among criminals to identify new loopholes that they can exploit in the technology. This is not an argument that generally holds against the use of technology, but in the case of CCTV cameras, it has been seen that simple street lights much better serve the goal of deterrence of crimes,” he says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;However, cops disagree with the findings. One IPS officer who works with the police’s Law and Order department in Chennai tells TNM that the presence of CCTV cameras has helped them nab a range of criminals from chain-snatchers to stalkers who have hacked women to death. Praising the use of facial recognition software like FaceTagr that was introduced a few years ago, the officer says, “CCTV cameras have a dissuading effect on criminals. At the very least they serve as a warning but in most cases, we can easily match them to criminals on our existing local, station-wise database. Especially when it comes to areas like T Nagar, Purasawalkam or other crime-prone suburbs, CCTV cameras are an invaluable tool for law enforcement.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“Even in cases of sexual abuse, street harassment or trafficking, private CCTV cameras have been helpful. Shop owners or residents have come forward with the footage in public interest,” he says, admitting that the Centre’s release of the long-pending National Crime Records Bureau (NCRB) statistics could show a correlation between the push to install CCTVs and crime rates.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;With a lack of NCRB data, there are no statistical answers to whether indeed installation of CCTV cameras has helped lowering of crime rates. However, as per one report in &lt;a href="https://www.thehindu.com/news/national/tamil-nadu/cctv-cameras-crime-fighter-or-big-brother/article26226129.ece"&gt;The Hindu&lt;/a&gt;, the police report a 30% drop in the crime rate in the city following the installation of CCTV cameras. According to their estimate for chain snatching alone, the city police claims that the number of cases have dropped from 792 in 2012 to 538 following the installation of CCTV cameras in 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Over-reliance on technology&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Agreeing that law enforcement must be cautious while employing technology to solve crimes, Dr M Priyamvadha, associate professor at the Department of Criminology, University of Madras says her detailed interviews with over 200 incarcerated burglars across Tamil Nadu reveal that they are always on the lookout for a CCTV camera. “They simply use a jammer worth Rs 2,000 (a handy device that disrupts the signal range of a camera) to skirt the presence of a CCTV camera,” she reports. However, the professor cautions that one must not over-sell the capabilities of a CCTV camera in crime prevention.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;“We must remember that CCTV cameras don't deter all crimes. If there is family or domestic violence, there won't be a CCTV camera inside the four walls of a house to reveal it. For burglaries, robberies and such offences, you can rely on CCTV cameras. How far it helps is a question mark. You can neither completely say it prevents crime nor that it is a waste,” she says.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The professor points out that even when deploying CCTV cameras across the city, law enforcement does not account for wear and tear and maintenance which forms an important part of monitoring security.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Echoing the sentiment, Pranav says that CCTV cameras primarily serve as sources of electronic evidence in criminal cases. “Their deterring effect has repeatedly been observed to not balance out the costs of installing and running them.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;Privacy, data protection concerns&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Chennai-based independent tech researcher Srikanth points to the inherent surveillance dangers thanks to the centralised way in which the city police collects the CCTV data. “There is something concerning especially about Chennai City Traffic Police and other various city police’s approach to CCTV. The fundamental shift is that, at least in the city, these cameras are connected to the police control room. So data gets centrally collated. When centralization kicks in, power abuse isn't far away. This way it is far easier for police to destroy evidence,” he alleges.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Srikanth also points out, “CCTVs (especially connected ones) are usually funded by residents and/or merchants who spend their money in putting up the infrastructure, but freely give away the data to the police (often in good faith). There is no oversight on usage, storage, retention of this data and by sheer monopoly on law and order, the police is able to connect a vast number of private CCTVs on to its network.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Significantly, he expresses concerns about there being no laws that govern the usage of CCTV footage by the police. “Even if one gives into the legitimate state aim to control crime, even if one can argue violation of privacy is proportional, there is no law around use of CCTV by police, let alone using them in investigations. That the state engages with private vendors (such as FaceTagr) and many others also provides these service providers access to data,” he explains.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Pranav also warns, “Furthermore, CCTV cameras also result in compromising the privacy of individuals, and if implemented by the state (as in the case of law enforcement), creates added surveillance risks. Compounding on this is the issue of the recorded video footage, which if stored/transmitted/managed in an non-secure manner creates data protection risks as well. This is especially true in India, where it is difficult to obtain the required infrastructure and expertise in running an effective and secure CCTV camera system.”&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;strong&gt;'Technology cannot replace interpersonal relationships'&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Advising pragmatic thinking when it comes to crime prevention, professor Priyamvadha says that technology should complement what she calls the ‘human touch'. Junking the ‘holistic’ one-size-fits-all approach that is often paraded as a solution, the criminologist says that each crime requires a tailored method of tackling it. “For each and every crime, there is a different strategy. There maybe crimes committed by juveniles, crimes committed against women. For example, if female foeticide is rampant in a village, it is important to understand the village, the preferences of the people there and the caste practices present among them,” she observes.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While technology often allows law enforcement to cover more ground in cases of limited manpower, there’s also a chance the cameras could be seen as a substitute for forging interpersonal relationships between police and the people they seek to protect. “With quick transferring of cops nowadays, the local police station doesn’t have an understanding of the ongoings. Interpersonal relationships are more important than technological advances,” she notes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/why-having-more-cctv-cameras-does-not-translate-to-crime-prevention'&gt;https://cis-india.org/internet-governance/news/why-having-more-cctv-cameras-does-not-translate-to-crime-prevention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Manasa Rao</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-12-05T23:26:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups">
    <title>Why Geospatial Bill is draconian and how it will hurt startups</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups</link>
    <description>
        &lt;b&gt;Last week, the Indian government rejected Google’s plans to map Indian cities, tourist spots and mountain ranges, using the 360-degree panoramic Google Street View feature.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.financialexpress.com/article/economy/why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups/282623/"&gt;published in Indian Express&lt;/a&gt; on June 13, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, the Indian government rejected &lt;a href="http://www.financialexpress.com/tag/google/"&gt;Google&lt;/a&gt;’s  plans to map Indian cities, tourist spots and mountain ranges, using  the 360-degree panoramic Google Street View feature. The government  officials cited “national security” as a reason for not granting  permission to Google. It is expected that the Google’s Street View  permission would be relooked at, once the draft Geospatial Information  Regulation Bill, 2016, is enforced as law. Many however feel that this  draft bill is draconian and will have serious repercussions on the  startup ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Geospatial Bill seeks to make creating, accessing and  distribution or sharing of map related information, illegal and that  every company will have to take prior permission and license from the  government for the same. Wayback in 2011, Google had announced the  introduction of Street View for Bangalore, on Google Maps. But the  project ran into trouble with Bangalore Police stopping Street View cars  from plying in the city, citing security reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google Street View, launched in 2007, is popular in San Francisco,  Las Vegas, Denver, New York and Miami, which allows users to navigate  virtual streets from photographs gathered from directional cameras on  special vehicles. While the service has been hugely successful it has  caused problems of privacy in some countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2010 almost 250,000 Germans told Google to blur pictures of their  homes on the Street View service, while Czech government also banned  Google from taking any new photos for the service. In Switzerland, the  matter went to the court and it was accepted that Google would be  obliged to pixelate 99% of images to blur faces, vehicle registrations  and that it would not be filming certain sensitive places such as  schools, prisons and shelter homes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This adds to the list of recent controversies on Google Earth, and  the draft Geospatial Information Regulation Bill, on adoption of mapping  technology in India. Commenting on the development, Sumandro  Chattapadhyay, research director at the Centre for Internet and Society  said, the key country where the Google Street View faced legal  challenge, and was fined too, is Germany. This legal challenge, however,  was not based on the concern for national security but on that for the  privacy of the citizens. However, it was eventually allowed to roll out  Street View in Germany provided that it asks for consent from the house  owners before images of any house.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“One of the crucial concerns with the draft Geospatial Information  Regulation Bill remains its vast scope of application. Not only  initiatives like Google Street View may be regulated under it (for  capturing geo-referenced imagery from the street level) but absolutely  any mobile application that requires the user’s geo-location (either  automatically detected, or manually entered by the user) would be within  the purview of this Bill. This evidently creates a great pressure upon  the entire ICT-enable product and service sector in India,”  Chattapadhyay added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would mean that, any company, particularly the new age startups,  those in the food tech, fintech and e-commerce space, which uses  geo-location to identify the customer location to either deliver goods,  food products, or the likes of Ola and Uber which uses maps to pickup  and drop customers, will have to obtain license from the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raman Shukla, director—strategy and product, Medikoe, said, “At  Medikoe we are helping users to locate the nearest healthcare service  provider with the available technologies. Google Maps is one of key  feature our company banks on. Though we understand the country’s  security concerns, the draft bill, if implemented, would be a violation  of independent internet. We believe that a much better solution can be  identified to solve security concerns.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Venu Kondur, founder of LOBB, the online truck booking platform said,  “Geostatial data is a very important data for our business. Customers  booking truck through LOBB platform get real-time track &amp;amp; trace  facility. Our customers rely heavily on this data for their day-day  activity. Startups like us depend largely on maps data for real-time  tracking of consignment. Lot of our business intelligence data is drawn  out of it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case, if the draft gets implemented, many startups will be forced  to change the business model and while it will also increase the product  delivery time. A group of 15 volunteers created a SaveTheMap.in portal  to educate the readers about the draft bill and also give complete  information on how the bill have an impact on the citizen and users of  certain application. Sajjad Anwar one of the volunteer, said, through  the portal about 1700 mails have been sent to the ministry of home  affairs airing their view on why they do not support the draft Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Comparing with other countries, Chattapadhyay further said, “At  first, other countries deal with the question of display of security  establishments in publicly available maps through direct interactions  with large mapping companies, and does not turn this into a financial  and political burden for the entire economy. Secondly, it is the concern  about privacy of the citizens that should frame the Indian government’s  response to products and services like Google Street View, and not  concerns regarding national security.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the draft bill says&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No person shall, in any manner, make use of, disseminate, publish or  distribute any geospatial information of India, outside India, without  prior permission from the security vetting authority under the Central  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalty&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever acquires any geospatial information of India in contravention  to the rules, shall be punished with a fine ranging from Rs 1 crore to  Rs 100 crore and /or imprisonment for a period upto seven years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Application for license&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every person who has already acquired any geospatial imagery or data  of any part of India either through space or aerial platforms such as  satellite, aircrafts, airships, balloons, unmanned aerial vehicles or  terrestrial vehicles shall within one year from the commencement of this  Act, make an application along with requisite fees to the security  vetting authority.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups'&gt;https://cis-india.org/internet-governance/news/financial-express-prabhu-mallikarjunan-june-13-2016-why-geospatial-bill-is-draconian-and-how-it-will-hurt-startups&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-07-02T04:57:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bangalore-citizen-matters-august-2-2016-akshatha-why-experts-are-worried-about-aadhaar-based-authentication">
    <title> Why experts are worried about Aadhaar-based authentication </title>
    <link>https://cis-india.org/internet-governance/news/bangalore-citizen-matters-august-2-2016-akshatha-why-experts-are-worried-about-aadhaar-based-authentication</link>
    <description>
        &lt;b&gt;As private companies are increasingly using Aadhaar data, is the privacy and security of personal data really at risk? What do those defending Aadhaar have to say?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The post was published in &lt;a class="external-link" href="http://bangalore.citizenmatters.in/articles/why-experts-are-worried-about-aadhaar-authentication"&gt;Citizen Matters&lt;/a&gt; on August 2, 2016. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification numbers of Aadhaar card holders are being extensively used by government and private agencies for authentication purposes, as we have already seen in an earlier article.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are 246  registered Authentication User Agencies in India, both government and  private, which are helping organisations and individuals in executing  the authentication process. In simple terms, they help the organisation  that has placed the authentication request, to confirm the identity of a  person during hiring, lending loans or while implementing welfare  schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But all does not seem well with the Aadhaar authentication process.  Concerns have been raised about the privacy and security aspects and,  loopholes in the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amended Aadhaar Bill (now, Aadhaar Act) has a clause that allows the  UIDAI to respond to any authentication query “with a positive, negative  or any other appropriate response.” This move has drawn a lot of  criticism from the activist fraternity. They have questioned the  government on framing an Act that places the security and privacy of  individual citizens at risk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even before the Bill was passed, legal scholar Usha Ramanathan had, in  an article published in Scroll.in, expressed concern over private  agencies using the Aadhaar database for authenticating the identity of  an individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Very little was heard about the interest private companies would have  in this information data base. It is not until the 2016 Bill was  introduced in Lok Sabha that we were told, expressly, that just about  any person or company may draw on the Aadhaar system for its purposes.  There are no qualifications or limits on who may use it and why. It  depends on the willingness of the Unique Identification Authority of  India, which is undertaking the project, to let them become a part of  the Aadhaar system,” she wrote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s crucial in the entire process is how the government is allowing  private players to use  Aadhaar-based information, putting the privacy  of Aadhaar-holders at stake. The government is technically allowed to  share the Aadhaar information with other agencies, only if the holder  has given consent to sharing his information, during enrollment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines for recording Aadhaar demographic data states: “Ask  resident’s consent to whether it is alright with the resident if the  information captured is shared with other organisations for the purpose  of welfare services including financial services. Select appropriate  circle to capture residents response as - Yes/No.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Citizen Matters had published a report on how people wanting to  register for Aadhaar were not asked if they would agree to share their  personal information. Citizens seemingly were unaware of the provision  for sharing information with a third party and data operators had  reportedly not asked them for their consent before marking ‘yes’ for the  consent option.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;There remains a regulatory vacuum&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In less than four months of the enactment of the Aadhaar Act, the number  of private agencies using Aadhaar database for identity authentication  too has grown long. Amber Sinha, Programme Officer at the Center for  Internet and Society expresses concern over the privacy implications  that a project of this magnitude would lead to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The original idea of Aadhaar was to use it for providing services under  welfare schemes. But the Aadhaar Act lets private agencies avail the  Aadhaar authentication service. The scope of the Act itself doesn’t  envisage sharing the data with private parties, but if any third party  wants to authenticate the identity of an individual, they can use the  UIDAI repository for the purpose,” he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the process, Amber says, the CIDR has to send a reply in ‘yes’ or  ‘no’ format, for any request seeking to confirm the identity of an  individual. The new legislation gives scope for the authorities to  respond to a query with a positive, negative or any other appropriate  response.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Aadhaar enrollment information includes demographic and biometric  details. So at this stage, we do not know what that “other appropriate  response” stands for. Further, while there are requirements to take the  data subject’s consent under the Act, there is lack of clarity on the  oversight mechanisms and control mechanisms in place when a private  party collects information for authentication. The UIDAI is yet to frame  the rules and the rules will probably determine this. Until the rules  are framed, some of the issues will exist in regulatory vacuum,” Amber  observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the current circumstances, Amber says, the responsible thing to do  for UIDAI is not to make such services available until the rules are  framed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But why has the Authority then started the authentication process even  before the rules have been framed? Assistant Director General of the  Authentication and Application Division of UIDAI, Ajai Chandra says the  rules when framed will have retrospective effect, from the date the Act  was enacted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists have also questioned the UIDAI for allowing private agencies  to use and authenticate Aadhaar data, when the Supreme Court has  restricted the use of Aadhaar. In its last order dated 15 October 2015,  the Apex Court allowed the government to use Aadhaar in implementing  selective welfare schemes such as PDS, LPG distribution, MGNREGS,  pension schemes, PMJDY and EPFO. It makes no mention about the UIDAI  using the Aadhaar data repository to provide services to private  agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When the Supreme Court has restricted the use of Aadhaar number to a  few specific government programmes only, how can UIDAI allow the data to  be used for any other programmes, let alone by private agencies?” Amber  asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a very brief conversation, Reena Saha, Additional DG, UIDAI told  Citizen Matters that UIDAI was acting as per the Supreme Court’s order  dated October 15th. “We aren’t sharing the data with private agencies,”  she said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;‘Authentication happening only with consent’&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Srikanth Nadhamuni, CEO of Khosla Labs - a registered Authentication  User Agency, who was also the Head of Technologies at UIDAI, rejects the  accusations on the security aspect, saying that the authentication  system is completely secure and foolproof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have made a secure system so that there is no man in the middle  taking the biometric information. The biometric information shared on  the application is encrypted and neither the AUA nor the Authentication  Service Agency (an intermediary between the AUA and the CIDR) can open  it. Both the AUA and ASA will sign on the packet and forward it to the  data repository as it is. There is no way that we can figure out what is  inside the packet. Once the request reaches the data repository, they  will unlock the signatures, run the authentication and reply in ‘yes’ or  ‘no’ or with an error code,” Srikanth explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ADG Chandra says that at present the CIDR is replying to authentication  requests in an “yes/no” format. “We aren’t sharing the data with any  agencies. Upon receiving the request for authentication, be it  demographic, biometric or one time pin (OTP), a notification is sent to  the registered mobile / email address of the Aadhaar holder,” he says.  So if the Aadhaar holder has changed the address, phone number, email ID  etc after Aadhaar enrollment, he/she should update the data with UIDAI  by placing a request online or through post. This will avoid any  confusion that may occur during the authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajai Chandra further clarifies, “the private agencies seeking  authentication (the Authentication User Agency) are not given direct  access to the database. On receiving the request, the intermediary  Authentication Service Agencies first examine the format of the  authentication request. The request is forwarded to the CIDR only if it  complies with the format.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from authentication, the eKYC (Know Your Customer) option also  allows companies to retrieve eKYC data of the Aadhaar holder. This data  includes photo, name, address, gender and date of birth (excludes mobile  number and email ID). But in this case too, “eKYC data can be retrieved  only with the consent of the Aadhaar card holder, the person has to be  adequately informed about the retrieval and the data cannot be shared  with a third party,” says Chandra.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though Aadhaar Act allows the UIDAI to perform authentication of Aadhaar  number, subject to the requesting entity paying the fee, UIDAI at  present is providing the service free of cost. “We will provide free  service till December 2016 and may levy the fee thereafter,” the ADG  says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bangalore-citizen-matters-august-2-2016-akshatha-why-experts-are-worried-about-aadhaar-based-authentication'&gt;https://cis-india.org/internet-governance/news/bangalore-citizen-matters-august-2-2016-akshatha-why-experts-are-worried-about-aadhaar-based-authentication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-07T02:16:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-march-3-2019-why-entrepreneurs-are-wary-of-new-draft-e-commerce-policy">
    <title>Why entrepreneurs are wary of the new draft e-commerce policy</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-march-3-2019-why-entrepreneurs-are-wary-of-new-draft-e-commerce-policy</link>
    <description>
        &lt;b&gt;Raka Chakrawarti, an entrepreneur from Mumbai, is tensed these days, not about her business, which is booming, but over the rules of the Draft National e-Commerce Policy.
