<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 771 to 785.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cryptoparty-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/theorizing-the-digital-subaltern"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/july-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cryptoparty-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security">
    <title>Surveillance: Privacy Vs Security </title>
    <link>https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security</link>
    <description>
        &lt;b&gt;The Foundation for Media Professionals is organizing a debate at the India International Centre, New Delhi on August 17, 2013. Shri Kapil Sibal will give the opening speech. Natgrid chief Raghu Raman is one of the debaters. Pranesh Prakash is participating in this event as a panelist.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://fmp.org.in/index.php/events"&gt;published by the Foundation for Media Professionals&lt;/a&gt; on their website. Also read the &lt;a class="external-link" href="http://fmp.org.in/index.php/events/eventDetail/51"&gt;blog post&lt;/a&gt; by Vivian Fernandes and Ninglun Hanghal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the backdrop of the recent disclosures by US defense contractor Edward Snowden about the activity of the National Security Agency (NSA) and reports that NSA may have collaborated with India on surveillance program in the country that have raised concerns about privacy and right of citizens, Foundation for Media Professionals (FMP) in partnership with Friedrich Ebert Stiftung (FES) invited Pranesh Prakash to a panel discussion on "Surveillance: Privacy vs. Security".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Guest Speaker&lt;/b&gt;&lt;br /&gt;Kapil Sibal, Union Minister for Communications and Information Technology, Govt. of India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/li&gt;
&lt;li&gt;Saikat Datta, Resident Editor, DNA&lt;/li&gt;
&lt;li&gt;Capt. Raghu Raman, National Intelligence Grid (Natgrid)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Moderator&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Paranjoy Guha Thakurta&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security'&gt;https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-19T05:32:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cryptoparty-bangalore">
    <title>Learn to Protect your Online Activities!</title>
    <link>https://cis-india.org/internet-governance/cryptoparty-bangalore</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society cordially invites you to a CryptoParty!&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;"Governments around the world, are greatly increasing their surveillance of the Internet. Alongside a loss of the private sphere, this also represents a clear danger to basic civil liberties. The good news is that we already have the solution: encrypting communications makes it very hard, if not entirely impossible, for others to eavesdrop on our conversations. The bad news is that crypto is largely ignored by the general public, partly because they don't know about it, and partly because even if they do, it seems too much trouble to implement." (&lt;a href="https://www.techdirt.com/articles/20121009/06132920660/cryptoparty-like-its-1993.shtml"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&lt;img src="https://netzpolitik.org/wp-upload/1012366_534624166585046_1146520866_n.png" alt="yes we scan and obama with headphones" height="167" width="450" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;So lets go and have a party, and teach each other how to crypto!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Everyone is invited! Especially do not hesitate to join if you are not using any crypto at all (yet!)&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cryptoparty-bangalore'&gt;https://cis-india.org/internet-governance/cryptoparty-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-08-13T13:55:20Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness">
    <title>Beyond Property Rights: Thinking About Moral Definitions of Openness</title>
    <link>https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness</link>
    <description>
        &lt;b&gt;It is hard for Westerners to realize just how much we take for granted about intellectual property, and in particular, how much the property owner’s perspective--be it a corporation, government or creative artist--is embedded in our view of the world as the natural order of things.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog post by David Eaves &lt;a class="external-link" href="http://techpresident.com/news/wegov/24244/beyond-property-rights-thinking-about-moral-definitions-openness"&gt;was published in TECH President &lt;/a&gt;on August 6, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While sharing and copying technologies are disrupting some of the  ways we understanding “content,” when you visit a non-Western country  like India, the spectrum of choices become broader. There is less  timidity wrestling with questions like: should poor farmers pay inflated  prices for patented genetically-engineered seeds? How long should  patents be given for life-saving medicines that cost more than many make  in a year? Should Indian universities spend millions on academic  journals and articles? In the United States or other rich countries we  may weigh both sides of these questions--the rights of the owner vs. the  moral rights of the user--but there’s no question people elsewhere,  such as in India, weigh them different given the questions of life and  death or of poverty and development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, conversations about open knowledge outside the  supposedly settled lands of the “rich” often stretch beyond  permission-based “fair use” and “creative commons” approaches. There is a  desire to explore potential moral rights to use “content” in addition  to just property rights that may be granted under statutes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A couple of months ago I sat down in Bangalore with &lt;a href="https://cis-india.org/publications-automated/cis/sunil"&gt;Sunil Abraham&lt;/a&gt;, the founder and executive director of the &lt;a href="https://cis-india.org/"&gt;Center for Internet &amp;amp; Society (CIS)&lt;/a&gt; there, to talk about the center, and his views on the role of  technology and openness in politics and society. One part of our  conversation led to &lt;a href="http://techpresident.com/news/23934/how-technology-and-isnt-helping-fight-corruption-india"&gt;this WeGov column on “I Paid a Bribe”&lt;/a&gt;&lt;a&gt; and the challenge of fighting corruption in India using technology.  