<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 171 to 185.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/table-2.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/table-1.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/surveillancetechpic.jpg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/Abraham.jpg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar">
    <title>Taking Cognisance of the Deeply Flawed System That Is Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar</link>
    <description>
        &lt;b&gt;Aadhaar and its many connotations have grown to be among the most burning issues on the Indian fore today, that every citizen aware of their rights should be taking note of.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shreyashi Roy was &lt;a class="external-link" href="https://thewire.in/133916/taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar/"&gt;published in the Wire&lt;/a&gt; on May 10, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;With the &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/" rel="noopener noreferrer" target="_blank" title="leak of 130 million Aadhaar numbers"&gt;leak of 130 million Aadhaar numbers&lt;/a&gt; recently coming to light, several activists, lawyers and ordinary  citizens are up in arms about what is increasingly being viewed as a  government surveillance system. Keeping this in mind, on Tuesday, May 9,  Software Freedom Law Centre India (SFLC) hosted an event that brought  together a panel to clearly articulate the dangers of Aadhaar and to  discuss whether the biometric identification system is capable of being  reformed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SFLC is a donor-supported legal services organisation that calls itself a protector of civil liberties in the digital age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Titled ‘Revisiting Aadhaar: Law, Tech and Beyond’, the discussion, with several eminent personalities who have in-depth knowledge of Aadhaar and its working, threw light on the various problems that have cropped up with regard to India’s unique identification system. The discussion was moderated by Saikat Datta, policy director at Centre for Internet and Society, which published the report that studied the third-party leaks of Aadhaar numbers and other personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The leaks&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion took off from the point of the leaks, with Srinivas  Kodali, a panelist and one of the authors of the report, explaining his  methodology for the study that proved that the Aadhaar database lacked  the security required when dealing with private information of people.  He highlighted the fact that during the course of his research, he had  noticed several leaks from government websites and notified the Unique  Identification Authority of India (UIDAI) about the same. Yet, at every  step, UIDAI continued to deny and reject the possibility of this  happening. Kodali says, however, that he had noticed that the websites  that were unknowingly leaking data were, in fact, fixing the leaks after  being notified without acknowledging that the leak had happened in the  first place. Kodali reiterated at the discussion, as in his report, that  a simple tweaking of URL query parameters of the National Social  Assistance Programme website could unmask and display private  information. Unfortunately, UIDAI cannot be brought to task for  unknowingly leaking information because there is no such provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also addressed the question of the conflict of interest that  existed in the entire system of building Aadhaar, which was created by  developers who later left the UIDAI and built their own private  companies, monetising the mine of private information that they were  sitting on. Kodali blames UIDAI for this even being allowed, since the  developers, though clearly lacking ethics, were in fact, merely  volunteers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The system&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the glaring issues with the technology behind Aadhaar is that  the software is not open source. Anivar Aravind, a panelist, called it  “defected by design” and “bound to fail” because not only is the  technology completely untested but there are very obvious leaks that are  taking place. Moreover, UIDAI does not allow any third-party audits or  any other persons to look at the technology. Datta pointed to the fact  that this is unheard of in other nations, where software is routinely  subjected to penetration testing and hacking experts are called upon to  check how secure a database is.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anupam Saraph, another panelist and future designer, illuminated  the creation of the Aadhaar database, pointing out that this is a system  less about identification and more about verification. All of the  verification, moreover, has been done by private parties, making the  database itself suspect and leaving everyone’s private information loose  at the time of enrolment. In addition, Aadhaar was meant for all  residents and not just citizens. But now there is a mix of  both, creating confusion in many aspects. Saraph also brought up how one  rogue agency with access to all this information could pose an actual  national security threat, unlike all the requests for information on  breaches that the government keeps pointing fingers at. Referring to  Nandan Nilekani’s statement about Aadhaar not being like AIDS, Saraph  pointed out that it was exactly like it because much like the body,  which cannot distinguish between an invasion and itself, the Aadhaar  system is not being able to distinguish between aliens and citizens and  has begun denying the latter benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court has declared time and again that Aadhaar cannot be  made mandatory, but the government continues to – in complete disregard  of the apex court’s judgment – insist on Aadhaar for a multitude of  schemes. More and more schemes are being made unavailable without the  existence of an Aadhaar number as the government continues to function  in a complete lack of cognisance of the fact that the poor are losing  out on something as basic as their food because of a number. Prasanna  S., an advocate and a panelist, called it a “voluntary but mandatory”  system that is becoming an evidence collection mechanism. Moreover,  everything is connected through this one number, making many options  like financial fraud, selective treatment of citizens and other horrors  possible. The collection of all this information is not dangerous,  screams the government. Maybe not in the hands of this one. But what of  the next? What of rogues?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The legal aspect&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the panelists was Shyam Divan, a senior advocate of the  Supreme Court, who has represented petitioners fighting against Aadhaar.  Divan spoke about how along with a group of advocates he has been  trying to get the apex court to rule on the issue but has been met with  long queues before a ruling can be procured. He addressed the right to  privacy aspect of the system and the recent declaration that the citizen  does not have the absolute right to the body. He emphasised that the  government cannot own the body and that for a free and democratic  society, a limited government, instead of an all-knowing and all-seeing  government, is essential. Unfortunately for India, there is no express  right to privacy in the constitution, but that does not mean that rights  can be taken away in exchange for a fingerprint. It is the government’s  duty to respect privacy. For him, Aadhaar has become an instrument of  oppression and exclusion, a point that Prasanna also agreed with,  calling it a “systematic attack on consent”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is complete agreement that there has been a railroading of  consent in this entire matter if Aadhaar being passed forcibly through  the Lok Sabha as a money bill is anything to go by. If parliament’s  consent can be disregarded in that fashion, what is an ordinary citizen  to do in the face of this complete imbalance of power in the state’s  hand?