&lt;/b&gt;
        &lt;p&gt;The article by Rahul Sachitanand was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/small-biz/entrepreneurship/why-entrepreneurs-are-wary-of-the-new-draft-e-commerce-policy/articleshow/68236907.cms"&gt;Economic Times&lt;/a&gt; on March 3, 2019. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If the policy, drafted by the Department for Promotion of Industry and Internal Trade (DPIIT) and seeking stakeholder comments, gets a go-ahead as it is, Gourmetdelight, her bootstrapped online vendor of organic goods, will have to certify and add reviews of all the products her marketplace sells.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She says her platform has nearly 1,500 stock keeping units - from black garlic to trikaya baby spinach - and certifying all of these would mean a further strain on her budget and small workforce. Then there are other questions she is seeking answers to: what to do with the growing volume of user data (the policy suggests the government has overarching rights over it); what is the scope of the policy; what is the definition of ecommerce and will the policy, by appearing protectionist, keep away foreign capital, so far the life blood of the sector?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In five years, according to Venture Intelligence, investors have poured over $18 billion across 667 deals in India's ecommerce market. This money, mostly from overseas, has allowed ecommerce startups to grow fast and also offer investors a handsome exit - like in the case of Walmart buying Flipkart.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of this momentum may be lost, fear entrepreneurs, since the policy appears to take a protectionist approach - by empowering domestic entrepreneurs, pushing Make in India and proposing to own user data and deterring global investors from betting on the potential of India's ecommerce market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal experts and executives in ecommerce companies feel the draft policy is half-baked. While it makes some progress on protecting home-grown small businesses, the proposals about data ownership and stricter quality norms may make it hard for such businesses to grow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ambareesh Murthy, CEO of furniture retailer Pepperfry, says this is a draft that is evolving and the intent may change over time. He is wary of the proposal to give government ownership of, and therefore control over, user data. While the government argues that data is a national resource, executives feel individuals should hold ultimate control over their personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While foreign company-owned Amazon and Flipkart have built their business here, newer entrants such as Chinese upstarts will find an India foray costlier, since the policy calls for setting up of an office here to legally operate. Critics also argue that while the policy starts with the right intentions, it loses focus on the way. They say the recommendations made across more than 14,000 words are too broad, encompassing more than the e-commerce industry itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Putting together such an all-encompassing statement isn't right, say policy experts, since it involves not just DPIIT but also other government bodies and regulators, including the Competition Commission of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok of Centre for Internet and Society, a think tank, says regulators do not fully appreciate the nuances of the growing mountain of data and properly safeguarding it within the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The draft policy has not comprehensively addressed what is the appropriate framework for ensuring data as a national resource," she says. "It appears to take a one-size-fits-all approach - bringing in privacy, intermediary liability, piracy, authenticity of information, etc. without considering potential exceptions and implications of such measures, including rights of individuals." Anirudh Rastogi, founder of Ikigai Law, a firm tackling tech legislation, contends that too much onus has been placed on entrepreneurs and their ventures to meet regulatory norms. "The draft proposes a host of consumer protection and anticounterfeiting measures, which is a good thing on principle," he says. "But this also means a lot of requirements for platforms and other intermediaries which dilute their intermediary status."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not everyone agrees. For some homegrown entrepreneurs, measures that look protectionist offer a level playing field to compete with well-funded foreign company-owned behemoths.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The govt is trying to level the playing field and take away some of the power held by well-funded giants over the Indian market," says Ashish Gurnani, cofounder of Postfold, an online bespoke apparel brand. "We can now hope to compete more on variety, curation and quality, rather than discounts alone." When contacted, a DPIIT official involved in the process of drafting the policy, said: "At present, we don't have control over our data. Companies which control our data can say no to sharing it if we want that data. Servers are outside. We're incapacitated as there is no physical or legal control. We want to create jobs through the policy."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-march-3-2019-why-entrepreneurs-are-wary-of-new-draft-e-commerce-policy'&gt;https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-march-3-2019-why-entrepreneurs-are-wary-of-new-draft-e-commerce-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rahul Sachitanandan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-08T00:32:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll">
    <title>Why did Nandan Nilekani praise a Twitter troll?</title>
    <link>https://cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll</link>
    <description>
        &lt;b&gt;As the Supreme Court upholds the linking of ‘Aadhar’ with PAN, questions around ex-UIDAI chairman Nandan Nilekani praising iSPIRT head Sharad Sharma Twitter troll and ‘Aadhar’s privacy properties will continue to be asked.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kiran Jonnalgadda was published in the &lt;b&gt;&lt;a class="external-link" href="http://indianexpress.com/article/opinion/why-did-nandan-nilekani-praise-a-twitter-troll-4697235/"&gt;Indian Express&lt;/a&gt;&lt;/b&gt; on June 10, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last month, Sharad Sharma, the head of the Indian Software Product  Industry Round Table (iSPIRT) Foundation, an organisation that promotes  Aadhaar to industry, was outed as the operator of at least two anonymous  Twitter troll accounts that viciously harassed and defamed critics of  Aadhaar. The shocking revelation was first met with denial by iSPIRT,  and then followed by what may be understood as a reticent apology from  Mr Sharma.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a bizarre sequence of events, the apology received praise from  several quarters. iSPIRT’s Guidelines and Compliance Committee (IGCC)  investigated Mr Sharma and the ‘Sudham’ team that coordinated the  trolling campaign. Two members of the investigating committee  subsequently resigned, although only one confirmed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee’s findings, confirming that Mr Sharma was responsible,  were summarised for the public by Mr Sharma himself, who then announced  that his role as a public spokesperson would now be handled  by Sanjay Jain. Mr Jain was once with the Unique Identification  Authority of India (UIDAI), launched by Nandan Nilekani, is currently a  director at Nandan Nilekani’s EkStep Foundation, and a close confidante  of Mr Sharma. The two have often pitched iSPIRT’s IndiaStack initiative  together.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an internal email questioning this decision, an iSPIRT member  asked whether Mr Jain was a part of the ‘Sudham’ team, and whether he  was also “at least partially culpable for the [troll] campaign and the  violation of the code of conduct.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The victims of the trolling have received no report, and the two  apologies posted by Mr Sharma were both for having “condoned uncivil  behaviour”, but not for personally orchestrating the attacks. Among  those who praised him was Nandan Nilekani, former chairman of UIDAI  and chief mentor of iSPIRT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics have been pointing out for years that Aadhaar lacks  sufficient checks and balances, and that claims of benefits  are overstated. These concerns have been met with denial, condemnation  of critics, and often outright refusal to engage in debate. This has  unfortunately only served to alienate an even larger section of the  population, turning ordinary citizens into activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can gain an insight into how Aadhaar is promoted by examining  iSPIRT. The organisation was founded in 2013 by volunteers who had  been working together on the sidelines of the NASSCOM Product Conclave.  These volunteers felt the need for an independent grassroots  organisation to represent tech entrepreneurs who were building  products for India and the world. iSPIRT has grown phenomenally  influential over its few years, largely by the work of volunteers who  were truly interested in building a mutual assistance community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Level playing fields are a recurring topic. Just as there is a desire  to lower bureaucratic hurdles to give every entrepreneur a fair chance,  there is also the question of how a startup can compete against a  foreign competitor that has the advantage of a stronger home market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indianexpress.com/about/flipkart/"&gt;Flipkart&lt;/a&gt; and  Ola are two prominent examples in their fight to defend their market  share against Amazon and Uber, competitors armed with global experience,  more capital, and better trained talent. iSPIRT’s take is that for  Indian companies to thrive they must have a supportive ecosystem that  enables rapid growth, and so iSPIRT must step up as an “activist think  tank”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One aspect of this activism is IndiaStack, which seeks to help  startups by promoting a suite of ‘public goods’: Aadhaar and eKYC for id  verification, eSign and Digilocker for digital contracts and  certificates, and UPI for payments. If one accepts at face value that  these services are well intentioned, then IndiaStack is on a noble  quest. The details, unfortunately, are less pristine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iSPIRT is a private non-profit, but its volunteers include several  former members of UIDAI. The guidance and compliance committee (IGCC)  investigating the trolling included a current member of government.  iSPIRT helped build and evangelise the UPI (United Payments Interface)  platform and BHIM app for NPCI, but the level of involvement and terms  of the agreement are not public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For an organisation that claims to champion public goods, iSPIRT is  opaque on the level of influence they wield with government (Mr Sharma  once claimed some influence but no control), and on who exactly built  the various components of IndiaStack, within or outside of government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They showed a remarkable degree of influence when foisting UPI on a  change-resistant banking sector. They have funding from four banks  (IDFC, SBI, Bank of Baroda and Axis Bank) and from fintech startups.  Despite this level of responsibility, they also have no accountability  since they are a pro bono volunteer force, allowing them to distance  themselves from failures (UPI failures are NPCI’s problem and Aadhaar  failures are UIDAI’s problem, etc) and unpleasant incidents such as the  ‘Sudham’ trolling project. (No one has accepted responsibility for  operating a troll account.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the core of IndiaStack is ‘Aadhaar’, which as it currently stands  has serious concerns from its technical architecture to institutional  safeguards. Aadhaar lacks publicly verifiable audits, a data breach  disclosure policy, or an engagement process for researchers to report  concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For reasons best known to them, the promoters of ‘Aadhaar’ are in a  tearing hurry to impose it everywhere, in every aspect of an Indian’s  life, out of an apparent fear that it will die if adoption slows  down. This is eerily reminiscent of startup mantras like “fake it till  you make it” and “move fast and break things”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But ‘Aadhaar’ already has a billion enrollments and the backing of  legal measures pushed by the Union Government. There is no threat of  imminent demise. And yet, as the Twitter trolling shows, this fear  continues to exist for ‘Aadhaar’s proponents, so much so that critics  must be silenced at any cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where trolling failed to work, subtler attacks are sure to follow. There have been some in the recent past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) is facing one such attack  for its report on the leak of 130 million Aadhaar numbers. The report  received wide coverage and was followed by new rules from MEITy  (ministry of Electronics &amp;amp; Information Technology) regarding the  handling of Aadhaar numbers, but instead of commending CIS for its role  in improving safeguards, UIDAI is accusing it of hacking, demanding the  identity of the researcher so that he or she may be individually  prosecuted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Sameer Kochhar demonstrated that previously captured  fingerprints were being reused because Aadhaar’s API lacked technical  safeguards, UIDAI responded by prosecuting him. A News18 journalist was  also prosecuted for demonstrating how double application for enrollment  was possible using different names.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of September 30, 2017, ‘registered’ devices will be mandatory as  the current devices are not secure against fingerprint reuse, and an  unknown number of fingerprints have already been captured and stored.  This sort of forced technological upgrade will happen again as more  problems surface into public consciousness, with more researchers and  critics harassed for pointing these out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Aadhaar’ pursues inherently contradictory goals. The process of  ‘inorganic seeding’, for instance, allows a database to be seeded with  ‘Aadhaar’ numbers, to help a service provider identify and eliminate  duplicates without the individual’s cooperation. (Inorganic seeding is  an official UIDAI scheme.) And yet, the law prohibits using and sharing  ‘Aadhaar’ numbers without the individual’s consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Aadhaar’ aims to be an inclusive project, providing an identity for  everyone, and yet easily lends itself to being an instrument of  exclusion. There is technical exclusion when biometrics fail to match,  and there is institutional exclusion when Aadhaar is made mandatory and  an individual is then blacklisted from a service or denied Aadhaar  enrollment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aviation minister &lt;a href="http://indianexpress.com/about/jayant-sinha"&gt;Jayant Sinha&lt;/a&gt; recently announced a proposal to use digital id for just this  purpose. ‘Aadhaar’ in its current state makes it extraordinarily simple  for an organisation to demand it for authentication, but what of the  necessary safeguards to protect an individual’s rights? Or of ensuring  that grievance redressal mechanisms are in place and actually  functional? These are not solved by a technical API integration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just as we’ve seen with nuclear power, weak institutions which are  sensitive to criticism and fail to ensure effective oversight amplify  the risks of the underlying technology. Aadhaar’s supporting  institutions, whether government bodies like UIDAI or private bodies  like iSPIRT, are immature for the mandate they carry. All technology  improves with time, but weak institutions hamper their benefit to  society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the leading promoter of Aadhaar, founding chairman of UIDAI, and  chief mentor of iSPIRT, Mr Nilekani must step up and commit to improving  the institutions he commands, and take responsibility for their  failures. Condemning critics instead does not help build institutions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll'&gt;https://cis-india.org/internet-governance/news/indian-express-kiran-jonnalgadda-june-10-2017-why-did-nandan-nilekani-praise-a-twitter-troll&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-12T01:34:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle">
    <title>Why did India fail to discover the ISIS Twitter handle?</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle</link>
    <description>
        &lt;b&gt;India's surveillance system fails to track the servers of internet giants like Google or Facebook because these do not have servers in the country, says a leading cyber law expert.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anita Babu was &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/why-india-failed-to-discover-the-isis-twitter-handle-114122500522_1.html"&gt;published in the Business Standard&lt;/a&gt; on December 26, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Back in 2009, after the investigation team, probing into the 26/11  Mumbai terror attacks, almost cracked the case, it was the US’s Federal  Bureau of Investigation (FBI) which connected the missing links by  arresting David Headley, the mastermind.&lt;br /&gt; &lt;br /&gt; Five years later, India &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Is" target="_blank"&gt;is &lt;/a&gt;staring  at a similar situation, when Bengaluru-based Mehdi Masroor Biswas, was  allegedly found to be operating a pro-ISIS (Islamic State) &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;handle.  It was a British broadcaster, Channel 4, which blew the lid off  Biswas’s activity. Soon after the report, Indian authorities swung into  action.  Last year, when communal violence broke out in some parts of  Uttar Pradesh, a Pakistani news organisation reported that a fake video  was being circulated to fan sentiments.&lt;br /&gt; &lt;br /&gt; But, why have Indian agencies failed to detect such activities which  pose a threat to the national security? A senior government official  said intelligence agencies in the country scan the internet for leads.  But, in the light of increased threats, systems need to be beefed up  significantly.  Perhaps, as a first step towards this, the home ministry  on Wednesday formed a committee to prepare a road map for tackling  cyber crimes in the country.&lt;br /&gt; &lt;br /&gt; It will give suitable recommendations on all facets of cyber crime,  apart from suggesting possible partnerships with public and private  sector, non-governmental organisations and international bodies.&lt;br /&gt; &lt;br /&gt; According to Sunil Abraham, executive director of a Bengaluru-based  research organisation, the Centre for Internet and Society, it’s time we  move closer towards intelligent and targeted surveillance, rather than  mass surveillance. This will require monitoring a selected accounts or  profiles, instead of tapping information from across the population.  Old-fashioned detective work is also very important, as it has helped  zero in on Biswas.&lt;br /&gt; &lt;br /&gt; Another problem the country faces is that a lot of data is being pooled  in by multiple agencies, but of little use. “We must free up our law  enforcement agencies and intelligence services from the curse of having  too much data,” Abraham adds. Since most of the internet companies are  headquartered outside India, the authorities face a lot of difficulties  in accessing information from these networks.&lt;br /&gt; &lt;br /&gt; “India’s surveillance system fails to track the servers of internet giants like &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google &lt;/a&gt;or &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;because  these do not have servers in the country. Our system is only confined  within the country,” says Pavan Duggal, a leading cyber law expert.&lt;br /&gt; &lt;br /&gt; Since the US has the capability to access information from telecom  companies, service providers such as Twitter and Facebook and the  consortia that run submarine cables, these companies cooperate in a much  more effective and immediate manner, adds Abraham. “But these are  things that we will never be able to do in India,” he adds.&lt;br /&gt; &lt;br /&gt; For instance, India follows the mutual legal assistance treaty  procedure, to gather and exchange information in an effort to enforce  public laws or criminal laws. However, this is a time-consuming process  and often takes up to two years before we get any data from these  companies.&lt;br /&gt; &lt;br /&gt; But due to the threat of cyber-terrorism being shared by both companies  and governments, companies such as Google, Twitter and Facebook are  cooperating more than before, experts say.&lt;br /&gt; &lt;br /&gt; Internet and Jurisdiction Project, an international group that works  towards ensuring digital coexistence, tries to get a procedural law  between two countries in a harmonised manner and includes collection,  storage, handling and processing of evidence.&lt;br /&gt; &lt;br /&gt; More lubricating efforts should be undertaken internationally on these  lines, say experts. Hopefully, the new committee will take steps in this  direction.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle'&gt;https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T03:27:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance">