Here I want to reflect further on how Sunil and his counterparts may be  radically challenging how we should think about open information more  generally.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we talked, Sunil outlined how people and organizations were using  “open” methodologies to advance social movements or create counter  power. To explain his view he sketched out the following “map” of IP  rights and freedoms to show people use and view the different  “permissions” (some legal, some illegal).&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mapping.png" alt="Mapping the Definition and Use of Open" class="image-inline" title="Mapping the Definition and Use of Open" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As a high-level overview this map offers a general list of the tools  at the disposal of citizens interested in playing with intellectual  property, particularly as they pursue social justice issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the top of the chart are the various forms of “permissions” that a  property owner may (or may not) grant you. Thus at the far left sits  the most restrictive IP regime and, as you move right, the user gets  more and more freedoms (or, if you take the perspective of property  owners, property loses more and more of its formal legal protections and  a different notion, of “moral rights,” arises).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second row divides the permissions and the actors along what  Sunil believes is one of the most important permissions - the  requirement to attribute (or the freedom not to).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, at the bottom, I’ve placed various actors along the spectrum  to both show where they might be positioned in the access debate and/or  how they use these tools to advance their aims. Thus someone like  Lawrence Lessig, the intellectual father of Creative Commons, might  support many uses of information as long as the owner gives permission;  whereas groups like the Pirate Party or the Yes Men edge further out  into uses that may not appear legitimate to a property owner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Particularly interesting is Sunil’s decision to include non-legal  “permissions” such as ignoring the property holders rights in his  spectrum of openness. He sees this as the position of the Pirate Party,  which he suggests advocates that people should have the right to do what  they want with intellectual property even if they don’t have  permission, with the exception, interestingly, of ignoring attribution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also includes two even more radical “permissions” –  counterfeiting, that is claiming that you created the work – and false  attribution – assigning your work to someone else! Sunil sees Anonymous  as often using the former and the Yes Men as using the latter. “They  (the Yes Men) are playing with the attribution layer,” he says, by  conducting actions such as their fake DOW press release about the Bhopal  disaster.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pushing the identity envelope&lt;/b&gt;&lt;br /&gt;To Sunil, the big dividing line is less about legal vs. illegal but  around this issue of attribution. “This is the most exciting area  because this (the non-attribution area) is where you escape  surveillance,” he declares.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“All the modern day regulation over IP is trying to pin an individual  against their actions and then trying to attach responsibility so as to  prosecute them,” Sunil says. “All that is circumvented when you play  with the attribution layer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This matters a great deal for individuals and organizations trying to  create counter power – particularly against the state or large  corporate interests. In this regard Sunil is actually linking the tools  (or permissions) along the open spectrum to civil disobedience. Of  course, such “permissions” are also used by states all the time, such as  pretending that a covert action was the responsibility of someone else,  or simply denying responsibility for some action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, in turn, has some interesting implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is, that it allows Sunil to weave together a number of  groups that might not normally be seen as connected because he can map  their strategies or tools against a common axis. Thus Lawrence Lessig,  the Yes Man, companies and journalists can all be organized based on  what “permissions” they believe are legitimate. For example, journalists  and new publishers are often seen as fairly pro-copyright (it protects  their work) but they are quite happy to ignore the proprietary rights of  a government or corporate document and publish its contents, if they  believe that action is in the public interest. Hence their position on  the spectrum as “willing to ignore proprietary rights.” (Leave aside  government arguments that publishing such documents is “stealing” when,  at least in the US, they are technically already not subject to  copyright.) However, a credible newspaper or journalist would never  knowingly attribute a quote or document to a different person.  