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Usha Ramanathan, a legal researcher and a long-time critic of  Aadhaar, spoke about how India has turned into a state where there are  more restrictions than fundamental rights, rather than the other way  around. She related how there was no clarity at the beginning of Aadhaar  of how it would be a card or a number and was never a government  project in the first place. This is a private sector ambition that the  government has jumped on board with, without considering that the  private sector does not concern itself with civil liberties. As other  panelists also pointed out, the private sector cannot and will not  protect public interest. This is the job of the government, especially  in an age of digitisation. But Aadhaar compromises the ability of the  state to stand up for its citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With June 30 approaching fast, many of those who have so far  abstained from enrolling in the system are considering giving up their  rebellion and going like sheep to get themselves registered in the  database. In the words of Divan, they will have to “volunteer  compulsorily for an Aadhaar”. The government is probably counting on  this. Turning to the Supreme Court has been of no help, although a  verdict can be hoped for in a couple of weeks. But what can we do if  they rule for the government?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the panelists are on board with the idea of a civil  disobedience movement, a kind of a rebellion against Aadhaar. Some  suggested thinking of out-of-the-box ways to register one’s protest and  dissent against what is clearly becoming the architecture of a  surveillance state. Saraph was particularly vehement about the need to  completely destroy the Aadhaar database – “shred it”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What all the panelists emphasised repeatedly was that there can be no  improvements to a system that is so deeply flawed and that has had so  many “teething problems” that are making millions suffer. The main  takeaway from the discussion was that Aadhaar must see a speedy demise  because it cannot be saved and cannot persist in its current state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar'&gt;https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T14:52:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india">
    <title>Symposium on Human Rights and the Internet in India</title>
    <link>https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india</link>
    <description>
        &lt;b&gt;On January 17, 2015 the Center for Communication Governance at National Law University, Delhi in collaboration with the UNESCO Chair on Freedom of Communication and Information at the University of Hamburg hosted a pubic symposium on “Human Rights and Internet in India” as a Network of Centers (NoC) regional event. Bhairav Acharya was a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;See the &lt;a class="external-link" href="http://networkofcenters.net/sites/networkofcenters.net/files/dehli-concept-note.pdf"&gt;concept note here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The event convened a diverse group of collaborators working on issues of Privacy, Surveillance, Data Protection, Freedom of Expression and Intermediary Liability in India, the surrounding region, and internationally.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda | Saturday, January 17 | Public Symposium&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Opening words&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Ranbir Singh, Vice Chancellor, National Law University, Delhi&lt;/i&gt;&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;17:45 – 19:00 Panel I: Surveillance &amp;amp; Databases: Experiences &amp;amp; Privacy&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will explore how surveillance in India might become more  consistent with international human rights standards and Indian  constitutional values. It will also discuss the consequences of  ubiquitous database programs for citizens’ human rights. This will  include comparative perspectives around similar problems and a  discussion of privacy-compatible practices in other countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Bhairav Acharya, Lawyer, Supreme Court of India and Adviser Centre for Internet &amp;amp; Society, Bangalore&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Saikat Datta, Editor (National Security), Hindustan Times&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor KS Park, Former Commissioner, Korea Communications Standards Commission and Professor, Korea University Law School&lt;/i&gt;&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;b&gt;19:00 – 20:15 Panel II: Unpacking the Intermediary Liability Debate in India&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will focus on the legal framework governing Internet platforms  in India, especially with regard to online content and its implications  for rights of the citizens. It has been argued that the current legal  framework creates incentives for online intermediaries to take down  content even when no substantive notice or legitimate reasons have been  offered. The panel will consider the debate around intermediary  liability in India in light of the ongoing litigation at the Supreme  Court. It will reflect on the international experience with intermediary  liability legislation and discuss how to ensure that laws support an  innovative and competitive environment for intermediaries, while  ensuring that they prioritize the preservation of their users’ human  rights.&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Joris van Hoboken, Fellow, Information Law Institute at NYU School of Law&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society (HIIG)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Raman Jit Singh Chima, Lawyer&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Chinmayi Arun and Sarvjeet Singh, Centre for Communication Governance at National Law University, Delhi&lt;/i&gt;&lt;b&gt; &lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india'&gt;https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:50:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights">
    <title>Symposium on Data Privacy and Citizen's Rights</title>
    <link>https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights</link>
    <description>
        &lt;b&gt;Shweta Mohandas was a panelist at the Symposium on Data Privacy and Citizen's Rights on September 9, 2018. The Symposium was organised by the Tech Law Forum of NALSAR University of Law, Hyderabad. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Concept Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The National Academy of Legal Studies and Research (NALSAR) University of Law, Hyderabad is organising a Symposium on DATA PRIVACY AND CITIZEN’S RIGHTS to provide multiple stakeholders one platform to discuss and deliberate on the BN Srikrishna Committee Report and Draft Bill.  &lt;br /&gt; &lt;br /&gt;The Committee headed by Retd. Justice BN Srikrishna released its Report and Draft Bill on the 27th of July, 2018. It comes at a time when there is increasing discussion about the individual privacy and surveillance by both private organisations and state authorities. Especially in light of the 9-judge Puttaswamy judgment affirming the Fundamental Right to Privacy, there was a need to concretise the right in the form of a statute. The Bill proposes an elaborate data protection framework by utilising concepts such as anonymisation, pseudonymisation, data localisation, guardian data fiduciary, among others. While the Bill has been lauded for providing a data protection framework largely similar to the one proposed by civil society, there are several areas of concern with the Bill such as the amendments suggested to the RTI Act, the impact of the Bill on Free Speech and the lack of substantial provisions regarding surveillance. There has been further criticism that the discussions regarding these issues have been conducted in silos, with little to no dialogue taking place between the various stakeholders and experts in the field.  &lt;br /&gt; &lt;br /&gt;We believe that there is a need to provide a common forum for these stakeholders to interact with each other in providing suggestions that are representative in nature and nuanced in their expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Themes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy and Free Speech This interaction aims to examine the juxtaposition of the constitutional right to free speech and the now constitutionally affirmed right to privacy. Will a new data protection law impact the publication of leaked documents or sting operations like the Radia tapes or Tehelka’s ‘Operation Westend’? If so, how can journalists mitigate the risk of getting sued for breach of privacy?  While the jurisprudence concerning the right to privacy is in its most nascent state, it becomes important for us to explore its contours in light of already established constitutional guarantees.   &lt;br /&gt; &lt;br /&gt;Right to Information and Right to Privacy  How does the right to privacy impact the right to information? The guarantee of these two rights arise from diametrically opposite ideologies, in that privacy aims to shield from the public domain information and data concerning individuals and institutions while the right to information aims to promote transparency and disclosure of information held by the state. However, the question remains, is the existence of these two rights necessarily mutually exclusive? Will a new data protection law make it difficult to promote transparency under the Right to Information Act? Is there is a possibility of a clash between the Information Commissions and the proposed Data Protection Authority? This panel would analyze the co-existence and competitive nature of these two rights in the context of the Indian legal space.  &lt;br /&gt; &lt;br /&gt;Surveillance -  As we move towards a form of governance that is increasingly capable of surveilling individual movements and actions, it becomes extremely necessary for us to understand the nature of surveillance. Can data privacy be compromised for surveillance that may be necessary for increased safety in our physical and virtual living spaces? Are there any provisions that protects data in cases of it becoming exploitable? What is the interaction of international statutes (like ICCPR) and the latest Indian statute in terms of its recognition of necessity of surveillance in contrast to the necessity of protection of data.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights'&gt;https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-09-18T15:18:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar">
    <title>Syllabus: “Policy and regulation conducive to rapid ICT sector growth in Myanmar: An introductory course”</title>
    <link>https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar</link>
    <description>
        &lt;b&gt;A five-day course is being offered by LIRNEasia in collaboration with Myanmar ICT Development Organization, with support from the Open Society Foundation and the International Development Research Centre of Canada in Myanmar from September 28 to October 5, 2013.&lt;/b&gt;
        &lt;p&gt;Sunil Abraham will be supporting Prof. Samarajiva on the last optional day of this course in Yangon. Read about the &lt;a class="external-link" href="http://lirneasia.net/capacity-building/introductory-course-on-policy-and-regulation-conducive-to-rapid-ict-sector-growth-in-myanmar/"&gt;Introductory course on “Policy and regulation conducive to rapid ICT sector growth in Myanmar”&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Goal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To enable members of Myanmar civil-society groups (including academics and those from the media) to marshal available research and evidence for effective participation in policy and regulatory processes, thereby improving policy processes and helping achieve the government’s objective of providing ICT access to all.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Outcomes&lt;/h3&gt;
&lt;p&gt;The objective of the course is to produce discerning and knowledgeable consumers of research who are able to engage in an informed manner  in ICT policy and regulatory processes in Myanmar.  The course will benefit those working in government and operators as well.&lt;/p&gt;
&lt;p&gt;At the end of the course attendees will:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Have an understanding of telecom policy and regulatory processes&lt;/li&gt;
&lt;li&gt;Be able to find and assess relevant research &amp;amp; evidence&lt;/li&gt;
&lt;li&gt;Be able to summarize the research in a coherent and comprehensive manner&lt;/li&gt;
&lt;li&gt;Have the necessary tools to improve their communication skills &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;-        Have some understanding of how media functions and how to effectively interact with media&lt;/p&gt;
&lt;h3&gt;Assignments&lt;/h3&gt;
&lt;p&gt;Participants will be formed into teams on Day1.  Each group will work on an assignment that addresses both substantive and procedural aspects of law, policy and regulation. Teams will be assigned topic areas that are being developed into regulations under the new Act.   They will have to make presentations on what the desirable provisions should be.   We will emphasize the procedural aspects as well as the substantive.  Disciplined and focused team presentations, preferably using slides, are required.&lt;/p&gt;
&lt;p&gt;It is necessary to use the Internet for the assignments.  All who have laptops are encouraged to bring them.  Arrangements will be made for Internet connectivity at the hotel.&lt;/p&gt;
&lt;p&gt;Tentative topic areas&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Licensing and authorization regulations&lt;/li&gt;
&lt;li&gt;Essential facilities and anti-competitive practices&lt;/li&gt;
&lt;li&gt;Universal service policy&lt;/li&gt;
&lt;li&gt;Price and quality regulation&lt;/li&gt;
&lt;li&gt;Independence of regulatory agency&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Course schedule&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;Day 1 &lt;br /&gt;(September 28)&lt;/th&gt;&lt;th&gt;Day 2 &lt;br /&gt;(September 29)&lt;/th&gt;&lt;th&gt;Day 3 &lt;br /&gt;(September 30)&lt;/th&gt;&lt;th&gt;Day4 &lt;br /&gt;(October 1)&lt;/th&gt;&lt;th&gt;Day 5 &lt;br /&gt;(October 2) (optional)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:00-10:30&lt;/td&gt;
&lt;td&gt;S1  Introduction to course: What have been the results of reform &amp;amp; rationale for regulation. Rohan Samarajiva (RS)&lt;/td&gt;
&lt;td&gt;S5   Regulatory legitimacy, including procedural legitimacy (RS)&lt;/td&gt;
&lt;td&gt;S10   Challenges of monitoring complex license commitments (HG)&lt;/td&gt;
&lt;td&gt;S14 How does the Internet work? (TBA)&lt;/td&gt;
&lt;td&gt;S16 Internet governance The big picture. Sunil Abraham (SA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30-11:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-12:00&lt;/td&gt;
&lt;td&gt;S2   Interrogating supply-side indicators &amp;amp; research based on them.  Helani Galpaya (HG)&lt;/td&gt;
&lt;td&gt;S6   Current status of telecom law and policy in Myanmar (RS)&lt;/td&gt;
&lt;td&gt;S11 How evidence is used in policy &amp;amp; regulation (panel discussion, KS, RS&lt;/td&gt;
&lt;td&gt;S15 The art of media interaction (RS)&lt;/td&gt;
&lt;td&gt;S17 Economic &amp;amp; technical interface with telecom industry (RS)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00-13:00&lt;/td&gt;
&lt;td&gt;S3 Finding information on the web.  Roshanthi Lucas Gunaratne (RLG)&lt;/td&gt;
&lt;td&gt;S7 Presenting evidence in slides &amp;amp; written submissions (HG)&lt;/td&gt;
&lt;td&gt;S12 Essential facilities and anti-competitive practices (RS)&lt;/td&gt;
&lt;td&gt;A3 Mock public hearing (RS &amp;amp; panel)&lt;/td&gt;
&lt;td&gt;S18 How Internet is governed within India (SA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00-15:00&lt;/td&gt;
&lt;td&gt;A1 Group formation; Assignment explained (HG and RLG)&lt;/td&gt;
&lt;td&gt;S8   Licensing and authorization (RS) &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;A2  Midpoint check on assignment/group work (HG and RLG)&lt;/td&gt;
&lt;td&gt;A4 Mock public hearing &amp;amp; critique (RS &amp;amp; panel)&lt;/td&gt;
&lt;td&gt;S19 Content regulation (TBA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00-15:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-17:00&lt;/td&gt;
&lt;td&gt;S4 Demand-side research (RS)&lt;/td&gt;
&lt;td&gt;S9 Price and quality regulation (RS &amp;amp; HG)&lt;/td&gt;
&lt;td&gt;S13 Universal service subsidies: Theory &amp;amp; practice (RS &amp;amp; KS)&lt;/td&gt;
&lt;td&gt;Reflection on the course&lt;/td&gt;
&lt;td&gt;S20 Surveillance &amp;amp; privacy (SA &amp;amp; RS)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:00&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19:00&lt;/td&gt;