    <title>Why Data Localisation Might Lead To Unchecked Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance</link>
    <description>
        &lt;b&gt;In recent times, there has been a rash of policies and regulations that propose that the data that Indian entities handle be physically stored on servers in India, in some cases exclusively. In other cases, only a copy needs to be stored.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.bloombergquint.com/opinion/why-data-localisation-might-lead-to-unchecked-surveillance"&gt;Bloomberg Quint&lt;/a&gt; on October 15, 2018 and also mirrored in the &lt;a class="external-link" href="https://www.thequint.com/voices/opinion/why-data-localisation-might-lead-to-unchecked-surveillance"&gt;Quint&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In April 2018, the Reserve Bank of India put out a&lt;a href="https://www.rbi.org.in/scripts/NotificationUser.aspx?Id=11244&amp;amp;Mode=0" target="_blank"&gt; circular &lt;/a&gt;requiring that all “data relating to payment systems operated by them are stored in a system only in India” &lt;a href="https://www.bloombergquint.com/business/rbi-sticks-to-oct-15-deadline-for-data-localisation" target="_blank"&gt;within six months&lt;/a&gt;.  Lesser requirements have been imposed on all Indian companies’  accounting data since 2014 (the back-up of the books of account and  other books that are stored electronically must be stored in India, the  broadcasting sector under the Foreign Direct Investment policy, must  locally store subscriber information, and the telecom sector under the  Unified Access licence, may not transfer their subscriber data outside  India).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft e-commerce policy has a wide-ranging requirement  of exclusive local storage for “community data collected by Internet of  Things devices in public space” and “data generated by users in India  from various sources including e-commerce platforms, social media,  search engines, etc.”, as does the draft e-pharmacy regulations, which  stipulate that “the data generated” by e-pharmacy portals be stored only  locally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While companies such as Airtel, Reliance, PhonePe  (majority-owned by Walmart) and Alibaba, have spoken up in support the  government’s data localisation efforts, others like Facebook, Amazon,  Microsoft, and Mastercard have led the way in opposing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just this week, two U.S. Senators &lt;a href="https://www.bloombergquint.com/business/us-senators-write-to-pm-modi-seek-soft-stance-on-indias-data-localisation" target="_blank"&gt;wrote to&lt;/a&gt; the Prime Minister’s office arguing that the RBI’s data localisation  regulations along with the proposals in the draft e-commerce and cloud  computing policies are “key trade barriers”. In her dissenting note to  the Srikrishna Committee's report, Rama Vedashree of the Data Security  Council of India notes that, “mandating localisation may potentially  become a trade barrier and the key markets for the industry could  mandate similar barriers on data flow to India, which could disrupt the  IT-BPM (information technology-business process management) industry.”&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Justification For Data Localisation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;What are the reasons for these moves towards data localisation?&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;Given the opacity of policymaking in India, many of the policies and  regulations provide no justification at all.  Even the ones that do,  don’t provide cogent reasoning.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The  RBI says it needs “unfettered supervisory access” and hence needs data  to be stored in India. However, it fails to state why such unfettered  access is not possible for data stored outside of India.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;As  long as an entity can be compelled by Indian laws to engage in local  data storage, that same entity can also be compelled by that same law to  provide access to their non-local data, which would be just as  effective.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;What  if they don’t provide such access? Would they be blacklisted from  operating in India, just as they would if they didn’t engage in local  data storage? Is there any investigatory benefit to storing data in  India? As any data forensic expert would note, chain of custody and data  integrity are what are most important components of data handling in  fraud investigation, and not physical access to hard drives. It would be  difficult for the government to say that it will block all Google  services if the company doesn’t provide all the data that Indian law  enforcement agencies request from it. However, it would be facile for  the RBI to bar Google Pay from operating in India if Google doesn’t  provide it “unfettered supervisory access” to data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most exhaustive justification of data localisation in any official Indian policy document is that contained in the &lt;a href="http://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf" target="_blank"&gt;Srikrishna Committee’s report&lt;/a&gt; on data protection. The report argues that there are several benefits to data localisation:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Effective enforcement,&lt;/li&gt;
&lt;li&gt;Avoiding reliance on undersea cables,&lt;/li&gt;
&lt;li&gt;Avoiding foreign surveillance on data stored outside India,&lt;/li&gt;
&lt;li&gt;Building an “Artificial Intelligence ecosystem”&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the last three reasons are risible.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Not A Barrier To Surveillance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Requiring  mirroring of personal data on Indian servers will not magically give  rise to experts skilled in statistics, machine learning, or artificial  intelligence, nor will it somehow lead to the development of the  infrastructure needed for AI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  United States and China are both global leaders in AI, yet no one would  argue that China’s data localisation policies have helped it or that  America’s lack of data localisation polices have hampered it.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;On  the question of foreign surveillance, data mirroring will not have any  impact, since the Srikrishna Committee’s recommendation would not  prevent companies from storing most personal data outside of India.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Even  for “sensitive personal data” and for “critical personal data”, which  may be required to be stored in India alone, such measures are unlikely  to prevent agencies like the U.S. National Security Agency or the United  Kingdom’s Government Communications Headquarters from being able to  indulge in extraterritorial surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, slides from an  NSA presentation that were leaked by Edward Snowden showed that the  NSA’s “BOUNDLESSINFORMANT” programme collected 12.6 billion instances of  telephony and Internet metadata (for instance, which websites you  visited and who all you called) from India in just one month, making  India one of the top 5 targets.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This shows that technically, surveillance in India is not a challenge for the NSA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So,  forcing data mirroring enhances Indian domestic intelligence agencies’  abilities to engage in surveillance, without doing much to diminish the  abilities of skilled foreign intelligence agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I have &lt;a href="https://slides.com/pranesh/digital-security-for-journalists#/5/1" target="_blank"&gt;noted in the past&lt;/a&gt;,  the technological solution to reducing mass surveillance is to use  decentralised and federated services with built-in encryption, using  open standards and open source software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reducing reliance on  undersea cables is, just like reducing foreign surveillance on Indians’  data, a laudable goal. However, a mandate of mirroring personal data in  India, which is what the draft Data Protection Bill proposes for all  non-sensitive personal data, will not help. Data will stay within India  if the processing happens within India. However, if the processing  happens outside of India, as is often the case, then undersea cables  will still need to be relied upon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  better way to keep data within India is to incentivise the creation of  data centres and working towards reducing the cost of internet  interconnection by encouraging more peering among Internet connectivity  providers.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;While  data mirroring will not help in improving the enforcement of any data  protection or privacy law, it will aid Indian law enforcement agencies  in gaining easier access to personal data.&lt;/blockquote&gt;
&lt;h2 style="text-align: justify; "&gt;The MLAT Route&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Currently,  many forms of law enforcement agency requests for data have to go  through onerous channels called ‘mutual legal assistance treaties’.  These MLAT requests take time and are ill-suited to the needs of modern  criminal investigations. However, the U.S., recognising this, passed a  law called the CLOUD Act in March 2018. While the CLOUD Act compels  companies like Google and Amazon, which have data stored in Indian data  centres, to provide that data upon receiving legal requests from U.S.  law enforcement agencies, it also enables easier access to foreign law  enforcement agencies to data stored in the U.S. as long as they fulfill  certain procedural and rule-of-law checks.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;While  the Srikrishna Committee does acknowledge the CLOUD Act in a footnote,  it doesn’t analyse its impact, doesn’t provide suggestions on how India  can do this, and only outlines the negative consequences of MLATs.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Further,  it is inconceivable that the millions of foreign services that Indians  access and provide their personal data to will suddenly find a data  centre in India and will start keeping such personal data in India.  Instead, a much likelier outcome, one which the Srikrishna Committee  doesn’t even examine, is that many smaller web services may find such  requirements too onerous and opt to block users from India, similar to  the way that Indiatimes and the Los Angeles Times opted to block all  readers from the European Union due to the coming into force of the new  data protection law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government could be spending its  political will on finding solutions to the law enforcement agency data  access question, and negotiating solutions at the international level,  especially with the U.S. government. However it is not doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given  this, the recent spate of data localisation policies and regulation can  only be seen as part of an attempt to increase the scope and ease of  the Indian government’s surveillance activities, while India’s privacy  laws still remain very weak and offer inadequate legal protection  against privacy-violating surveillance. Because of this, we should be  wary of such requirements, as well as of the companies that are vocal in  embracing data localisation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance'&gt;https://cis-india.org/internet-governance/blog/bloomberg-quint-pranesh-prakash-october-15-2018-why-data-localisation-might-lead-to-unchecked-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-16T14:08:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/newsminute-october-1-2019-theja-ram-why-conviction-rate-for-cyber-crime-cases-in-karnataka-is-abysmally-low">
    <title>Why conviction rate for cyber crime cases in Karnataka is abysmally low</title>
    <link>https://cis-india.org/internet-governance/news/newsminute-october-1-2019-theja-ram-why-conviction-rate-for-cyber-crime-cases-in-karnataka-is-abysmally-low</link>
    <description>
        &lt;b&gt;Police say a third of the cases involving economic offences in Karnataka are related to job scams, a third related to OTP and UPI fraud, and the remaining are lottery related scams.&lt;/b&gt;
        &lt;p&gt;The blog post by Theja Ram published by the &lt;a class="external-link" href="https://www.thenewsminute.com/article/why-conviction-rate-cyber-crime-cases-karnataka-abysmally-low-109803"&gt;News Minute&lt;/a&gt; on October 1, 2019 quotes Karan Saini.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Just like thousands of engineering graduates in pursuit of a job, 22-year-old Samhita RH had been trying to find one since she graduated from AMC Engineering College in Bengaluru. Samhita’s parents, who live in Hassan district’s Sakleshpur, were counting on their daughter to help clear loans they had taken for her education. A year after graduating, Samhita was desperate. She had uploaded her resume on several job portals and hoped she would get an interview call.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the afternoon of December 21 last year, Samhita received an email from an id that read: hr.monster13@india.com. Samhita had signed up for job alerts on employment portal Monster and was thrilled when she finally received a call for an interview, over a year after graduating.&lt;/p&gt;
&lt;p class="_yeti_done" style="text-align: justify; "&gt;“I did not suspect that this was a fake account. Soon after I received the email, I also got a call on my mobile number and a man named Abhishek Acharya said he was from Monster and that there was an interview call for a position at HCL. He said I have to pay Rs 1,200 as registration fee and that I would be able to go for the interview then. A few hours later, he asked me to pay Rs 18,000. The next day I had to pay Rs 13,000 and later the same day another Rs 15,000,” Samhita says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next day, she received a fake offer letter from HCL after a telephonic conversation and this time another man named Amit Singh, who claimed to be an employee in HCL’s HR department, allegedly told Samhita that she had to pay Rs 29,000 for a certification programme that would be conducted as part of her induction programme. Samhita paid Amit Singh too and when she asked him the date of joining, Amit allegedly informed her that he would be in touch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By the first week of January 2019, Samhita was worried that she may have been duped. She got in touch with HCL in Bengaluru and enquired about the job offer she had received. She even sent them a copy of the “offer letter” she had received. To her dismay, HCL informed her that the letter was forged and that no one from the company had reached out to her.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When she contacted the mobile number of the alleged Amit Singh and demanded her money back, he allegedly hung up and could never be reached again. “I lost around Rs 76,000 in a few days’ time. My parents were struggling for money. They had taken loans to pay for the job and it turned out to be a sham. When I got that email, I should have been more alert. But hope and relief of finally getting a job had clouded my judgement. I filed a complaint with the Cyber Crime Police Station in Bengaluru on January 19 this year, but there has been no progress in my case,” Samhita says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Samhita’s case, police say that the phones used to contact her were last used in Madhya Pradesh and the IP address from which the email was sent was from Nigeria. “How can we track down some online identity that we don’t know. If it’s a robbery or a murder, its jurisdictional. When it comes to people morphing pictures and extortion rackets on online dating platforms, it is easier to track down the people as there is an ID of the person. But economic offences are the hardest to crack,” says Sandeep Patil, Joint Commissioner of Crime, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just like Samhita, thousands of people have fallen victim to job scams on the internet and the Bengaluru Cyber Crime Police say that a third of the cases involving economic offences in Karnataka are related to job scams, a third of them are related to OTP and UPI fraud, and the remaining are lottery related scams. And the police say that investigating cyber crimes related to economic offenses are very difficult.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;UPI, lottery fraud on the rise&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ever since demonetisation led people to switch to online money transfer, police say that Unique Identification Pin (UPI) related cyber crimes are on the rise. According to the Cyber Crime Police Station in Bengaluru, of the 12,754 cyber crime cases reported in the city between January 2018 and August 2019, 38% of them were related to UPI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Before demonetisation, a lot of people were not using Google Pay, PayTM, BHIM and other UPI apps for money transfer. With more users, the pool of potential victims for those committing cyber crimes has increased,” Sandeep Patil says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July this year, a Madhusudhan, businessman from Bengaluru, filed a complaint with the Cyber Crime Police Station that a person posing to be a representative of an e-commerce company had looted Rs 1.6 lakh from three of his bank accounts via his BHIM app. Madhusudhan’s wife Lekha had ordered material for a dress from an e-commerce website. After it was delivered, she wanted to return it, and found a customer service number when she searched on Google. She asked Madhusudhan to help her get the money back.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Madhusudhan spoke to the representative, who informed him that the product could not be returned but that he could initiate a refund. “The product quality was bad and so we wanted to return it. The representative said he would refund the money and told me that he would send me a message, I had to click the link in the message and fill in a form for the refund to be processed. I never thought that this could be a scam. Within minutes, Madhusudhan received a message with a message ID that read: HDFC-UPI. Assuming it was legitimate, I clicked the link, which led me to a portal. But there was no form,” Madhusudhan says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Madhusudhan tried calling the customer care number once more but there was no response. About three or four minutes later he received a message from his bank that Rs 90,000 was transferred to an unknown account via BHIM. Seconds later, he received another message that Rs 70,000 was transferred to another bank account via the same app. Madhusudhan immediately called his bank and asked them to stop any fund transfer from his account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I have three bank accounts linked to BHIM and money was wiped out from two accounts. I was able to save Rs 40,000 only after I called the bank,” he says. When Madhusudhan approached the police, Cyber Crime sleuths informed him that it was a phishing scam. “That message that I clicked, that was where it started,” Madhusudhan adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Karan Saini, Programme Officer with the Centre for Internet and Society, most UPI-related crimes are phishing operations and in rare cases involve spyware. Karan says that SMS gateways are the easiest means to con people into believing that a message is from a legitimate source.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Businesses have the ability to send messages to people from SMS gateways provided by telecom companies. Consider the messages we get from e-commerce sites, banks, etc. While most businesses send messages to customers who have wilfully provided their details, bulk contact information can still be procured quite easily, and the cost barrier for sending bulk SMSes is also quite low. Most SMS providers charge customers around Rs. 300 for sending 1000 messages. Further, businesses have the ability to specify a custom sender ID (i.e., the name that appears on the message), which TRAI (Telecom Regulatory Authority of India) mandates to be 6 characters long (e.g., AXISBK), however, fraudsters can easily subvert the custom Sender ID feature to push their phishing campaigns. Most of the reported UPI scams seem to have succeeded because people were conned by the name of the sender. While several SMS providers maintain ‘blacklists’ that let them protect the Sender IDs of prominent customers, fraudsters can still trivially bypass these blacklists, by alternating characters within the Sender ID (e.g., changing AXISBK to AXISBA or even BKAXIS), or by simply moving to another SMS provider.,” Karan says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In December 2017, Venkateshulu S, a jewellery store owner in Bengaluru, received an SMS allegedly from an e-commerce website stating that he had won Rs 1,00,00,000 in a lucky draw. The message stated that Venkateshulu, who had recently purchased a TV from the website, had won the lucky draw from a pool of customers chosen for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Venkateshulu, who was initially sceptical, had ignored the SMS. A day later, he received another SMS from the same sender ID, which claimed that he had to claim the prize within the next 24 hours or the offer would expire. He also received a call from a person posing as a customer care executive and informed him that he had to pay Rs 1 lakh to claim the prize and that the money would be refunded to him once the winnings were deposited into his account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within a few minutes, he transferred the money to an account number given by the conman. It was only after two days that Venkateshulu realised he had been swindled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I was waiting for the money to get deposited into my account. When I contacted that man again, his phone was switched off. Then I filed a complaint with the cyber crime police but they haven’t caught the culprit even now,” Venkateshulu says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to The News Minute, Director General of Police, CID, Praveen Sood, said that just like Venkateshulu, thousands of people get conned in lottery scams. “When someone is asking you to pay money to collect alleged winnings, that must be the trigger. People get conned a lot by lotteries because the amount of money is too huge for them to pass up,” he says.&lt;/p&gt;