Attribution remains sacred, even when legal proprietary rights are not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also tests the notions of who is actually an IP radical. As Sunil  notes: “The more you move to the right the more radical you are. Because  everywhere on the left you actually have to educate people about the  law, which is currently unfair to the user, before you even introduce  them to the alternatives. You aren’t even challenging the injustice in  the law! On the right you are operating at a level that is liberated  from identity and accountability. You are hacking identity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil is thus justifying how the use of “illegal” permissions may  actually be a form of civil disobedience that can be recognized as  legitimate. This is something journalists confront regularly as well.  Many are willing to publish “illegally” obtained leaked documents when  they believe that may serve the public good. What is ethical is not  always legal and so there position on this chart is more nuanced than  one might initially suspect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not to say that Sunil doesn’t believe in the effectiveness of  legal approaches. For him this map represents a more complete range of  choices an activist can choose from as they try to develop their  strategy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So what you do, and the specific change you are trying to  precipitate, you’ll have to determine what strategy you need. Sometimes  working within the left hand group is sufficient. Having a  non-derivative, non-commercial license to enable students to access  academic works, in India, is good enough… But then, to do what the &lt;a href="http://www.democracynow.org/2004/12/6/yes_men_hoax_on_bbc_reminds"&gt;Yes Men did to DOW Chemicals&lt;/a&gt;? You have to be over on the right side.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness'&gt;https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-08-07T09:43:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures">
    <title>Token disclosures?</title>
    <link>https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures</link>
    <description>
        &lt;b&gt;Snowden’s Xkeyscore expose makes a mockery of Twitter’s transparency revelations.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Deepa Kurup was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/token-disclosures/article4986166.ece"&gt;published in the Hindu&lt;/a&gt; on August 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This week, roughly around the same time, two  ‘revelations’ made headlines in the world of technology. The first, the  U.S. National Security Agency’s top secret web surveillance programme,  codenamed Xkeyscore, another expose from the house of Edward Snowden  &amp;amp; Co.; and second, microblogging site Twitter’s third biannual  Transparency Report for the first half of 2013.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The  former exposed a global surveillance net, cast far and wide to freely  (no formal authorisation required) access and mine emails, chats and  browsing histories of millions. The content of the latter report not  only pales in comparison but also raises fundamental questions on just  how much goes on beyond the arguably modest claims made on Twitter’s  transparency charts.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Documents published by &lt;i&gt;The Guardian &lt;/i&gt;have  the NSA claiming that the “widest-reaching” system mining intelligence  from the web had, over a month in 2012, retrieved and stored no less  than 41 billion records on its Xkeyscore servers. These mind-boggling  numbers make a mockery of Twitter’s few hundred access request  disclosures, advocates of online privacy and freedom point out. Then, it  is hardly surprising that a large chunk of global requests came from  the U.S. government: no less than 902 of the total 1,157 requests,  accounting for 78 per cent. A far second is Japan at 8 per cent followed  by the U.K.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;India References&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, both Twitter’s report and the NSA’s Xkeyscore document  have India references. While a map titled 'Where is Xkeyscore' in the  training manual released showing India as one of 150 sites (hosting a  total of 700 servers) indicates that India's very much on the global  surveillance radar of the United States government; the fact that the  India is a new entrant on Twitter's ‘Country Withheld Content Tool’  means that the government here is also making active interventions in  microblogging content. This is very much in line with stances the Indian  government has taken over the last year, swinging indecisively between  asking internet firms to pre-screen content and asking service providers  to take down what it finds offensive.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India, A Bit-Player&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Twitter report states that over the last six months  it has seen an increase in the number of requests received (and eventual  withholding of content) in five new countries: India, Brazil, Japan,  Netherlands and Russia. In terms of numbers, India is still very much a  bit player in the game given it falls under the ‘less than 10 category, a  list where the number of requests for user information made by the  government during this period is fewer than 10. It appears from the  report that Twitter did not honour any of these requests, indicating  that either the requests were too broad or failed to identify individual  accounts.