&lt;td&gt;Welcome dinner &lt;br /&gt;Speaker: TBA&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Faculty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt; is the Executive Director of CIS. He is also a social   entrepreneur and  Free Software advocate. He founded Mahiti in 1998 which   aims to  reduce the cost and complexity of Information and  Communication   Technology for the Voluntary Sector by using Free  Software. Today, &lt;a class="external-link" href="http://www.mahiti.org/"&gt;Mahiti &lt;/a&gt;employs more than 50 engineers and Sunil continues to serve on the board as a board member. Sunil was elected an &lt;a class="external-link" href="http://www.ashoka.org/"&gt;Ashoka&lt;/a&gt; fellow in 1999 to 'explore the democratic potential of the Internet' and was granted a &lt;a class="external-link" href="http://www.sarai.net/"&gt;Sarai&lt;/a&gt; FLOSS fellowship in 2003. Between June 2004 and June 2007, he managed the &lt;a class="external-link" href="http://www.iosn.net/"&gt;International Open Source Network&lt;/a&gt;, a project of the &lt;a class="external-link" href="http://www.beta.undp.org/undp/en/home.html"&gt;UNDP's Asia-Pacific Development Information Programme&lt;/a&gt; serving 42 countries in the Asia-Pacific region. Between September 2007 and June 2008, he also managed &lt;a class="external-link" href="http://www.enrap.org/"&gt;ENRAP&lt;/a&gt;, an electronic network of &lt;a class="external-link" href="http://www.ifad.org/"&gt;International Fund for Agricultural Development&lt;/a&gt; projects in the Asia-Pacific facilitated and co-funded by&lt;a class="external-link" href="http://www.idrc.ca/"&gt; International Development Research Centre&lt;/a&gt;, Canada.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Helani Galpaya&lt;/b&gt; is LIRNEasia’s Chief Executive Officer. Helani leads LIRNEasia’s 2012-2014 IDRC funded research on improving customer life cycle management practices in the delivery of electricity and e-government services using ICTs.    She recently completed an assessment of how the poor in Bangladesh and Sri Lanka use telecenters to access government services.   For UNCTAD and GTZ she authored a report on how government procurement practices can be used to promote a country’s ICT sector and for the World Bank/InfoDev Broadband Toolkit, a report on broadband strategies in Sri Lanka. She has been an invited speaker at various international forums on topics ranging from m-Government to ICT indicators to communicating research to policy makers. Prior to LIRNEasia, Helani worked at the ICT Agency of Sri Lanka, implementing the World-Bank funded e-Sri Lanka initiative.  Prior to her return to Sri Lanka, she worked in the United States at Booz &amp;amp; Co., Marengo Research, Citibank, and Merrill Lynch. Helani holds a Masters in Technology and Policy from the Massachusetts Institute of Technology, and a Bachelor’s in Computer Science from Mount Holyoke College, USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Roshanthi Lucas Gunaratne&lt;/b&gt; is a Research Manager at LIRNEasia and is currently managing the Ford Foundation Funded project on Giving Broadband Access to the Poor in India.   She is also contributing to the IDRC Customer Lifecycle Management Practices Project by conducting research on customer lifecycle management practices in telecommunication sector in Bangladesh.  Before joining LIRNE&lt;i&gt;asia&lt;/i&gt;, Roshanthi worked at the Global Fund to fight AIDS, Tuberculosis and Malaria, Geneva, Switzerland as a Strategic Information Officer. She contributed to the process of defining the Global Fund Key Performance Indicators, and also worked on improving the performance measurements of their grants. Prior to that, she worked as a telecom project manager at Dialog Telecom, and Suntel Ltd in Sri Lanka. As Suntel she managed the design and implementation of corporate customer projects.  She holds a MBA from the Judge Business School, University of Cambridge, UK and a BSc. Eng (Hons) specializing in Electronics and Telecommunication from the University of Moratuwa, Sri Lanka.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajat Kathuria, PhD&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rohan Samarajiva, PhD,&lt;/b&gt; is founding Chair of LIRNEasia, an ICT policy and regulation think tank active across emerging Asian and Pacific economies.  He was Team Leader at the Sri Lanka Ministry for Economic Reform, Science and Technology (2002-04) responsible for infrastructure reforms, including participation in the design of the USD 83 million e-Sri Lanka Initiative.  He was Director General of Telecommunications in Sri Lanka (1998-99), a founder director of the ICT Agency of Sri Lanka (2003-05), Honorary Professor at the University of Moratuwa in Sri Lanka (2003-04), Visiting Professor of Economics of Infrastructures at the Delft University of Technology in the Netherlands (2000-03) and Associate Professor of Communication and Public Policy at the Ohio State University in the US (1987-2000).  Dr. Samarajiva was also Policy Advisor to the Ministry of Post and Telecom in Bangladesh (2007-09).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Koesmarihati Sugondo&lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Resource Material&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;infodev, &lt;i&gt;ICT regulation toolkit&lt;/i&gt;.  &lt;a href="http://www.ictregulationtoolkit.org/en/Index.html"&gt;http://www.ictregulationtoolkit.org/en/Index.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;infoDev.  &lt;i&gt;Broadband strategies toolkit&lt;/i&gt;.  &lt;a href="http://broadbandtoolkit.org/en/toolkit/contents"&gt;http://broadbandtoolkit.org/en/toolkit/contents&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;infoDev (2011). &lt;i&gt;Tenth anniversary telecom regulation handbook&lt;/i&gt;.  &lt;a href="http://www.infodev.org/En/Publication.1057.html"&gt;http://www.infodev.org/En/Publication.1057.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITU (2011).  &lt;i&gt;The role of ICT in advancing growth in least developed countries: Trends, challenges and opportunities&lt;/i&gt;.  Geneva:  ITU.  &lt;a href="http://www.itu.int/ITU-D/ldc/turkey/docs/The_Role_of_ICT_in_Advancing_Growth_in_LDCs_Trends_Challenges_and_Opportunities.pdf"&gt;http://www.itu.int/ITU-D/ldc/turkey/docs/The_Role_of_ICT_in_Advancing_Growth_in_LDCs_Trends_Challenges_and_Opportunities.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2000).  The role of competition in institutional reform of telecommunications: Lessons from Sri Lanka, &lt;i&gt;Telecommunications Policy&lt;/i&gt;, 24(8/9): 699-717.  &lt;a href="http://www.comunica.org/samarajiva.html"&gt;http://www.comunica.org/samarajiva.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2002).  Why regulate?, chapter 2 of &lt;i&gt;Effective regulation:  Trends in Telecommunication Reform 2002&lt;/i&gt;.  Geneva:  International Telecommunication Union.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2006).  Preconditions for effective deployment of wireless technologies for development in the Asia-Pacific, &lt;i&gt;Information Technology and International Development&lt;/i&gt;, 3(2): 57-71. &lt;a href="http://itidjournal.org/itid/article/view/224/94"&gt;http://itidjournal.org/itid/article/view/224/94&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan &amp;amp; Zainudeen, Ayesha (2008).&lt;i&gt; ICT infrastructure in emerging Asia:  Policy and regulatory roadblocks&lt;/i&gt;,  New Delhi &amp;amp; Ottawa:  Sage &amp;amp; IDRC  &lt;a href="http://www.idrc.ca/en/ev-117916-201-1-DO_TOPIC.html"&gt;http://www.idrc.ca/en/ev-117916-201-1-DO_TOPIC.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar'&gt;https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2013-10-24T03:56:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security">
    <title>Surveillance: Privacy Vs Security </title>
    <link>https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security</link>
    <description>
        &lt;b&gt;The Foundation for Media Professionals is organizing a debate at the India International Centre, New Delhi on August 17, 2013. Shri Kapil Sibal will give the opening speech. Natgrid chief Raghu Raman is one of the debaters. Pranesh Prakash is participating in this event as a panelist.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://fmp.org.in/index.php/events"&gt;published by the Foundation for Media Professionals&lt;/a&gt; on their website. Also read the &lt;a class="external-link" href="http://fmp.org.in/index.php/events/eventDetail/51"&gt;blog post&lt;/a&gt; by Vivian Fernandes and Ninglun Hanghal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the backdrop of the recent disclosures by US defense contractor Edward Snowden about the activity of the National Security Agency (NSA) and reports that NSA may have collaborated with India on surveillance program in the country that have raised concerns about privacy and right of citizens, Foundation for Media Professionals (FMP) in partnership with Friedrich Ebert Stiftung (FES) invited Pranesh Prakash to a panel discussion on "Surveillance: Privacy vs. Security".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Speaker&lt;/b&gt;&lt;br /&gt;Kapil Sibal, Union Minister for Communications and Information Technology, Govt. of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/li&gt;
&lt;li&gt;Saikat Datta, Resident Editor, DNA&lt;/li&gt;
&lt;li&gt;Capt. Raghu Raman, National Intelligence Grid (Natgrid)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Moderator&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Paranjoy Guha Thakurta&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security'&gt;https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-19T05:32:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india">
    <title>Surveillance technology companies operating in India - spreadsheet</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has started investigating surveillance technology companies operating in India! This spreadsheet entails the first 77 companies which are being researched. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india'&gt;https://cis-india.org/internet-governance/blog/surveillance-technology-companies-operating-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-27T16:29:14Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/table-2.pdf">