&lt;h3 id="_mcePaste"&gt;Thousands of cases, negligible convictions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;From just 1,045 cases registered in 2014 to 8,495 cases between January and August 2019, the number of cyber crime cases being reported in Karnataka are on the rise. Between January 2014 and August 2019, 20,920 cases were registered across 30 Cyber Crime police stations in Karnataka and a whopping 85% of them have been registered in the lone Cyber Crime Police Station in Bengaluru City.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 8,495 cases registered between January and August 2019, 7,516 of them were in Bengaluru. Another alarming reality is the low rate of conviction. There have been only 36 convictions in cyber crime cases in Karnataka in the last six years and out of them only 5 convictions have occurred in cases registered in Bengaluru. Of these convictions, four of them occurred in 2014 and one in 2018. There were zero convictions in the years in between.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shockingly low rate of conviction, Cyber Crime sleuths say, is because 95% of the cases registered go unresolved for various reasons. Of the total number of cases registered in the last six years, arrests have been made in only 6.2% of the cases and the number of cases in which chargesheets have been filed is even lower.&lt;/p&gt;
&lt;p&gt;Between 2014 and August 2019, chargesheets were filed only in 736 cases in Karnataka, of which 46.86% were from Bengaluru.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://www.thenewsminute.com/sites/all/var/www/images/Cybercrime_karnataka.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://www.thenewsminute.com/sites/all/var/www/images/Cybercrime_bengaluru.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DGP Sood says that one of the primary reasons for the low conviction rate in cyber crime cases, not only in Karnataka but across the country, is the lack of geographical boundaries in cyber crime cases.&lt;/p&gt;
&lt;p&gt;“In most cases across the country, the crime is perpetrated by people from other countries,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior police officials who have worked on numerous cyber crime cases in Karnataka say that another reason for low conviction rates in these crimes is that the cost of investigating cyber crime cases, especially economic offences, exceeds the actual loss suffered by victims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In many cases that I have worked on, the IP addresses or phone numbers are from Nigeria, Trinidad, Congo or an eastern European country. How do we track down and arrest these people? After five to six days of investigating, we reach a dead end. Between the amount that individual victims lose and the amount that needs to be spent on investigating that case, there is a huge difference. Lakhs have to be spent on one investigation. The economics do not add up and the physical international boundaries are major hurdles,” a senior police officer says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Limited knowledge about advanced technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Senior officials with the Cyber Crime unit in the Criminal Investigation department say that apart from a severe staff crunch in Cyber Crime stations, most police officers, public prosecutors and magistrates have limited knowledge about cyber crimes, the technology used, the methods of perpetrating such crimes and, most importantly, the technological jargon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Initially, we had only 10 police officials working in one police station in Bengaluru and they were handling thousands of cases. It was only in 2018 that the number of personnel were increased to 40. Even now, these officers are handling thousands of cases and it’s an overload,” JCP Sandeep Patil says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to DGP Praveen Sood, even in cases where arrests are made and chargesheets filed, overburdened sessions courts with limited magistrates who understand the nuances of cyber crime cases contribute to low rates of conviction.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;article class="_yeti_done top_horizontal_show_ads_on_desktop right_vertical_ads_block left_vertical_ads_block"&gt;
&lt;p style="text-align: justify; "&gt;Senior police officials who work with the Centre for Cyber Crime Investigation and Training Centre say that prosecutors and lawyers fail to put forth a strong case due to lack of knowledge about these crimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Understanding the methods used by perpetrators of cyber crimes and most importantly the jargon is difficult for prosecutors and magistrates. Even officers working in Cyber Crime stations keep learning new things every day. Magistrate courts are overloaded and to find judges who can understand the nuances of the case and prosecutors who can put forth a good case is difficult,” the official explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February this year, the Centre for Cyber Crime Investigation and Training Centre was inaugurated in Bengaluru in order to train police officers, prosecutors and magistrates on the nuances of cyber crime. DGP Praveen Sood says that with more police officers being trained, it is a first step towards ensuring that more cases are detected and disposed of quickly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Since cyber crime has no boundaries, the best way is to prevent it. More awareness is required. People must not use the same email ID for personal and financial transactions. Separate email IDs must be used for social media accounts because many people get conned on social media. There are many cases where social media accounts are hacked and pictures of women are morphed. It’s always better to change passwords frequently and not share it with anyone. Do not believe people who say they are bank officials asking for OTP and PINs. Never buy into lottery scams where they ask you to pay money in order to get your winnings,” Praveen Sood adds.&lt;/p&gt;
&lt;/article&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/newsminute-october-1-2019-theja-ram-why-conviction-rate-for-cyber-crime-cases-in-karnataka-is-abysmally-low'&gt;https://cis-india.org/internet-governance/news/newsminute-october-1-2019-theja-ram-why-conviction-rate-for-cyber-crime-cases-in-karnataka-is-abysmally-low&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Theja Ram</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-10-13T06:07:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe">
    <title>Why Aadhaar leaks should worry you, and is biometrics really safe?</title>
    <link>https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe</link>
    <description>
        &lt;b&gt;What’s worrying is that the UIDAI seems to always be in denial mode over security concerns. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="http://www.thenewsminute.com/article/why-aadhaar-leaks-should-worry-you-and-biometrics-really-safe-61469"&gt;published by the News Minute&lt;/a&gt; on May 4, 2017. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;If you’ve paid the slightest bit of attention to news about Aadhaar,  you’ll have heard about a series of leaks of Aadhaar data from multiple  government websites. Some of the latest government websites to leak  Aadhaar and demographic data, were the Jharkhand &lt;a href="http://www.hindustantimes.com/india-news/in-massive-data-breach-over-a-million-aadhaar-numbers-published-on-jharkhand-govt-website/story-EeFlScg5Dn5neLyBzrkw1I.html" target="_blank"&gt;Directorate&lt;/a&gt; of Social Security and the Kerala government’s pension &lt;a href="http://www.livemint.com/Politics/bM6xWCw8rt6Si4seV43C2H/Govt-departments-breach-Aadhaar-Act-leak-details-of-benefic.html" target="_blank"&gt;department&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shockingly, a &lt;a href="http://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1" target="_blank"&gt;report&lt;/a&gt; by  The Centre for Internet and Society (CIS) revealed that the Aadhaar  details along with demographic details and financial information of  around 135 million people in the country has been leaked by four  government portals. And this could just be the tip of the iceberg.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the public response to these revelations has been muted. The  government and the UIDAI, the authority behind Aadhaar, have retreated  behind the defence that only Aadhaar numbers have been leaked, and not  biometric details, and hence there is no major problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, experts warn that Aadhaar numbers by themselves pose a  sufficient risk when leaked, and that the UIDAI has been consistently  underplaying the risks of such leaks and overplaying the security of  biometric identification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amber Sinha, who co-authored the CIS report, points out that it’s not  just Aadhaar numbers that have been leaked on government websites, but  also demographic information as well as financial details. Various such  bits of data can be aggregated by fraudsters and used to steal  identities and commit financial fraud online or through phones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We see a lot of examples of social engineering techniques where  fraudsters collect data from various sources and impersonate people,” he  says. The report points out that one of the most common techniques is  to call persons impersonating bank officials requiring sensitive  information, and provide Aadhaar and demographic details to make the bid  for this information convincing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amber also points out that in online and phone verifications, it is  possible to impersonate other persons with such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Somebody can call the bank pretending to be me, and he could also  authenticate himself as me if he has all the data about me. The bank  will ask him some four questions and if he has all that information,  then the bank has no reason to believe that he is not me,” he explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Co-Founder of HasGeek, Kiran Jonnalagadda, an active voice on net  neutrality, freedom of speech and privacy, points out that one of the  main problems is that the Aadhaar system assumes biometric verification  in every transaction, but Aadhaar cards are often used as identity  documents without biometrics particularly for many non-financial  transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Somebody can apply for a SIM card with your Aadhaar number, and if  the place that is issuing the SIM card didn't do a biometric  verification then your card is good enough, because now they can do  anything they want in your name,” Kiran said. In such cases, he points  out, impersonation is almost ridiculously easy because the Aadhaar card,  just a colour printout with no security features, can be faked by  almost anyone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He points out that, particularly in cases of online verifications,  the problem of fraud is acutely heightened. “The thing is that if they  have your number and your demographic details, if the government does a  verification online, the details will match. Which means that the ID is  not fake. It's just that you didn't actually authorise any of this. In a  perfect world, everybody would do biometrics. The problem is that that  does not exist right now.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the major flaws of the current security practices of Aadhaar  is that the UIDAI only takes responsibility for the security of data  stored within its Central Identities Data Repository. However, explains  Amber, over the last five years, the UIDAI has proactively seeded  Aadhaar data across multiple government databases. However, the UIDAI  has not exercised strict disclosure controls on these government  databases, and there are no clear standards for publicity of  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS report points to the example of the Andhra Pradesh portal of  the NREGA, which carries information on Aadhaar numbers and disbursal  amounts on a simple text file, with no encryption or other security  measures. The report argues that this system could easily be exploited  to transfer illegal sums of money into these accounts, making  beneficiaries liable for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, Amber points out that the recent publications of Aadhaar  details cannot properly be called leaks. A leakage occurs, he points  out, when information is treated as secret and stored accordingly and  then breached from the outside or leaked by abusing access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Here the websites that we looked at are designed in such a way that  anybody without any technical knowledge can access information. They are  available for download as spreadsheets, how much simpler could it get?”  he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with the much-vaunted infallibility of biometric verification,  experts warn, there are some scarily large loopholes present. While the  UIDAI regularly goes to town with the claim that the biometric data  stored in the CIDR is well protected behind multiple firewalls,  detractors point out that biometric data collected at each transaction  point is not similarly secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other kinds of financial transactions such as card transactions ,  explains Amber, use two-factor authentication (a physical card and a pin  number or card details and an OTP, for instance). With Aadhaar,  however, authentication is possible with just biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is risky because biometric data is not duplication-proof. When  biometric data is collected for authentication, he says, there are ways  in which this data can be stored for re-use. “At the end of the day, the  way the biometric authentication works is by comparing two images.  There is a copy of an image which is collected at the time of enrolment  which is stored by the UIDAI, and every time you authenticate yourself  you give a fresh image. As far as the CIDR is concerned, it has nothing  to do with how that image is being created at that stage,” says Amber.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This can and has led to what is called a “replay attack”, where  stored biometric images are used to complete transactions without the  presence of the actual owner of the biometric data. This is what &lt;a href="https://scroll.in/article/830580/security-of-aadhaars-data-is-under-question-but-pointing-to-the-gaps-could-lead-to-a-police-case" target="_blank"&gt;happened&lt;/a&gt; in the case involving Axis Bank, Suvidha Infoserve and eMudhra in February.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such situations arise, says Kiran, because Aadhaar confuses two very  separate functions–authentication (establishing that I am who I am) and  authorisation (certifying that I want an action done in my name). “It’s  the difference between signing a cheque and showing a photo ID to prove  that you are who you are,” explains Kiran. The problem with biometrics  is that both processes are combined in one, and there is nothing to  verify that the person to whom the biometrics belongs to is actually  present for each transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the UIDAI has now proposed &lt;a href="http://zeenews.india.com/personal-finance/uidai-registration-for-all-aadhaar-authentication-devices-soon_1969917.html" target="_blank"&gt;registered&lt;/a&gt; and encrypted biometric devices to overcome this problem, some detractors &lt;a href="http://www.thenewsminute.com/article/response-nandan-nilekani-s-new-claims-aadhaar-60945" target="_blank"&gt;argue&lt;/a&gt; that a way around this is not impossible to find either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The larger problem is that the UIDAI constantly plays a game of  denial and catch up. They keep pretending like other people are stupid  and their system will never be broken. And other people keep pointing  out that they've forgotten the most obvious things about security in any  information system. They are currently in denial mode, where they  insist such things are not possible until after it happens, and then  they say oh it's happening, let's go do something to fix it,” Kiran  says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s more, Kiran and Amber point out that biometrics can even be  physically duplicated. On iris scans, Amber argues, “Now, with a lot of  CCTV cameras, if their resolution is high enough it is possible to  capture things like an iris scan. So the means for biometric  authentication can be used covertly, and that is a technological truth,”  he asserts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duplicating fingerprints, says Kiran is even easier, pointing out to  attendance fraud carried out by students of the Institute of Chemical  Technology in Mumbai. These students used a resin adhesive to make  copies of their fingerprints, which their friends used to give them  proxy attendance in the biometric attendance system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Lifting fingerprints is ridiculously easy. Anything you touch will  leave fingerprints on it. All it requires is some cello-tape to make a  copy of your fingerprints. And then you can apply some wax to it and you  get an actual impression of your finger. You can go place that on any  fingerprint reader and it'll be fooled,” says Kiran.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s not as if such duplication is not possible with devices like  credit cards. However, says Kiran, there are two key differences.  Firstly, credit card companies have built up elaborate checks and  balances over years to tackle fraud. Secondly, and far more importantly,  credit cards that have been compromised can be cancelled. “Revocability  is a feature in the credit card system. In Aadhaar you can't revoke  anything. If fraud happens, you are stuck with fraud for the rest of  your life,” explains Kiran.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe'&gt;https://cis-india.org/internet-governance/news/the-news-minute-rakesh-mehar-may-4-2017-why-aadhaar-leaks-should-worry-you-and-is-biometrics-really-safe&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T15:48:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you">