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In the same period, Twitter received two  requests from India to remove content, one from the “government/law  enforcement agency” and the other through a court order. In all, three  tweets were removed by Twitter. No details on the nature of content  removed were available.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Transparency Trends&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;A late entrant to transparency initiatives, Twitter's  bi-annual reports have been applauded by privacy activists as an  initiative that at least attempted to offer a glimpse into the otherwise  opaque medium/industry. According to 'Who Has Your Back' an initiative  by the Electronic Frontier Foundation, which tracks which corporate  helps protect your data from the government, only a third of the 18  internet majors publish Transparency Reports – in fact, Facebook,  WordPress and Tumblr all don't publish.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This article by Deepa Kurup was published in the Hindu on August 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While it's  definitely good that Twitter's providing data for India, post-Edward  Snowden and his revealing PRISM leaks, netizens would question to what  extent this data is representative of the magnitude or extent of user  data tracking. Do governments like the U.S. need to approach Twitter (or  other internet service providers) at all to access detailed user  activity logs, content and metadata?&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Secret Orders Excluded&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Twitter makes it clear that its current report does not include "secret  orders" or FISA disclosures. In another blog related to the Transparency  Report, Jeremy Kessel, Manager, Legal Policy at Twitter Inc, writes  that since 2012, Twitter's seen an uptick in requests to withhold  content from two to seven countries. He writes that while Twitter wants  to publish “numbers of national security requests – including FISA  (Foreign Intelligence Surveillance Act) disclosures – separately from  non-secret requests.” It claims it has “insisted” that the United States  government allow for increased transparency into “secret orders”. “We  believe it’s important to be able to publish numbers of national  security requests – including FISA disclosures – separately from  non-secret requests." Unfortunately, we are still not able to include  such metrics, Twitter states.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;'Not the Whole Truth'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the absence of these metrics, Sunil Abraham, director of Centre for  Internet and Society, feels transparency reports “may not tell us the  whole truth”. The Xkeyscore revelations then may explain why the U.S.  government has made only 902 information requests. “A rogramme like  XKeyScore potentially allows them to capture the very same data without  having to approach Twitter. This is the very same imperative behind the  CMS project in India. Governments across the world want to automate  private sector involvement in blanket surveillance measures so that it  wont serve as a check on their unbridled appetite for data”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He warns that there's a likely “race to the bottom”, given that an  unintended consequence of transparency may be that governments, rather  than being shamed into respect for free speech and privacy, would be  emboldened by the scale of surveillance and censorship in the so-called  democracies such as the US and EU members that are on top of the global  blanket surveillance game.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures'&gt;https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-07T09:30:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night">
    <title>Crypto Night</title>
    <link>https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night</link>
    <description>
        &lt;b&gt;Challenging government snooping at an all-night cryptography party.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Rahul M was &lt;a class="external-link" href="http://caravanmagazine.in/lede/crypto-night"&gt;published in the Caravan&lt;/a&gt; on August 1, 2013. Pranesh Prakash and Bernadette Langle are quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Satyakam Goswami sat in a conference hall in the Institute of Informatics &amp;amp; Communication in Delhi University's South  Campus, furiously typing code into his laptop. He typed the string  “/var/log/tor#”, into a Linux terminal, then turned to me and said, “I  am one step away, man.” It was around midnight on a muggy July Saturday,  and Goswami had been here for six hours. He resumed typing—and cursing  under his breath in Telugu as he realised that the online instructions  he was following weren’t helping.&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify; "&gt;
&lt;p&gt;Around  him, the room bustled with the activity of around 25 other people, all  participants at a Cryptoparty, a cryptography event at which programmers  and non-programmers meet to share information and expertise on tools  that can help thwart government spying.&lt;/p&gt;
&lt;p&gt;Goswami was one of the organisers of the event, which was led by  Bernadette Längle, a German ‘hacktivist’ who is a member of  the Chaos  Computer Club (CCC), Europe’s largest association of hackers. Längle was  one of the organisers of the CCC’s Chaos Communication Congress in  2012, an international hackers’ meet held in Hamburg that year. While  processing participant applications for the Congress, she came across a  group that wanted to organise what they called a “Cryptoparty” at the  meet. “I thought Cryptoparty would be a bunch of guys coming together,  learning crypto and having a party,” she told me. Only at the event did  she realise that Cryptoparties are rather more political affairs, at  which participants experiment with ways of combating governmental  intrusions into privacy and freedom.&lt;/p&gt;