    <title>Surveillance Technologies (Table 2)</title>
    <link>https://cis-india.org/internet-governance/blog/table-2.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/table-2.pdf'&gt;https://cis-india.org/internet-governance/blog/table-2.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-09T10:22:41Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/table-1.pdf">
    <title>Surveillance Technologies (Table 1)</title>
    <link>https://cis-india.org/internet-governance/blog/table-1.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/table-1.pdf'&gt;https://cis-india.org/internet-governance/blog/table-1.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-09T10:02:56Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies">
    <title>Surveillance Technologies </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies</link>
    <description>
        &lt;b&gt;The following post briefly looks at different surveillance technologies, and the growing use of the them in India. &lt;/b&gt;
        
&lt;h3&gt;Surveillance...&lt;/h3&gt;
&lt;p&gt;New security technologies are constantly emerging that push the edge between privacy and a reasonable level of security. Society's tolerance level is constantly being tested by governments who use surveillance and monitoring technologies to protect the nation. Governments claim that they need absolute access to citizens life. They need to monitor phones, look through emails, peer into files – in-order to maintain security and protect against terrorism. Though as a side note, in an Economic Times article published on Nov. 4&amp;nbsp;2010 it was reported that government computers were being hacked into through viruses, and top secret documents were being stolen. The irony of the story is that the viruses were introduced to the computers through porn websites visited by officials.&lt;/p&gt;
&lt;h3&gt;...In a Car? On the Street? In an Airport?&lt;/h3&gt;
&lt;p&gt;Despite the fact that governmental monitoring might make the common man uncomfortable, the reality is that governments will always win the national security vs privacy fight. The story becomes more complicated when it moves from the government directly monitoring individuals, to security agencies monitoring individuals. For instance the use of full body scanners at airports, or trucks equipped with scatter x-ray machines used to control crime in neighborhoods - is a much more heated debate. There are other ways in which to check passengers for banned items, and other ways to keep crime off the streets without mandating that individuals submit themselves to invasive scans, or scanning unaware individuals.&lt;/p&gt;
&lt;h3&gt;...In the Movie Theater????..for Marketing Purposes????&lt;/h3&gt;
&lt;p&gt;Surveillance technology has now been taken even another step further. No longer is it being just used to prevent violent crimes or terrorist attacks. Today the movie industry is using controversial anti-piracy tools to protect the films they produce. For instance the security company Aralia Systems manufacturers products such as: CCTV cameras and anti-camcorder systems that shine infrared light beams on audiences as they watch a movie. The light beams reflect off camcorders and alerts the theater that there are camcorders present. Though this practice can be seen as invasive - individuals might be opposed to being probed by light beams throughout movies, the extent of potential privacy invasion does not stop there. Aralia Systems has partnered with Machine Vision Lab and has created a system that harvests audiences emotions and movements as they watch movies. The data can then be used by market researchers to better tailor their behavioral advertising schemes. Essentially movie theater monitoring has merged surveillance technologies with behavioral marketing technologies in a twisted invasion of movie watchers personal privacy.&lt;/p&gt;
&lt;h3&gt;Is this technology in India?&lt;/h3&gt;
&lt;p&gt;Though behavioral monitoring and piracy technologies such as ones produced by Aralia Systems are not yet used in Indian movie theaters – security measures against piracy are used. Movie theaters across India are equipped with metal detectors at the door, and security personel check your handbag or back pack for camcorders. According to a Indian Express article, the organization Allegiance Against Copyright Theft believes one of the reasons monitoring technology is not yet used in theaters is because there is no present Indian legislation that penalizes recording in halls. Once legislation is passed, they speculate there will be a push to use these technologies. Even though monitoring technology is not yet used in theaters, monitoring of consumers behavior is increasing. Recently in India the WPP owned research agency IMRB International has developed an online audience measurement system that uses tailored metering technology to track the sites that users visit. The Web Audience Measurement System has launched this technology in a sample size of 21,000 Indian households, covering 90,000 individuals. IMRB has said that the meters are capable of capturing usage data from multiple computers, and that they can then use the information to market to the individual. Does it seem ironic to anyone that companies now charge for a service – movie tickets, internet services, telephone services – and make an extra profit by data mining at the expense of a persons privacy?&lt;/p&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;http://economictimes.indiatimes.com/news/politics/nation/Govt-depts-asked-not-to-store-sensitive-info-on-Net-connected-computers/articleshow/6874631.cms&lt;/li&gt;&lt;li&gt;http://www.research-live.com/news/technology/imrb-unveils-web-measurement-service-for-indian-market/4003941.article&lt;/li&gt;&lt;li&gt;http://blogs.computerworld.com/17276/anti_piracy_tool_will_harvest_market_your_emotions?source=rss_blogs&lt;/li&gt;&lt;li&gt;&amp;nbsp;http://www.indianexpress.com/news/antipiracy-unit-joins-hands-with-cinema-halls-to-curb-camcording/695439/2&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies'&gt;https://cis-india.org/internet-governance/blog/privacy/surveillance-technologies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:40:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/surveillancetechpic.jpg">
    <title>Surveillance Tec</title>
    <link>https://cis-india.org/home-images/surveillancetechpic.jpg</link>
    <description>
        &lt;b&gt;Surveillance Tech&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/surveillancetechpic.jpg'&gt;https://cis-india.org/home-images/surveillancetechpic.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-07T10:31:27Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/Abraham.jpg">
    <title>Surveillance Talk</title>
    <link>https://cis-india.org/home-images/Abraham.jpg</link>
    <description>
        &lt;b&gt;Surveillance Talk&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/Abraham.jpg'&gt;https://cis-india.org/home-images/Abraham.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-10-31T01:38:24Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance">
    <title>Surveillance Stories: Optimizing rights and governance</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance</link>
    <description>
        &lt;b&gt;Sunil Abraham gave a talk at the National Centre for Biological Sciences, Tata Institute of Fundamental Research, Bangalore on October 16, 2018. Sunil used a series of stories to explain how surveillance works and fails in the context of theft, murder, insider trading, terrorism, demonetization and encounter killings. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Abraham.jpg/@@images/27cd9d50-b82d-4556-aad2-431d99174b07.jpeg" alt="Surveillance Talk" class="image-inline" title="Surveillance Talk" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These stories were used to explore multiple technical solutions for solving the “surveillance optimization problem”. Policy makers have to simultaneously maximize various rights — the right to privacy, the right to transparency, the right to free speech — and uphold the imperatives of the nation state: national security, law enforcement and effective governance. &lt;br /&gt; &lt;br /&gt;Two decades ago, Lawrence Lessig introduced a socioeconomic theory of regulation called the ‘pathetic dot theory’, which discusses how individuals in a society are regulated by four forces — law, code or technical infrastructure, market and social norms. The talk will explore how these four regulatory options contribute to solving the surveillance optimization problem.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was published on the website of &lt;a class="external-link" href="https://www.ncbs.res.in/events/apls-20181016-surveillance-abraham"&gt;National Centre for Biological Sciences&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance'&gt;https://cis-india.org/internet-governance/news/surveillance-stories-optimizing-rights-and-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-31T01:39:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats">