    <title>Why 'Facebook' is More Dangerous than the Government Spying on You</title>
    <link>https://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou looks at state and corporate surveillance in India and analyzes why our "choice" to hand over our personal data can potentially be more harmful than traditional, top-down, state surveillance. Read this article and perhaps reconsider your "choice" to use social networking sites, such as Facebook. &lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;&lt;i&gt;Do you have a profile on Facebook?&lt;/i&gt; Almost every time I ask this question, the answer is ‘yes’. In fact, I think the amount of people who have replied ‘no’ to this question can literally be counted on my right hand. But this is not an article about Facebook per se. It’s more about the ‘Facebooks’ of the world, and of people’s increasing “choice” to hand over their most personal data. More accurate questions are probably:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;“&lt;i&gt;Would you like the Government to go through your personal diary? If not, then why do you have a profile on Facebook?”&lt;/i&gt;&lt;/p&gt;

&lt;h2&gt;&lt;span&gt;&lt;b&gt;The Indian Surveillance State&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Following &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;Snowden&lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;’&lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;s&lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt; &lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;revelations&lt;/a&gt;&lt;/span&gt;, there’s finally been more talk about surveillance. But what is surveillance?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;David Lyon - who directs the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.sscqueens.org/"&gt;Surveillance&lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt; &lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt;Studies&lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt; &lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt;Centre&lt;/a&gt;&lt;/span&gt; - &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;defines&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;surveillance&lt;/a&gt;&lt;/span&gt; as &lt;i&gt;“any collection and processing of personal data, whether identifiable or not, for the purposes of influencing or managing those whose data have been garnered”&lt;/i&gt;. &lt;a href="http://www.polity.co.uk/book.asp?ref=9780745635910"&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance&lt;/span&gt;&lt;/a&gt; can also be defined as the monitoring of the behaviour, activities or other changing information of individuals or groups of people. However, this definition implies that individuals and/or groups of people are being monitored in a top-down manner, without this being their “choice”. But is that actually the case? To answer this question, let’s have a look at how the Indian government and corporations operating in India spy on us.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;State Surveillance&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The first things that probably come to mind when thinking about India from a foreigner’s perspective are poverty and corruption. Surveillance appears to be a “Western, elitist issue”, which mainly concerns those who have already solved their main survival problems. In other words, the most mainstream argument I hear in India is that surveillance is not a &lt;i&gt;real &lt;/i&gt;issue, especially since the majority of the population in the country lives below the line of poverty and does not even have any Internet access. Interestingly enough though, the other day when I was walking around a slum in Koramangala, I noticed that most people have Airtel satellites...even though they barely have any clean water!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The point though is that surveillance in India is a fact, and the state plays a rather large role in it. In particular, Indian law enforcement agencies follow three steps in ensuring that targeted and mass surveillance is carried out in the country:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. They create surveillance schemes, such as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Monitoring&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;System&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; (&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;)&lt;/a&gt;&lt;/span&gt;, which carry out targeted and/or mass surveillance&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. They create laws, guidelines and license agreements, such as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; 2008&lt;/a&gt;&lt;/span&gt;, which mandate targeted and mass surveillance and which require ISP and telecom operators to comply&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. They buy surveillance technologies from companies, such as CCTV cameras and spyware, and use them to carry out targeted and/or mass surveillance&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While Indian law enforcement agencies don’t necessarily follow these steps in this precise order, they usually try to create surveillance schemes, legalise them and then buy the gear to carry them out.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, surveillance in India is regulated under five laws: the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; 1885&lt;/a&gt;&lt;/span&gt;, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Office&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; 1898&lt;/a&gt;&lt;/span&gt;, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; 1933&lt;/a&gt;&lt;/span&gt;, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;section&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; 91 &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;of&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;the&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; 1973 &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;Code&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;of&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;Criminal&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;Procedure&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; (&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;CrPc&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;)&lt;/a&gt;&lt;/span&gt; and the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; 2008&lt;/a&gt;&lt;/span&gt;. These laws mandate targeted surveillance, but remain silent on the issue of mass surveillance which means that technically it is neither allowed nor prohibited, but remains a grey legal area.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While surveillance laws in India may not mandate mass surveillance, some of their sections are particularly concerning. Section 69 of the&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; 2008&lt;/a&gt;&lt;/span&gt; allows for the interception of all information transmitted through a computer resource, while requiring that all users disclose their private encryption keys or face a jail sentence of up to seven years. This appears to be quite bizarre, as individuals can only keep their data private and protect themselves from surveillance through encryption.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Section 44 of the Information Technology (Amendment) Act 2008 imposes stiff penalties on anyone who fails to provide requested information to authorities - which kind of reminds us of Orwell’s totalitarian regime in &lt;a href="http://www.ministryoflies.com/1984.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;“1984”&lt;/span&gt;&lt;/a&gt;. Furthermore, section 66A of the same law states that individuals will be punished for sending “offensive messages through communication services”. However, the vagueness of this section raises huge concerns, as it remains unclear what defines an “offensive message” and whether this will have grave implications on the freedom of expression. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;arrest&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;of&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;two&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;Indian&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;women&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;last&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;November&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;over&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;a&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;Facebook&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;post&lt;/a&gt;&lt;/span&gt; reminds us of this.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Laws in India may not mandate mass surveillance, but guidelines and license agreements issued by the Department of Telecommunications do. In particular, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;regarding&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Central&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;System&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;CMS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;) &lt;/a&gt;&lt;/span&gt;not only mandates mass surveillance, but also attempts to legalise a mass surveillance scheme which aims to intercept all telecommunications and Internet communications in India. Furthermore, the Department of Telecommunications has issued &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;numerous&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;guidelines&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;and&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;license&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;agreements&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;for&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;ISPs&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;and&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;telecom&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;operators&lt;/a&gt;&lt;/span&gt;, which require them to not only be “surveillance-friendly”, but to also enable law enforcement agencies to tap into their servers on the grounds of national security. And then, of course, there’s the new &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;National&lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;Cyber&lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;Security&lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;Policy&lt;/a&gt;&lt;/span&gt;, which mandates surveillance to tackle cyber-crime, cyber-terrorism, cyber-war and cyber-vandalism.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;As both a result and prerequisite of these laws, the Indian government has created various surveillance schemes and teams to aid them. In particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;India&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;’&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;s&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Computer&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Emergency&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Response&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Team&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; (&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;CERT&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;)&lt;/a&gt;&lt;/span&gt; is currently monitoring “any suspicious move on the Internet” in order to checkmate any potential cyber attacks from hackers. While this may be useful for the purpose of preventing and detecting cyber-criminals, it remains unclear how “any suspicious move” is defined and whether that inevitably enables mass surveillance, without individuals’ knowledge or consent.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Crime&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;and&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Criminal&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Tracking&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;and&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Network&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &amp;amp; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Systems&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; (&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;CCTNS&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;)&lt;/a&gt;&lt;/span&gt; is the creation of a nationwide networking infrastructure for enhancing the efficiency and effectiveness of policing and sharing data among 14,000 police stations across the country. It has been estimated that Rs. 2000 crore has been allocated for the CCTNS project and while it may potentially increase the effectiveness of tackling crime and terrorism, it raises questions around the legality of data sharing and its potential implications on the right to privacy and other human rights - especially if such data sharing results in data being disclosed or shared with unauthorised third parties.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Similarly, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;National&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt; &lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;Intelligence&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt; &lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;Grid&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt; (&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;NATGRID&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;)&lt;/a&gt;&lt;/span&gt; is an integrated intelligence grid that will link the databases of several departments and ministries of the Government of India so as to collect comprehensive patterns of intelligence that can be readily accessed by intelligence agencies. This was first proposed in the aftermath of the Mumbai 2008 terrorist attacks and while it may potentially aid intelligence agencies in countering crime and terrorism, enforced privacy legislation should be a prerequisite, which would safeguard our data from potential abuse.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;However, the most controversial surveillance scheme being implemented in India is probably the &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Monitoring&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;System&lt;/a&gt;&lt;/span&gt; (CMS). While several states, such as Assam, already have &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Systems&lt;/a&gt;&lt;/span&gt; in place, the Central Monitoring System appears to raise even graver concerns. In particular, the CMS is a system through which all telecommunications and Internet communications in India will be monitored by Indian authorities. In other words, the CMS will be capable of intercepting our calls and of analyzing our data on social networking sites, while all such data would be retained in a centralised database. Given that India currently lacks privacy legislation, such a system would mostly be unregulated and would pose major threats to our right to privacy and other human rights. Given that data would be centrally stored, the system would create a type of “honeypot” for centralised cyber attacks. Given that the centralised database would have massive volumes of data for literally a billion people, the probability of error in pattern and profile matching would be high - which could potentially result in innocent people being convicted for crimes they did not commit. Nonetheless, mass surveillance through the CMS is currently a reality in India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And the even bigger question: How can law enforcement agencies mine the data of 1.2 billion people? How do they even carry out surveillance in practice? Well, that’s where surveillance technology companies come in. In fact, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;surveillance&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;industry&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;in&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;India&lt;/a&gt;&lt;/span&gt; is massively expanding - especially in light of its new surveillance schemes which require advanced and sophisticated technology. According to &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;CIS&lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;’ &lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;India&lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;Privacy&lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;Monitor&lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;Map&lt;/a&gt;&lt;/span&gt; - which is part of ongoing research - Indian law enforcement agencies use CCTV cameras in pretty much every single state in India. The map also shows that Unmanned Aerial Vehicles (UAVs), otherwise known as drones, are being used in most states in India and the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;DRDO&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;’&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;s&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt; “&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;Netra&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;”&lt;/a&gt;&lt;/span&gt; - which is a lightweight drone, not much bigger than a bird - is particularly noteworthy.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;But Indian law enforcement agencies also buy surveillance software and hardware which is aimed at intercepting telecommunications and Internet communications. In particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt; &lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt;Technologies&lt;/a&gt;&lt;/span&gt; is an Indian company - based in Indore - which equips law enforcement agencies in India and around the world with &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;software&lt;/a&gt;&lt;/span&gt; which can probably be compared with the “notorious” FinFisher. So in short, there appears to be a tight collaboration between Indian law enforcement agencies and the surveillance industry, which can be clearly depicted in the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;trade&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;shows&lt;/a&gt;&lt;/span&gt;, otherwise known as “the wiretappers’ ball”.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Corporate Surveillance&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;When I ask people about corporate surveillance, the answer I usually get is: &lt;i&gt;“Corporations only care about their profit - they don’t do surveillance per se”&lt;/i&gt;. And while that may be true, &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;David&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;Lyon&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;’&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;s&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;definition&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;of&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;surveillance&lt;/a&gt;&lt;/span&gt; - as &lt;i&gt;“any collection and processing of personal data, whether identifiable or not, for the purposes of influencing or managing those whose data have been garnered” &lt;/i&gt;- may indicate otherwise.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Corporations, like Google, Amazon and Facebook, may not have an agenda for spying per se, but they do collect massive volumes of personal data and, in cases such as PRISM, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;allow&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;law&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;enforcement&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;to&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;tap&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;into&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;their&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;servers&lt;/a&gt;&lt;/span&gt;. Once law enforcement agencies get hold of data collected by companies, such as Facebook, they then use data mining software - equipped by various surveillance technology companies - to process and mine the data. And how do companies, like Google and Facebook, make money off our personal data? By selling it to big buyers, such as law enforcement agencies.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;So while Facebook and all the ‘Facebooks’ of the world may not profit from surveillance per se, they do profit from collecting our personal data and selling it to third parties, which include law enforcement agencies. And David Lyon argues that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;surveillance&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;involves&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;the&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;collection&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;of&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;personal&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;data&lt;/a&gt;&lt;/span&gt; - which corporations, like Facebook, do - for the purpose of influencing and managing individuals. While this last point can probably be  widely debated on, it is clear that corporations share their collected data with third parties, which ultimately leads to the influence or managing of individuals - directly or indirectly. In other words, the collection of personal data, in combination with its disclosure to third parties, &lt;i&gt;is&lt;/i&gt; surveillance. So when we think about companies, like Google or Facebook, we should not just think of businesses interested in their profit - but also of spying agencies. After all, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;“&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;if&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;the&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;product&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;is&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;free&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;, &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;you&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;are&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;the&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;product&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;”&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Now if we look at online corporations more closely, we can probably identify three categories:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. Websites through which we &lt;i&gt;buy products &lt;/i&gt;and hand over our personal details - e.g. Amazon&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. Websites through which we &lt;i&gt;use services&lt;/i&gt; and hand over our personal details - e.g. flight ticket&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. Websites through which we &lt;i&gt;communicate&lt;/i&gt; and hand over our personal details - e.g. Facebook&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And why could the above be considered “spying” at all? Because such corporations collect massive volumes of personal data and subsequently:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;Disclose&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;such&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;data&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;to&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;law&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;enforcement&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;agencies&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;Allow&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;law&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;enforcement&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;agencies&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;to&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;tap&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;into&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;their&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;servers&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Sell such data to “third parties”&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;What’s notable about so-called corporate surveillance is that, in all cases, there is a mutual, key element: we &lt;i&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;consent&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;to&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;the&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;handing&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;over&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;of&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;our&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;personal&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;information&lt;/a&gt;&lt;/span&gt;. We are not forced to hand over our personal data when buying a book online, booking a flight ticket or using Facebook. Instead, we “choose” to hand over our personal data in exchange for a product or service. Now what significantly differentiates state surveillance to corporate surveillance is the factor of &lt;i&gt;“choice”&lt;/i&gt;. While we may choose to hand over our most personal details to large online corporations, such as Google and Facebook, we do not have a choice when the government monitors our communications, collects and stores our personal data.&lt;/p&gt;

&lt;h2 align="JUSTIFY"&gt;&lt;span&gt;&lt;b&gt;State Surveillance &lt;/b&gt;&lt;/span&gt;&lt;i&gt;&lt;b&gt;vs.&lt;/b&gt;&lt;/i&gt;&lt;span&gt;&lt;b&gt; Corporate Surveillance&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Both Indian law enforcement agencies and corporations collect massive volumes of personal data. In fact, it is probably noteworthy to mention that Facebook, in particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;collects&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; 20 &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;times&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;more&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;data&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;per&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;day&lt;/a&gt;&lt;/span&gt; than the NSA in total. In addition, Facebook has &lt;a href="http://www.ft.com/cms/s/0/7536d216-0f36-11e3-ae66-00144feabdc0.html#axzz2jDSrZPHv"&gt;&lt;span style="text-decoration: underline;"&gt;claimed&lt;/span&gt;&lt;/a&gt; that it has received more demands from the US government for information about its users than from all other countries combined. In this sense, the corporate collection of personal data can potentially be more harmful than government surveillance, especially when law enforcement agencies are tapping into the servers of companies like Facebook. After all, the Indian government and all other governments would have very little data to analyse if it weren’t for such corporations.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance is not just about “spying” or about “watching people” - it’s about much much more. Observing people’s behaviour only really becomes harmful when the data observed is collected, retained, analysed, shared and disclosed to unauthorised third parties. In other words, surveillance is meaningful to examine because it involves the &lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;analysis&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt; &lt;/a&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt;of&lt;/a&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt; &lt;/a&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt;data&lt;/a&gt;&lt;/span&gt;, which in turn involves &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;pattern&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;matching&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;profiling&lt;/a&gt;&lt;/span&gt;, which can potentially have actual, real-world implications - good or bad. But such analysis cannot be possible without having access to large volumes of data - most of which belong to large corporations, like Facebook. The question, though, is: How do corporations collect such large volumes of personal data, which they subsequently share with law enforcement agencies? Simple: Because &lt;i&gt;we “choose”&lt;/i&gt; to hand over our data!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Three years ago, when I was doing research on young people’s perspective of Facebook, all of the interviewees replied that they feel that they are in control of their personal data, because they “choose” what they share online. While this may appear to be a valid point,  the “choice” factor can widely be debated on. There are many reasons why people “choose” to hand over their personal data, whether to buy a product, use a service, to communicate with peers or because they feel socially pressured into using social networking sites. Nonetheless, it all really comes down to one main reason: &lt;a href="http://edition.cnn.com/2010/TECH/04/14/oppmann.off.the.grid/"&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;convenience&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;. Today, in most cases, the reason why we hand over our personal data online in exchange for products or services is because it is simply more convenient to do so. And while that is understandable, at the same time we are exposing our data (and ultimately our lives) in the name of convenience.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The irony in all of this is that, while many people reacted to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;Snowden&lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;’&lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;s&lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt; &lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;revelations&lt;/a&gt;&lt;/span&gt; on NSA dragnet surveillance, most of these people probably have profiles on Facebook. Secret, warrantless government surveillance is undeniably intrusive, but in the end of the day, our profiles on Facebook - and on all the ‘Facebooks’ of the world - is what enabled it to begin with. In other words, if we didn’t choose to give up our personal data - especially without really knowing how it would be handled - large databases would not exist and the NSA - and all the ‘NSAs’ of the world - would have had a harder time gathering and analysing data.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, the main difference between state and corporate surveillance is that the first is imposed in a top-down manner by authorities, while the second is a result of our “choice” to give up our data. While many may argue that it’s worse to have control imposed on you, I strongly disagree. When control and surveillance are imposed on us in a top-down manner, it’s likely that we will perceive this - sooner or later - as a &lt;i&gt;direct&lt;/i&gt; threat to our human rights, which means that it’s likely that we will resist to it at some point. People usually react to what they perceive as a direct threat, whereas &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;they&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;rarely&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;react&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;to&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;what&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;does&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;not&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;directly&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;affect&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;them&lt;/a&gt;&lt;/span&gt;. For example, one may perceive murder or suicide as a direct threat due the immediateness of its effect, whereas smoking may not be seen as an equally direct threat, because its consequences are indirect and can usually be seen in the long term. It’s somehow like that with surveillance.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;University&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;students&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;have&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;protested&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;on&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;streets&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;against&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;installation&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;CCTV&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;cameras&lt;/a&gt;&lt;/span&gt;, but how many of them have profiles on social networking sites, such as Facebook? People may react to the installation of CCTV cameras, because it may appear as a direct threat to their right to privacy. However, the irony is that the real danger does not necessarily lie within some CCTV cameras, but rather within the profile of each person on a major commercial social networking site. At very best, a CCTV camera will capture some images of us and through that, track our location and possibly our acquaintances. What type of data is captured through a simple, “harmless” Facebook profile? The following probably only includes a tiny percentage of what is actually captured:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Personal photos&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Biometrics (possibly through photos)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Family members&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Friends and acquaintances&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Habits, hobbies and interests&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Location (through IP address)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Places visited&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Economic standing (based on pictures, comments, etc.)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Educational background&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Ideas and opinions (which may be political, religious, etc.)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Activities&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Affiliations&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The above list could potentially go on and on, probably depending on how much - or what type - of data is disclosed by the individual. The interesting element to this is that &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;we&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;can&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;never&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;really&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;know&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;how&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;much&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;data&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;we&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;are&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;disclosing&lt;/a&gt;&lt;/span&gt;, even if we think we control it. While an individual may argue that he/she chooses to disclose an x amount of data, while retaining the rest, that individual may actually be disclosing a 10x amount of data. This may be the case because usually every bit of data hides lots of other bits of data, that we may not be aware of. &lt;i&gt;It all really comes down to who is looking at our data, when and why.&lt;/i&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For example, (fictional) Priya may choose to share on her Facebook profile (through photos, comments, or any other type of data) that she is female, Indian, a Harvard graduate and that her favourite book is &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;“&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;Anarchism&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt; &lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;and&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt; &lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;other&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt; &lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;Essays&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;”&lt;/a&gt;&lt;/span&gt; by Emma Goldman. At first glance, nothing appears to be “wrong” with what Priya is revealing and in fact, she appears to care about her privacy by not revealing “the most intimate details” of her life. Moreover, one could argue that there is absolutely nothing “incriminating” about her data and that, on the contrary, it just reflects that she is a “shiny star” from Harvard. However, I am not sure if a data analyst would be restricted to this data and if data analysis would show the same “sparkly” image.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In theory, the fact that Priya is an Indian who attended Harvard reveals another bit of information, that Priya did not choose to share: her economic standing. Given that the majority of Indians live below the line of poverty, there is a big probability that Priya belongs to India’s middle class - if not elite. Priya may not have intentionally shared this information, but it was indirectly revealed through the bits of data that she did reveal: female Indian and Harvard graduate. And while there may not be anything “incriminating” about the fact that she has a good economic standing, in India this usually means that there’s also some strong political affiliation. That brings us to her other bit of information, that her favourite author is a feminist, anarchist. While that may be viewed as indifferent information, it may be crucial depending on the specific political actors in the country she’s in and on the general political situation. If a data analyst were to map the data that Priya chose to share, along with all her friends and acquaintances that she inevitably has through Facebook, that data analyst could probably tell a story about her. And the concerning part is that that story may or may not be true. But that doesn’t really matter.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Today, governments don’t judge us and take decisions based on our version of our data, but&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;based&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;on&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;what&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;our&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;data&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;says&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;about&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;us&lt;/a&gt;&lt;/span&gt;. And perhaps, under certain political, social and economic circumstances, our “harmless” data could be more incriminating than what we think. While an individual may express strong political views within a democratic regime, if that political system were to change in the future and to become authoritarian, that individual would possibly be suspicious in the eyes of the government - to say the least. This is where data retention plays a significant role.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Most companies &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;retain&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;data&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;indefinitely&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;or&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;for&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;a&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;long&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;period&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;time&lt;/a&gt;&lt;/span&gt;, which means that future, potentially less-democratic governments may have access to it. And the worst part is that we can never really know what data is being held about us, because within data analysis, &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;every&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;bit&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;data&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;may&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;potentially&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;entails&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;various&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;other&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;bits&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;data&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;that&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;we&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;are&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;not&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;even&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;aware&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/spy-files-three"&gt;of&lt;/a&gt;&lt;/span&gt;. So, when we “choose” to hand over our data, we don’t necessarily know what or how much we are choosing to disclose. Thus, this is why I agree with Bruce Schneier’s argument that people have an &lt;i&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;illusionary&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;sense&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;of&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;control&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/a&gt;over their personal data.