    <title>Surveillance rises, privacy retreats</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats</link>
    <description>
        &lt;b&gt;WikiLeaks founder Julian Assange and former US National Security Agency contractor Edward Snowden have, at considerable personal cost, revealed how surveillance has eroded the private space in a world driven by digital technology.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/surveillance-rises-privacy-retreats-115041200669_1.html"&gt;Business Standard&lt;/a&gt; on April 12, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In India, the extent of surveillance became evident after Union human resource development minister &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smriti+Irani" target="_blank"&gt;Smriti Irani &lt;/a&gt;walked into the trial room of a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Fabindia" target="_blank"&gt;FabIndia &lt;/a&gt;outlet  in Goa last week, only to discover closed-circuit television (CCTV)  cameras pointed towards the trial room. The country woke up to the  porous divide between privacy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, senior officials of FabIndia find themselves embroiled in a case of  voyeurism and seven of them have taken interim anticipatory bail from a  district court. They claim the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cctv+Cameras" target="_blank"&gt;CCTV cameras &lt;/a&gt;were in the retail area, not the trial room.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FabIndia incident might have blown the lid on how flimsily our  privacy is protected but there is no doubt that India is slowly but  surely moving towards a surveillance regime, both in the private and the  public spheres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“After the Snowden episode, there are only two kinds of nations: Ones  that know they are being watched, and others that don’t,” said Pavan  Duggal, an advocate at the  Supreme Court of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the surge in surveillance, there are hardly any specific laws governing this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A few laws&lt;/b&gt;&lt;br /&gt; In 2000, India enacted the Information Technology Act, primarily to  bring e-commerce under legal framework. After the Mumbai terrorist  attack in 2008, the Act was amended, to give the government sweeping  powers for mass surveillance.&lt;br /&gt; &lt;br /&gt; In the context of private surveillance, the 2008 amendment added two definitions: (a) communication device; (b) intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A communication device, according to the law, means cell phones,  personal digital assistance, or a combination of both or any other  device used to communicate, send or transmit any text, video, audio, or  image. An intermediary was defined as any person who, on behalf of  another person, stores or transmits message or provides any service with  respect to that message.&lt;br /&gt; &lt;br /&gt; Rules regarding CCTV surveillance are governed by the IT Act, 2008, as  CCTVs are considered to be communication devices, with computerised  memory. However, the laws in relation to a communication device and  intermediary deal mostly with third-party data sharing.&lt;br /&gt; &lt;br /&gt; “&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Article+21" target="_blank"&gt;Article 21 &lt;/a&gt;of  the Constitution guards the right to privacy as a Fundamental Right. We  do not have an explicit Act in this regard, but Section 43A of the IT  Act, 2000, along with the IT Rules, 2011, protects data privacy in  India,” said Prashant Mali, a cyber law and cyber security lawyer.&lt;br /&gt; &lt;br /&gt; There were no amendments of the laws governing CCTVs.&lt;br /&gt; &lt;br /&gt; However, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Section+66e" target="_blank"&gt;Section 66E &lt;/a&gt;of  the IT Act, states: “Whoever, intentionally or knowingly, captures,  publishes or transmits, the image of a private area of any person,  without his or her consent, under circumstances violating the privacy of  that person, shall be punished with imprisonment, which may extend to  three years, or with a fine not exceeding Rs 2 lakh, or both, with  explanation.”&lt;br /&gt; &lt;br /&gt; “The IT Act is not a privacy enabling law. Hence, the challenges to  privacy in surveillance are not fully addressed in it,” said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internationally, there are more stringent laws governing CCTV cameras.  For example, in the UK, there is a prescribed code. A person filmed by a  surveillance camera can seek the footage. In the US, too, there are  state-specific laws which prohibit the unauthorised installation or use  of cameras in private places, like restrooms and trial rooms.&lt;br /&gt; &lt;br /&gt; “Privacy laws must be compliant with international practices. Laws  governing CCTVs should be more comprehensive. It should not be specific  to voyeurism,” said Sunil Abraham, the executive director of  Bengaluru-based research organisation, the Centre for Internet and  Society.&lt;br /&gt; &lt;br /&gt; The government has been working on a Privacy (Protection) Bill, which  provides safeguards on personal data of individuals and sets conditions  under which surveillance is allowed. It is expected that the Bill will  lead to the creation of the offices of privacy commissioner and data  protection commissioner. However, it is mostly silent on laws governing  CCTV usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, the concern over enacting privacy laws, implementing them and  our understanding of privacy are low, compared to the global context.  The Privacy Protection Bill, 2013 is pending before Parliament. When  this gets enacted, our laws would be at par with those in the West,”  said Mali. “But doubts remain about their implementation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government surveillance&lt;/b&gt;&lt;br /&gt; Amendments to the IT Act in 2008 gave the government wide powers of  interception, encryption and blocking. The amendment introduced Section  66A, which made sending “offensive” messages through a computer or any  other communication device, such as a cell phone or a tablet, a  punishable offense.&lt;br /&gt; &lt;br /&gt; The Supreme Court recently struck down the provision as infringing the constitutional right of freedom of speech.&lt;br /&gt; &lt;br /&gt; “Every nation is under the classical dilemma to balance national  security with privacy and freedom of expression. Always, when there is a  conflict between the two, national security wins hands down. However,  apart from international consensus, we need customise national  solutions,” said Duggal.&lt;br /&gt; &lt;br /&gt; Today, some of the biggest government projects based on the powers  vested to it under the IT Act. It has enabled the progression of  surveillance procedures like the Central Monitoring System (CMS) and  National Intelligence Grid (Natgrid), enabled through information on  Aadhar card or unique identification number.&lt;br /&gt; &lt;br /&gt; The CMS gives the government access to records of any mobile to landline  calls, to read private emails, texts, and even browsing history through  telecom operators. Natgrid could make the information available to  nearly 11 central agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is reported that the CMS can monitor close to 900 million people at  one go. There is neither confirmation nor denial from the government,”  said Duggal. However, compared to the US and China, that practice  blanket surveillance, India is still considered a low-surveillance  category nation.&lt;br /&gt; &lt;br /&gt; “India is still low on surveillance. In India, we have targeted  surveillance. At any given point in time, less than 200,000 phone calls  are being intercepted. Not more than a couple of lakh of surveillance  orders are given by both state and central governments,” said Abraham.&lt;br /&gt; &lt;br /&gt; Surely, with so many surveillance devices around,  it is a closely watched world like never before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;SALIENT FEATURES ON PRIVACY IN THE IT ACT, 2008&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Communication Device: Cell phones, personal digital assistance, or  combination of both or any other device used to communicate, send or  transmit any text, video, audio, or image&lt;/li&gt;
&lt;li&gt; Intermediary: Any person, who on behalf of another person, stores or transmits messages or provides any service&lt;/li&gt;