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;Social&lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt; &lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;network&lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt; &lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;analysis&lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt; &lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;software&lt;/a&gt;&lt;/span&gt; is specifically designed to mine huge volumes of data that is collected through social networking sites, such as Facebook. Such software is specifically designed to profile individuals, to create “trees of communication” around them and to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.scs.ryerson.ca/~bgajdero/research/Malta08.pdf"&gt;match&lt;/a&gt;&lt;a href="http://www.scs.ryerson.ca/~bgajdero/research/Malta08.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.scs.ryerson.ca/~bgajdero/research/Malta08.pdf"&gt;patterns&lt;/a&gt;&lt;/span&gt;. In other words, this software tells a story about each and every one of us, based on our activities, interests, acquaintances, and all other data. And as mentioned before, such a story may or may not be true.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In data mining, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.sagepub.com/upm-data/40006_Chapter1.pdf"&gt;behavioural&lt;/a&gt;&lt;a href="http://www.sagepub.com/upm-data/40006_Chapter1.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.sagepub.com/upm-data/40006_Chapter1.pdf"&gt;statistics&lt;/a&gt;&lt;/span&gt; are being used to analyse our data and to predict how we are likely to behave. When applied to national databases, this may potentially amount to predicting how masses or groups within the public are likely to behave and to subsequently control them.  If a data analyst can predict an individual’s future behaviour - with some probability - based on that individuals’ data, the same could potentially occur on a mass, public level.  As such, the danger within surveillance - especially corporate surveillance through which we&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;voluntarily&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;disclose&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;massive&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;amounts&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;of&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;data&lt;/a&gt;&lt;/span&gt; about ourselves - is that it appears to come down to &lt;i&gt;public control&lt;/i&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to security expert Bruce Schneier, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;data&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;today&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;is&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;a&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;byproduct&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;of&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;the&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;Information&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;Society&lt;/a&gt;&lt;/span&gt;.  Unlike an Orwellian totalitarian state where surveillance is imposed in a top-down manner, surveillance today appears to widely exist because we indirectly choose and enable it (by handing over our data to online companies), rather than it being imposed on us in a solely top-down manner. However, contemporary surveillance may potentially be far worse than that described in Orwell’s “1984”, because surveillance is publicly perceived to be an &lt;i&gt;indirect &lt;/i&gt;threat - if considered to be a threat at all. It is more likely that people will resist a direct threat, than an indirect threat, which means that the possibility of mass violations of human rights as a result of surveillance is real.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Hannah Arendt argued that a main prerequisite and component of totalitarian power is &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;support&lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt; &lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;by&lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt; &lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;the&lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt; &lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;masses&lt;/a&gt;&lt;/span&gt;. Today, surveillance appears to be socially integrated within societies which indicates that contemporary power fueled by surveillance has mass support. While the argument that surveillance is being socially integrated can potentially be widely debated on and requires an entire in depth research of its own, few simple facts might be adequate to prove it at this stage. Firstly, &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;CCTV&lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/cisprivacymonitor"&gt;cameras&lt;/a&gt;&lt;/span&gt; are installed in most countries, yet there has been very little resistance - on the contrary, there appears to be a type of universal acceptance on the grounds of security. Secondly, different types of spy products exist in the market - such as &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;Spy&lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt; &lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;Coca&lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt; &lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;Cola&lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt; &lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;cans&lt;/a&gt;&lt;/span&gt; - which can be purchased by anyone online. Thirdly, countries all over the world carry out controversial surveillance schemes - such as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt;Central&lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt; &lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt; &lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt;System&lt;/a&gt;&lt;/span&gt; in India - yet public resistance to such projects is limited. And while one may argue that the above cases don’t necessarily prove that surveillance is being socially integrated, it would be interesting to look at a fourth fact: most people who have Internet access &lt;i&gt;choose &lt;/i&gt;to share their personal data through the use of social networking sites.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Reality shows, such as Big Brother, which broadcast the surveillance of people’s lives and present it as a form of entertainment - when actually, I think it should be worrisome - appear to enable the social integration of surveillance. The very fact that we all probably - or, hopefully - know that Facebook can share our personal data with unauthorised third parties and - now, after the Snowden revelations - that governments can tap into Facebook’s servers, should be enough to convince us to delete our profiles. Yet, why do we still all have Facebook profiles? Perhaps because surveillance is socially integrated and perhaps because it is just &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;convenient&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;to&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;be&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;on&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;Facebook&lt;/a&gt;&lt;/span&gt;. But that doesn’t change the fact that surveillance can potentially be a threat to our human rights. It just means that we perceive surveillance as an indirect threat and that we are unlikely to react to it.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In the long term, what does this mean? Well, it seems like we will probably be &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;more&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;acceptive&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;towards&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;more&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;authoritarian&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;power&lt;/a&gt;&lt;/span&gt;, that we will be used to the idea of censoring our own thoughts and actions (in the fear of getting caught by the CCTV camera on the street or the spyware which may or may not be implanted in our laptop) and that ultimately, we will be less politically active and more reluctant to challenge the authority.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;What’s particularly interesting though about surveillance today is that it is fueled and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;enabled&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;through&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;our&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;freedom&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;of&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;speech&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;and&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;general&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;Internet&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;freedom&lt;/a&gt;&lt;/span&gt;. If we didn’t have any Internet freedom - or as much as we do - we would have disclosed less personal data and thus surveillance would probably have been more restricted. The more Internet freedom we have, the more personal data we will disclose on Facebook - and on all the ‘Facebooks’ of the world - and the more data will potentially be available to mine, analyse, share and generally incorporate in the surveillance regime. So in this sense, Internet freedom appears to be a type of prerequisite of surveillance, as contradictory and ironic as it may seem. No wonder why the Chinese government has gone the extra mile in creating the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;Chinese&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;versions&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;of&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;Facebook&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;and&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;Twitter&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;/span&gt;- it’s probably no coincidence.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While we may blame governments for establishing surveillance schemes, ISP and TSP operators for complying with governments’ license agreements which often mandate that they create backdoors for spying on us and security companies for creating the surveillance gear in the first place, in the end of the day, we are all equally a part of this mess. If we didn’t &lt;i&gt;choose &lt;/i&gt;to hand over our personal data to begin with, none of the above would have been possible.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The real danger in the Digital Age is not necessarily surveillance per se, but our &lt;i&gt;choice&lt;/i&gt; to voluntarily disclose our personal data.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you'&gt;https://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-23T08:38:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/whose-data-is-it">
    <title> Whose Data is it Anyway?</title>
    <link>https://cis-india.org/internet-governance/whose-data-is-it</link>
    <description>
        &lt;b&gt;Tactical Technology Collective and the Centre for Internet &amp; Society invite you to the second round of discussions of the Exposing Data Series at the CIS office in Bangalore on 24 January 2012. Siddharth Hande and Hapee de Groot will be speaking on this occasion.&lt;/b&gt;
        
&lt;p&gt;Like countless others, this title is a convenient adaptation of a 1972 play by Brian Clark, Whose Life is it Anyway?, a meditation on 'euthanasia' and the extent to which governments or the law can determine the private life of an individual. In a similar sense we use the title to help frame the second set of conversations in the Exposing Data Series, to zero in on the idea of data and who has the right to decide what happens with it. Philosophically, and also at the level of code, computing and the law, the ownership of data can be a somewhat odd and a contentious thing to grapple with. The only other understandings of 'ownership' we really have are those of property and identity and these get imputed onto the intangibility of data. And, in some senses now, many aspects of one's identity exist as data.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are a range of experiences of data ownership that we talk about and experience daily. On the one hand you can hoard hard disks with favourite content to retrieve memories and experiences. On the other end of things, you can aggregate your experiences and memories with that of thousands of others, that then gets treated almost like a private hard disk belonging to some mysterious X. Who is this Mysterious X? Is there a Y? Or an XY? What is the trajectory of data in its movement from the individual to a larger, shadowy infrastructure that harvests it? What happens to our idea of data in its reconfiguration from intangible code to an idea of politics and rights? To introduce another provocation, do our existing ideas of data ownership objectify individuals? What does this objectification imply for the notion of personal privacy? For example, does the fetishization of 'things' called data obfuscate the idea of personal privacy?&lt;/p&gt;
&lt;p&gt;One of the ways in which we may consider looking at open data initiatives for transparency and accountability is to assess it as discourse, and in relation to what happens when communities aggregate data. Open Government Data usually involves a top-down approach in terms of how it is aggregated, collated, shared, whilst community based approaches are more particular, contextual and local. What do these different approaches give us when we bring them to the same table?&lt;/p&gt;
&lt;p&gt;The second event in the Exposing Data Series will focus on data ownership, looking into open government data and community-based data aggregation, to explore the various levels of data collection, the movement of data and its exchange, its representation, and dissemination in different contexts.&lt;/p&gt;
&lt;h2&gt;Speakers&lt;br /&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;Siddharth Hande, Transparent Chennai&lt;/li&gt;&lt;li&gt;Hapee de Groot, Hivos, Netherlands&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;This event is free and open to everyone. However, we would appreciate a confirmation of attendance ahead of time so as to ensure that your space is reserved. To confirm your attendance please write to:&amp;nbsp; &lt;a class="external-link" href="mailto:yelena.gyulkhandanyan@gmail.com"&gt;yelena.gyulkhandanyan@gmail.com &lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Photo Source:&lt;a class="external-link" href="http://www.freedigitalphotos.net/images/view_photog.php?photogid=2000"&gt; http://www.freedigitalphotos.net/images/view_photog.php?photogid=2000&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.freedigitalphotos.net/images/view_photog.php?photogid=2000"&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLsxhgA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxhgA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLsxj8A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxj8A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLsxwAA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxwAA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLsxxUA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxxUA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/whose-data-is-it'&gt;https://cis-india.org/internet-governance/whose-data-is-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-04-28T04:12:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy_wholebodyimagingcomparison">
    <title>Whole Body Imaging and Privacy Concerns that Follow </title>
    <link>https://cis-india.org/internet-governance/blog/privacy_wholebodyimagingcomparison</link>
    <description>
        &lt;b&gt;Law student at the National University of Juridical Sciences, and intern for Privacy India, Srishti Goyal compares, contrasts, and critiques the Whole Body Imaging practices found in the US, the UK, and Australia, and makes recommendations for an Indian regime. &lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Whole Body Imaging has been introduced in many countries in light of growing security concerns, two examples in particular being&amp;nbsp; the attack on the twin towers in USA, and what is commonly known as the Christmas Bomb (A man by the name of Umar Farouk Abdulmutallab tried to detonate a bomb on a flight from Amsterdam as it was about to land in Detroit.) Despite the security concerns that have motivated the implementation of Whole Body Imaging, there are also many concerns that have prevented the full fledged application of this technology. Opponents to the technology have stated that the full body scanner would expose travelers to harmful radiation and is thus a health hazard. Others have stated that these digital strip searches (as they are popularly known) will violate child pornography laws. Some, who are trying to encourage the use of full body scanners, are of the opinion that it is better to opt for a whole body scan as the “pat down” searches are more invasive in nature. There are also the concerns that persons may be singled out on the basis of their color and ethnicity. The scope of research for this particular paper is limited to the extent of the privacy concerns that have arisen in light of the use of the technology in order to achieve better security. The question that forms the crux of the debate is: should ones personal privacy be compromised in order to ensure security for one and all? The primary reason why whole body scanners are said to breach privacy is because of the invasive nature of the images produced, which can be detailed enough to show genitalia of the person being scanned.&lt;br /&gt;Learning from the experience of other nations that have already implemented the use of Whole Body Imaging” we can decide what policies India should have in place and most importantly whether or not India realistically has a use for this technology. &lt;br /&gt;Adequate privacy, it is said, is obtained when the restriction on access to persons and personal information allows a person not to be subjected to intrusion and public exposure [&lt;a href="#1"&gt;1&lt;/a&gt;]. Full body scanners can be called intrusive because in effect they allow the government to carry out strip searches by using technology to remove clothes instead of physically doing the same. Apart from this there are other concerns. For instance there have been instances when these images have been saved and have been uploaded on the internet [&lt;a href="#2"&gt;2&lt;/a&gt;]. In Lagos these images have been used as pornographic material. There is also a cause of concern amongst transgender who do not feel comfortable in revealing their gender which is different from the gender that they portray[&lt;a href="#3"&gt;3&lt;/a&gt;] and they are of the opinion that this information could lead to harassment. Since the scanners can detect medical equipment people who use colostomy bags and catheters which are otherwise hidden may find these scans embarrassing [&lt;a href="#4"&gt;4&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;USA&lt;/h3&gt;
&lt;p&gt;In the U.S, Whole Body Imaging was introduced in light of the growing concerns with regard to security at airports and terrorist attacks. The Transportation Security Administration is responsible for monitoring security at the airport. The TSA has thus introduced Full Body Scanners at airports. In order to address the privacy concerns that have been raised the TSA has taken the following steps:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Ensuring that the Security officer who is privy to the scan is not the same as the officer interacting with the person who is being scanned. &lt;/li&gt;&lt;li&gt;The TSA has also stated that personally identifiable information will not be stored and distributed.[&lt;a href="#5"&gt;5&lt;/a&gt;] &lt;/li&gt;&lt;li&gt;Another step towards safeguarding the privacy of the passengers has been to blur the faces of the person being scanned.[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Though the TSA has taken various steps to ensure the privacy of individuals, one can argue that these measures are not without loopholes. The fact that the Security Officer looking at the scan and the Security officer handling the passenger are different does not do away with this invasion of privacy. There is also the added concern that these images may be uploaded on the internet, which in fact has already been done. The release and collection of these images is in contravention of the Privacy Act of 1974 that governs the collection, maintenance, use and dissemination of personal identifiable information about individuals which in the possession of the federal agencies. The TSA assures that the images will not be retained, but the fact is that the machines have been programmed such as to enable retention of images, if the same has been disable, it can be tampered with. Lastly, on the point of blurring of faces, it is a software fix and can be undone as easily as the application of the software. The TSA in its Privacy impact Assessment report had listed down that full body scanning would initially be a secondary screening measure. What this means is that everyone goes through one level of security screening and if one is randomly selected or the security has reason to suspect a passenger, the passenger can be called for a second level of screening. At which point the passengers will undergo full body scanning.&lt;br /&gt;&amp;nbsp;A federal judge in California, in 1976 said that the laws of privacy “encompass the individual's regard for his own dignity; his resistance to humiliation and embarrassment; his privilege against unwanted exposure of his nude body and bodily functions." As already stated, these body scanners lead to situations that can be embarrassing, do lead to unwanted exposure of body, and can lead to situation where the person scanned could be humiliated (as in the case of transgender and other persons with catheters and colostomy bags). The Electronic Privacy Information Center is a non-profit group that was established to focus attention on civil liberties issue. EPIC challenged the constitutional validity of full body scanning, claiming that the same violated the fourth amendment [&lt;a href="#9"&gt;9&lt;/a&gt;]. The amendment guards against unlawful searches and seizures. In the case of whole body imaging, travelers are subjected to “invasive searches” without any suspicion that they did anything wrong, and without being informed of&amp;nbsp; the reason he/she is being subjected to a search of such a nature. [&lt;a href="#10"&gt;10&lt;/a&gt;]&amp;nbsp; The latest is the use of this technology in courthouses in Florida and at train stations.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;UK&lt;/h3&gt;
&lt;p&gt;In the UK if a passenger is selected for full body scanning, the passenger must comply [&lt;a href="#11"&gt;11&lt;/a&gt;]. The passenger is forbidden from flying if he or she refuses to the scanning process and cannot ask for an alternate screening process [&lt;a href="#12"&gt;12&lt;/a&gt;]&amp;nbsp; Unlike the US in the UK the option of a pat-down search is not available. The steps taken to protect the privacy of the passengers are the same as practiced in the US.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The images of the passengers are not retained &lt;/li&gt;&lt;li&gt;The images are produce in such a manner that the Security officer cannot recognize the person.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;A major concern in UK is the violation of child pornography laws that do not allow the creation of indecent images of a child. However, a rule that would have exempted persons under the age of 18 from full body scans was overturned by the government in the UK [&lt;a href="#13"&gt;13&lt;/a&gt;]. Gordon Brown the Prime Minister of UK in 2010 gave permission for the use of full body scanners at the airports. BAA Ltd, which operates six airports in UK (including the Heathrow Airport) has undertaken the installation of these scanners at its airports. In general, the security at the airports comes under the ambit of the Homeland Security and the department will be supervising the installation of the machines. Lord Adonis, the Transport Secretary, confirmed the new policy in a written parliamentary statement, saying that the scanners would help security staff to detect explosives or other dangerous items [&lt;a href="#14"&gt;14&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;One of the major opponents of Whole Body Imaging has been the Equality and Human Right Commission (EHRC), which is of the opinion that the use of this technology would breach the privacy rules under the Human Rights Act [&lt;a href="#15"&gt;15&lt;/a&gt;].&amp;nbsp; The move to use this technology has raised concerns about the excessive collection of personal data. Big Brother Watch, a campaign that fights intrusion on privacy and protects liberties of people, started an online movement that opposes and raises concerns with full body scanning. It has also listed down all the airports around the world that are using (or are going to be using) this technology [&lt;a href="#16"&gt;16&lt;/a&gt;].&amp;nbsp; The only group that has openly welcomed this move of the government has been the Liberal Democrats [&lt;a href="#17"&gt;17&lt;/a&gt;]. The British Department of Transport has published an Interim Code of Practice covering the privacy, health and safety, data protection and equality issues associated with the use of body scanners. The Code calls for the implementation of detailed security standards and for an effective privacy policy to be put in place by airport operators.&lt;/p&gt;
&lt;p&gt;The privacy policy should include as a minimum:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;rules regarding the location of the equipment;&lt;/li&gt;&lt;li&gt;&amp;nbsp;A process for identifying who will read the screen (i.e., a person of the same sex as the person selected for scanning);&lt;/li&gt;&lt;li&gt;A process for selecting passengers (passengers must not be selected on the basis of personal characteristics such as, gender, age, race or ethnic origin);&lt;/li&gt;&lt;li&gt;Prohibition on copying or transferring the images in any way;&lt;/li&gt;&lt;li&gt;Instructions for the images of the passenger to be destroyed and rendered irretrievable once the image has been analyzed; and&lt;/li&gt;&lt;li&gt;A process to call on an appropriate Security Officer if an image suggests there is a viable threat to passenger or staff security.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The BodyScanner Task Force was established by the European Commission to publish an impact assessment report and to advise the commission, but the task force has yet to publish its report with specific legislative proposals [&lt;a href="#18"&gt;18&lt;/a&gt;].&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Concerns in the UK also arose in light of a response of a judge to a complaint by the Electronic Privacy Information Centre (based in Washington). The judge stated that the Department of Homeland Security (USA) would be allowed to keep images of individuals screened at the airport [&lt;a href="#19"&gt;19&lt;/a&gt;]. This raises concerns amongst activists as to which images can and which images cannot be saved by the airport authorities.&lt;/p&gt;
&lt;h3&gt;Australia&lt;/h3&gt;
&lt;p&gt;Post the attempted attack on Christmas Day, pressure on countries such as Australia increased to make use of whole body imaging technology. However, the Association of Asia Pacific Airliners, an association of the international carriers servicing in Australia, criticised the use of full body scanners [&lt;a href="#20"&gt;20&lt;/a&gt;]. Apart from the privacy concerns, that people all over the world share, another aspect that is cause for concern in Australia is the increase in traveling cost. The machines used for whole body imaging is extremely expensive, and thus the question posed time and again in Australia is if it will be economically viable to make use of this technology?[&lt;a href="#21"&gt;21&lt;/a&gt;] The Queensland Council for civil liberties has opposed the use of this Advance Imaging Technology (AIT) and has stated that passengers should be allowed to refuse being scanned and should be allowed to opt for a pat down. Kevin Rudd (the Prime Minister of Australia at the time of implementation of this technology) had taken note of the privacy concerns and assured that such measure would be undertaken that would mitigate these concerns. Currently, Body scanners are installed at the international airports in Australia. The transport minister has said that the images produced would be stick figures and not naked images [&lt;a href="#22"&gt;22&lt;/a&gt;]. This move has been taken in light of the back clash that body scanners faced in the USA. Changes regarding whole body imaging have been referred to the Privacy Commissioner in order to ensure that privacy is not intruded. Namely, Full Body screening will not be applied to all the passengers - instead passengers will either be randomly selected or will be selected on the basis of their profiles [&lt;a href="#23"&gt;23&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;India&lt;/h3&gt;
&lt;p&gt;Currently in India whole body scanners can be found at the Delhi International Airport [&lt;a href="#24"&gt;24&lt;/a&gt;]. Thus, debate and discussion about the use of these scanners has not gained much momentum in India. It would be advisable that when framing legislation or guidelines to govern full body scanners, India incorporates the experiences of other nations who have already started the use of this technology.&lt;/p&gt;
&lt;p&gt;Generally speaking it seems as though the use of a full body scanner would not be recommendable for the Indian scenario. It has already been seen that these scans are not very effective in detecting plastic and fluids [&lt;a href="#25"&gt;25&lt;/a&gt;]. Additionally the scanner only shows objects that are on the body and not in the body. Thus, the effectiveness of these scanners is questionable (especially considering it cannot detect plastics and light fluids) [&lt;a href="#26"&gt;26&lt;/a&gt;]. Additionally, in India the demographic using these scanners would be very different from the people using these scanners in other countries. For instance, it has been pointed out that the interest of Muslim women has not been taken into account when introducing this method of screening. Apart from personal privacy issues there are religious issues that arise, and though the instances of the same maybe far apart in other nations, in India the same will act as a hindrance on a daily basis. If not dealt with delicately this can be a major cause of concern that will have far reaching ramifications. Furthermore, one cannot stress enough the cost that will be involved with the implementation of these scanners. These scanners are extremely expensive and require trained Security Officers to operate them.&amp;nbsp; Additionally, what the scanners seek to accomplish can be achieved by insuring that the pat-downs are carried out properly. But there is a caveat that must be mentioned here. In US, one is allowed to choose between a pat-down and a body scanner. There have been instances when these pat-downs have been more intrusive than the body scanners. Thus, there should be guidelines in place as to how these pat-downs should be carried out. The guidelines should specify actions that the Security Officials would not be allowed to carry out.&lt;/p&gt;
&lt;p&gt;Lastly, even if India decided to adopt the full body scanners, considering it helps save time and takes only 15 seconds to complete, it should not be used as a primary screening method.&amp;nbsp; Hypothetically, if body scanners are used as a secondary screening process, alternate screening processes should be available if the passenger does not wish to subject himself/ herself to the scan. But then the question is why should the government invest so much in an expensive technology which the passengers can easily avoid?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Bibliography:&lt;/h3&gt;

&lt;p&gt;&amp;nbsp;&lt;br /&gt;&lt;a name="1"&gt;[1].A Companion to Philosophy of Law and Legal Theory, Constitutional Law and Privacy, Anita. L. Allen Pg 147.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="2"&gt;[2]&lt;/a&gt;&lt;a href=".http://gizmodo.com/5690749/these-are-the-first-100-leaked-body-scans"&gt;.http://gizmodo.com/5690749/these-are-the-first-100-leaked-body-scans.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="3"&gt;[3]&lt;/a&gt;.&lt;a href="http://www.airlinereporter.com/2010/08/we-do-not-have-all-the-same-body-parts-and-body-scanners-violates-your-privacy/"&gt; Available at http://www.airlinereporter.com/2010/08/we-do-not-have-all-the-same-body-parts-and-body-scanners-violates-your-privacy/.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="4"&gt;[4]&lt;/a&gt;&lt;a href=".http://www.aclu.org/technology-and-liberty/aclu-backgrounder-body-scanners-and-virtual-strip-searchers"&gt;.http://www.aclu.org/technology-and-liberty/aclu-backgrounder-body-scanners-and-virtual-strip-searchers.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="5"&gt;[5]&lt;/a&gt;.&lt;a href="http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_tsa_wbi.pdf"&gt;Privacy impact assessment report. Available at - http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_tsa_wbi.pdf.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="6"&gt;[6]&lt;/a&gt;&lt;a href="http://www.aclu.org/technology-and-liberty/aclu-backgrounder-body-scanners-and-virtual-strip-searches"&gt;.http://www.aclu.org/technology-and-liberty/aclu-backgrounder-body-scanners-and-virtual-strip-searches.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="7"&gt;[7].&lt;/a&gt;&lt;a href="http://travel.usatoday.com/flights/2010-07-13-1Abodyscans13_ST_N.htm"&gt;http://travel.usatoday.com/flights/2010-07-13-1Abodyscans13_ST_N.htm .&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="8"&gt;[8]&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/"&gt;.http://www.stopdigitalstripsearches.org/.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="9"&gt;[9].&lt;/a&gt;&lt;a href="http://epic.org/privac/airtravel/backscatter/"&gt; http://epic.org/privac/airtravel/backscatter/.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;[10]&lt;/a&gt;&lt;a href="http://www.dailymail.co.uk/news/article-2012249/TSA-scanners-catch-implant-bomber-admit-officials.html?ito=feeds-newsxml"&gt;.http://www.dailymail.co.uk/news/article-2012249/TSA-scanners-catch-implant-bomber-admit-officials.html?ito=feeds-newsxml.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="11"&gt;[11]&lt;/a&gt;&lt;a href="http://news.bbc.co.uk/2/hi/uk_news/8490860.stm"&gt;.http://news.bbc.co.uk/2/hi/uk_news/8490860.stm.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;[12]&lt;/a&gt;&lt;a href="http://www.bigbrotherwatch.org.uk/home/2010/03/body-scanner-refuseniks.html"&gt;.http://www.bigbrotherwatch.org.uk/home/2010/03/body-scanner-refuseniks.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="13"&gt;[13]&lt;/a&gt;&lt;a href="http://news.bbc.co.uk/2/hi/uk_news/8490860.stm"&gt;.http://news.bbc.co.uk/2/hi/uk_news/8490860.stm.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="14"&gt;[14].&lt;/a&gt;&lt;a href="http://www.timesonline.co.uk/tol/news/uk/article7011224.ece"&gt;http://www.timesonline.co.uk/tol/news/uk/article7011224.ece.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="15"&gt;[15].&lt;/a&gt;&lt;a href="http://www.timesonline.co.uk/tol/news/politics/article6990990.ece"&gt;http://www.timesonline.co.uk/tol/news/politics/article6990990.ece.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="16"&gt;[16]&lt;/a&gt;&lt;a href="http://www.bigbrotherwatch.org.uk/home/2010/06/airports-with-body-scanners.html"&gt;.http://www.bigbrotherwatch.org.uk/home/2010/06/airports-with-body-scanners.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="17"&gt;[17]&lt;/a&gt;&lt;a href="http://news.bbc.co.uk/2/hi/8438355.stm"&gt;.http://news.bbc.co.uk/2/hi/8438355.stm.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="18"&gt;[18]&lt;/a&gt;&lt;a href="http://www.huntonprivacyblog.com/2010/02/articles/european-union-1/uk-airports-implement-compulsory-use-of-full-body-scanners/"&gt;.http://www.huntonprivacyblog.com/2010/02/articles/european-union-1/uk-airports-implement-compulsory-use-of-full-body-scanners/.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="19"&gt;[19]&lt;/a&gt;&lt;a href="http://www.bigbrotherwatch.org.uk/home/2011/01/judge-blocks-investigations-into-body-scanners.html"&gt;.http://www.bigbrotherwatch.org.uk/home/2011/01/judge-blocks-investigations-into-body-scanners.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="20"&gt;[20].&lt;/a&gt;&lt;a href="http://www.theaustralian.com.au/travel/backlash-to-airport-body-scans/story-e6frg8rf-1225817485755"&gt;http://www.theaustralian.com.au/travel/backlash-to-airport-body-scans/story-e6frg8rf-1225817485755.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="21"&gt;[21].&lt;/a&gt;&lt;a href="http://www.sbs.com.au/news/article/1190826/full-body-scanners-to-be-introduced-at-airports"&gt;http://www.sbs.com.au/news/article/1190826/full-body-scanners-to-be-introduced-at-airports.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="22"&gt;[22].&lt;/a&gt;&lt;a href="http://www.theage.com.au/travel/travel-news/fullbody-airport-scans-part-of-security-revamp-20100209-npqo.html"&gt;http://www.theage.com.au/travel/travel-news/fullbody-airport-scans-part-of-security-revamp-20100209-npqo.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="23"&gt;[23].&lt;/a&gt;&lt;a href="http://www.theage.com.au/travel/travel-news/fullbody-airport-scans-part-of-security-revamp-20100209-npqo.html"&gt;http://www.theage.com.au/travel/travel-news/fullbody-airport-scans-part-of-security-revamp-20100209-npqo.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="24"&gt;[24].&lt;/a&gt;&lt;a href="http://www.bigbrotherwatch.org.uk/home/2010/06/airports-with-body-scanners.html"&gt;List of Airports with full body scanners. Available at http://www.bigbrotherwatch.org.uk/home/2010/06/airports-with-body-scanners.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="25"&gt;[25].&lt;/a&gt;&lt;a href="http://www.independent.co.uk/news/uk/home-news/are-planned-airport-scanners-just-a-scam-1856175.html"&gt;http://www.independent.co.uk/news/uk/home-news/are-planned-airport-scanners-just-a-scam-1856175.html.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="26"&gt;[26].&lt;/a&gt;&lt;a href="http://www.bigbrotherwatch.org.uk/home/2010/01/invasion-of-the-body-scanners.html"&gt;http://www.bigbrotherwatch.org.uk/home/2010/01/invasion-of-the-body-scanners.html.&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy_wholebodyimagingcomparison'&gt;https://cis-india.org/internet-governance/blog/privacy_wholebodyimagingcomparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Srishti Goyal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-09-29T05:38:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/whoswholegal-profiles-malavika-jayaram">
    <title>WHO's WHO LEGAL names Malavika Jayaram as one of the top lawyers for Internet and e-Commerce Issues in India</title>
    <link>https://cis-india.org/news/whoswholegal-profiles-malavika-jayaram</link>
    <description>
        &lt;b&gt;Malavika Jayaram was one of 10 Indian lawyers selected for inclusion as the top lawyers for internet and e-commerce issues in India. The new volume for 2012 was recently published following a process of peer reviews and independent research.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://www.whoswholegal.com/profiles/47711/0/jayaram/malavika-jayaram/"&gt;WHO'sWHOLEGAL published an online biography of Malavika&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A dual-qualified lawyer, Malavika spent eight years in London - with Allen &amp;amp; Overy as an IP/IT lawyer in the communications, media &amp;amp; technology group; and with Citigroup, first as vice president and counsel in the technology legal team, and later as senior business analyst.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A lawyer for over 15 years, she relocated to India in 2006. She is a partner at Jayaram &amp;amp; Jayaram, focusing on domestic and cross-border corporate and technology intensive transactions. She represents clients in the aerospace, automotive, hydraulics and pharmaceutical sectors, as well as in the information technology, e-commerce and communication spaces. She has a special interest in new media and the arts, and advises start-ups, innovators, educational institutions and artists on digital rights, cultural heritage and the dissemination of creative works. Malavika is a fellow at the Centre for Internet and Society, reviewing and commenting on legislative and policy developments, and will have a monograph on privacy and identity in India published this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A graduate of the National Law School of India, she has an LLM from Northwestern University, Chicago. She is working on a PhD on data protection and privacy, with a special focus on India's e-governance schemes and the new biometric ID project. She is on the advisory board of the &lt;i&gt;Indian Journal of Law &amp;amp; Technology&lt;/i&gt;, and is the author of the India chapter of &lt;i&gt;Getting the Deal Through - Data Protection &amp;amp; Privacy&lt;/i&gt;, which is being launched this year. Malavika will be a visiting scholar during autumn 2012 at the Center for Global Communication Studies at the Annenberg School, University of Pennsylvania.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/whoswholegal-profiles-malavika-jayaram'&gt;https://cis-india.org/news/whoswholegal-profiles-malavika-jayaram&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-11-20T11:22:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