&lt;li&gt; Sections 66A to 66F: Added to Section 66, prescribing punishment  for offences such as sending obscene messages, identity theft, cheating  by impersonation using computer resources, violation of privacy and  cyber terrorism&lt;/li&gt;
&lt;li&gt; Section 69: Amended to give power to the state to issue directions  for interception or monitoring or decryption of any information through  any computer resource&lt;/li&gt;
&lt;li&gt; Sections 69A and B: These grant power to the state to issue  directions for blocking public access of any information through any  computer resource and to authorise to monitor and collect traffic data  or information through any computer resource for cyber security.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats'&gt;https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-05-02T06:43:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project">
    <title>Surveillance Project</title>
    <link>https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project</link>
    <description>
        &lt;b&gt;The Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article will be &lt;a class="external-link" href="http://www.frontline.in/cover-story/surveillance-project/article8408866.ece"&gt;published in Frontline&lt;/a&gt;, April 15, 2016 print edition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Zero&lt;/strong&gt;. The probability of some evil actor breaking into the central store of authentication factors (such as keys and passwords) for the Internet. Why? That is because no such store exists. And, what is the probability of someone evil breaking into the Central Identities Data Repository (CIDR) of the Unique Identification Authority of India (UIDAI)? Greater than zero. How do we know this? One, the central store exists and two, the Aadhaar Bill lists breaking into this central store as an offence. Needless to say, it would be redundant to have a law that criminalises a technological impossibility. What is the consequence of someone breaking into the central store? Remember, biometrics is just a fancy word for non-consensual and covert identification technology. High-resolution cameras can capture fingerprints and iris information from a distance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In other words, on March 16, when Parliament passed the Bill, it was as if Indian lawmakers wrote an open letter to criminals and foreign states saying, “We are going to collect data to non-consensually identify all Indians and we are going to store it in a central repository. Come and get it!” Once again, how do I know that the CIDR will be compromised at some date in the future? How can I make that policy prediction with no evidence to back it up? To quote Sherlock Holmes, “Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth.” If a back door to the CIDR exists for the government, then the very same back door can be used by an enemy within or from outside. In other words, the principle of decentralisation in cybersecurity does not require repeated experimental confirmation across markets and technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Zero&lt;/strong&gt;. The chances that you can fix with the law what you have broken with poor technological choices and architecture. And, to a large extent vice versa. Aadhaar is a surveillance project masquerading as a development intervention because it uses biometrics. There is a big difference between the government identifying you and you identifying yourself to the government. Before UID, it was much more difficult for the government to identify you without your knowledge and conscious cooperation. Tomorrow, using high-resolution cameras and the power of big data, the government will be able to remotely identify those participating in a public protest. There will be no more anonymity in the crowd. I am not saying that law-enforcement agencies and intelligence agencies should not use these powerful technologies to ensure national security, uphold the rule of law and protect individual rights. I am only saying that this type of surveillance technology is inappropriate for everyday interactions between the citizen and the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some software engineers believe that there are technical fixes for these concerns; they point to the consent layer in the India stack developed through a public-private partnership with the UIDAI. But this is exactly what Evgeny Morozov has dubbed “technological solutionism”—fundamental flaws like this cannot be fixed by legal or technical band-aid. If you were to ask the UIDAI how do you ensure that the data do not get stolen between the enrolment machine and the CIDR, the response would be, we use state-of-the-art cryptography. If cryptography is good enough for the UIDAI why is it not good enough for citizens? That is because if citizens use cryptography [on smart cards] to identify themselves to the state, the state will need their conscious cooperation each time. That provides the feature that is required for better governance without the surveillance bonus. If you really must use biometrics, it could be stored on the smart card after being digitally signed by the enrolment officer. If there is ever a doubt whether the person has stolen the smart card, a special machine can be used to read the biometrics off the card and check that against the person. This way the power of biometrics would be leveraged without any of the accompanying harms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Zero&lt;/b&gt;. This time, for the utility of biometrics as a password or authentication factor. There are two principal reasons for which the Act should have prohibited the use of biometrics for authentication. First, biometric authentication factors are irrevocable unlike passwords, PINs, digital signatures, etc. Once a biometric authentication factor has been compromised, there is no way to change it. The security of a system secured by biometrics is permanently compromised. Second, our biometrics is so easy to steal; we leave our fingerprints everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, if I upload my biometric data onto the Internet, I can then plausibly deny all transactions against my name in the CIDR. In order to prevent me from doing that, the government will have to invest in CCTV cameras [with large storage] as they do for passport-control borders and as banks do at ATMs. If you anyway have to invest in CCTV cameras, then you might as well stick with digital signatures on smart cards as the previous National Democratic Alliance (NDA) government proposed the SCOSTA (Smart Card Operating System Standard for Transport Application) standard for the MNIC (Multipurpose National ID Card). Leveraging smart card standards like EMV will ensure harnessing greater network effects thanks to the global financial infrastructure of banks. These network effects will drive down the cost of equipment and afford Indians greater global mobility. And most importantly when a digital signature is compromised the user can be issued a new smart card. As Rufo Guerreschi, executive director of Open Media Cluster, puts it, “World leaders and IT experts should realise that citizen freedoms and states’ ability to pursue suspects are not an ‘either or’ but a ‘both or neither’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Near zero&lt;/b&gt;. We now move biometrics as the identification factor. The rate of potential duplicates or “False Positive Identification Rate” which according to the UIDAI is only 0.057 per cent. Which according to them will result in only “570 resident enrolments will be falsely identified as duplicate for every one million enrolments.” However, according to an article published in &lt;i&gt;Economic &amp;amp; Political Weekly&lt;/i&gt; by my colleague at the Centre for Internet and Society, Hans Verghese Mathews, this will result in one out of every 146 people being rejected during enrolment when total enrolment reaches one billion people. In its rebuttal, the UIDAI disputes the conclusion but offers no alternative extrapolation or mathematical assumptions. “Without getting too deep into the mathematics” it offers an account of “a manual adjudication process to rectify the biometric identification errors”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This manual adjudication determines whether you exist and has none of the elements of natural justice such as notice to the affected party and opportunity to be heard. Elimination of ghosts is impossible if only machines and unaccountable humans perform this adjudication. This is because there is zero skin in the game. There are free tools available on the Internet such as SFinGe (Synthetic Fingerprint Generator) which allow you to create fake biometrics. The USB cables on the UIDAI-approved enrolment setup can be intercepted using generic hardware that can be bought online. With a little bit of clever programming, countless number of ghosts can be created which will easily clear the manual adjudication process that the UIDAI claims will ensure that “no one is denied an Aadhaar number because of a biometric false positive”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Near zero&lt;/b&gt;. This time for surveillance, which I believe should be used like salt in cooking. Essential in small quantities but counterproductive even if slightly in excess. There is a popular misconception that privacy researchers such as myself are opposed to surveillance. In reality, I am all for surveillance. I am totally convinced that surveillance is good anti-corruption technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But I also want good returns on investment for my surveillance tax rupee. According to Julian Assange, transparency requirements should be directly proportionate to power; in other words, the powerful should be subject to more surveillance. And conversely, I add, privacy protections must be inversely proportionate to power—or again, in other words, the poor should be spared from intrusions that do not serve the public interest. The UIDAI makes the exact opposite design assumption; it assumes that the poor are responsible for corruption and that technology will eliminate small-ticket or retail corruption. But we all know that politicians and bureaucrats are responsible for most of large-ticket corruption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why does not the UIDAI first assign UID numbers to all politicians and bureaucrats? Then using digital signatures why do not we ensure that we have a public non-repudiable audit trail wherein everyone can track the flow of benefits, subsidies and services from New Delhi to the panchayat office or local corporation office? That will eliminate big-ticket or wholesale corruption. In other words, since most of Aadhaar’s surveillance is targeted at the bottom of the pyramid, there will be limited bang for the buck. Surveillance is the need of the hour; we need more CCTVs with microphones turned on in government offices than biometric devices in slums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Instantiation technology &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;One&lt;/b&gt;. And zero. In the contemporary binary and digital age, we have lost faith in the old gods. Science and its instantiation technology have become the new gods. The cult of technology is intolerant to blasphemy. For example, Shekhar Gupta recently tweeted saying that part of the opposition to Aadhaar was because “left-libs detest science/tech”. Technology as ideology is based on some fundamental articles of faith: one, new technology is better than old technology; two, expensive technology is better than cheap technology; three, complex technology is better than simple technology; and four, all technology is empowering or at the very least neutral. Unfortunately, there is no basis in science for any of these articles of faith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me use a simple story to illustrate this. I was fortunate to serve as a member of a committee that the Department of Biotechnology established to finalise the Human DNA Profiling Bill, 2015, which was to be introduced in Parliament in the last monsoon session. Aside: the language of the Act also has room for the database to expand into a national DNA database circumventing 10 years of debate around the controversial DNA Profiling Bill, 2015. The first version of this Bill that I read in January 2013 said that DNA profiling was a “powerful technology that makes it possible to determine whether the source of origin of one body substance is identical to that of another … without any doubt”. In other words, to quote K.P.C. Gandhi, a scientist from Truth Labs, “I can vouch for the scientific infallibility of using DNA profiling for carrying out justice.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, though, the infallible science is conducted by fallible humans. During one of the meetings, a scientist described the process of generating a biometric profile. The first step after the laboratory technician generated the profile was to compare the generated profile with her or his own profile because during the process of loading the machine with the DNA sample, some of the laboratory technician’s DNA could have contaminated the sample. This error would not be a possibility in much older, cheaper and rudimentary biometric technology for example, photography. A photographer developing a photograph in a darkroom does not have to ensure that his or her own image has not accidentally ended up on the negative. But the UIDAI is filled with die-hard techno-utopians; if you tell them that fingerprints will not work for those who are engaged in manual labour, they will say then we will use iris-based biometrics. But again, complex technologies are more fragile and often come with increased risks. They may provide greater performance and features, but sometimes they are easier to circumvent. A gummy finger to fool a biometric scanner can be produced using glue and a candle, but to fake a passport takes a lot of sophisticated technology. Therefore, it is important for us as a nation to give up our unquestioning faith in technology and start to debate the exact technological configurations of surveillance technology for different contexts and purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;One&lt;/b&gt;. This time representing a monopoly. Prior to the UID project, nobody got paid when citizens identified themselves to the state. While the Act says that the UIDAI will get paid, it does not specify how much. Sooner or later, this cost of identification will be passed on to the citizens and residents. There will be a consumer-service provider relationship established between the citizen and the state when it comes to identification. The UIDAI will become the monopoly provider of identification and authentication services in India which is trusted by the government. That sounds like a centrally planned communist state to me. Should not the right-wing oppose the Act because it prevents the free market from working? Should not the free market pick the best technology and business model for identification and authentication? Will not that drive the cost of identification and authentication down and ensure higher quality of service for citizens and residents?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competing providers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Competing providers can also publish transparency reports regarding their compliance with data requests from law-enforcement and intelligence agencies, and if this is important to consumers they will be punished by the market. The government can use mechanisms such as permanent and temporary bans and price regulation as disincentives for the creation of ghosts. There will be a clear financial incentive to keep the database clean. Just like the government established a regulatory framework for digital certificates in the Information Technology Act allowing for e-commerce and e-governance. Ideally, the Aadhaar Bill should have done something similar and established an ecosystem for multiple actors to provide services in this two-sided market. For it is impossible for a “small government” to have the expertise and experience to run one of the world’s largest database of biometric and transaction records securely for perpetuity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, I support the use of biometrics. I support government use of identification and authentication technology. I support the use of ID numbers in government databases. I support targeted surveillance to reduce corruption and protect national security. But I believe all these must be put in place with care and thought so that we do not end up sacrificing our constitutional rights or compromising the security of our nation state. Unfortunately, the Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better. Our children will pay a heavy price for our folly in the years to come. To quote the security guru Bruce Schneier, “Data is a toxic asset. We need to start thinking about it as such, and treat it as we would any other source of toxicity. To do anything else is to risk our security and privacy.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project'&gt;https://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-05T15:21:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg">
    <title>Surveillance in the name of Security</title>
    <link>https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg</link>
    <description>
        &lt;b&gt;Surveillance in the name of Security&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg'&gt;https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-12-11T13:47:11Z</dc:date>
   <dc:type>Image</dc:type>
   </item>




</rdf:RDF>