&lt;p&gt;After she graduated, Längle decided she wanted to travel. “I hadn’t  been to America or Asia, and I don’t think I want to enter America,” she  said. “I thought India might be a good point to start.” While she was  exploring her options, she met Goswami online. “I first met Bernadette  on an IRC channel, ‘hasgeek’, where she expressed her interest to come  to India,” Goswami said. “I suggested that she write a proposal to CIS  [the Centre for Internet and Society, in Bangalore].” Längle applied,  and was accepted to work with the organisation for six months.&lt;/p&gt;
&lt;p&gt;When Längle was teaching a one-week course on email cryptography at a  CIS event, a participant suggested to her that she organise a  Cryptoparty in the city. “I thought I was travelling anyway, and I can  make a Cryptoparty everywhere I go,” Längle said. This led to the  Bangalore Cryptoparty on 30 June, followed by the Delhi edition on 6  July. Längle then held a Cryptoparty in Dharamsala in the second week of  July, and plans to hold another in Mumbai in October. At each of these,  she gave tutorials on specific aspects of cryptography, such as the  Pretty Good Privacy (PGP) encryption and decryption program, which  Edward Snowden used to communicate with &lt;i&gt;The Guardian&lt;/i&gt;’s Glenn  Greenwald during their now-famous collaboration. Participants would then  experiment with these tools, sending emails and messages to each other  using secure channels. The Delhi edition, which saw around 70  participants, continued late into the night, with the last exhausted  stragglers shutting off their gadgets and heading home at 4 am.&lt;/p&gt;
&lt;p&gt;I met Längle again the day after the Delhi event; with her was  Pranesh Prakash, policy director at CIS, who is a commentator on issues  related to surveillance and privacy. Both agreed that the Indian  government’s Central Monitoring System programme, as well as Edward  Snowden’s recent leaks, had resulted in a greater interest in  cryptography in the country in recent months. “Without the PRISM stuff,  there wouldn’t have been so many people attending,” Längle said. “People  are concerned about that.” Prakash believes that the NSA leaks have  served as a loud wake-up call about a longstanding state of affairs.  “It’s this I-told-you-so moment for lots of people right now,” he said.  “This isn’t the first time there have been revelations about the NSA  spying beyond their authority. These revelations have been happening at  least since 2006.”&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night'&gt;https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-06T06:04:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/theorizing-the-digital-subaltern">
    <title>Theorizing the Digital Subaltern</title>
    <link>https://cis-india.org/raw/theorizing-the-digital-subaltern</link>
    <description>
        &lt;b&gt;As digital humanities research at CIS proceeds, a number of critical positions have arisen, making it possible to reconcile questions of humanities with the digital realm. This blog entry focusses on race as a factor of research and how it is displayed in the digital. &lt;/b&gt;
        
&lt;p&gt;Digital humanities has
been criticized for a lack of content when compared with research in
the traditional field of humanities. While humanities work deals
mostly with subalternity, politics and what it means to be human, it
has been established that a lot of digital humanities work revolves
mainly around questions of providing access. Access is a good thing
and focussing on it can be helpful. Nonetheless, as has been stated
by Nishant Shah, simply providing access only works in an ideal
world, where all have the gadgets and knowledges of making use of the
research made available through digitalization (Shah: 2012). The
internet is not the discrimination-free, post-gendered space that
cyber-enthusiasts hoped for it to be. As a matter of fact, as Lisa
Nakamura describes, the internet is a space of racial and gendered
&lt;em&gt;re-embodiement &lt;/em&gt;(Nakamura:
2007). Her argument is that in relation to the advancing
biotechnologies, ubiquitous surveillance and pre-emptive profiling,
'racio-visual logic' is reconfiguring the body online (ibid.). Even
if there is actually visibility of marginalized groups online, it is
not always something that actually results in fruitful engagement
with the paradigms of racial discrimination. This means that social
inequalities and racial discrimination marginalizing people offline
are reproduced online. Nakamura exemplifies this in an example by
investigating the website alllooksame.com, where users are encouraged
to participate in racial profiling by labeling pictures of Asians to
be Korean, Chinese or Japanese. A majority of users falsely label the
faces, which shows how the social construction of race can wrongly be
mainstreamed to accommodate visual perceptions of eastern
stereotypes. In this case, as the obviously problematic title of the
website already suggests, simply making spaces for perceived
minorities is more harmful than good. Nakamura also exemplifies how
race is otherwise fetishized online, for example in video games like
&lt;em&gt;Grand Theft Auto&lt;/em&gt;,
portraying non-white protagonists as thugs, or even all-time
favorites like &lt;em&gt;Street Fighter&lt;/em&gt;
or &lt;em&gt;Tekken&lt;/em&gt;, appealing
to the western image of Asians as martial arts superpowers.&lt;/p&gt;
&lt;p&gt;Therefore, the question of
the quality of that access and visibility concerning subaltern groups
should be vitally important to work in the digital humanities, more
than the mere quantity of knowledges available. As Moore-Gilbert
explains in his work on digital subalternity (Moore-Gilbert: 2000),
it is not mainly access and digitalization, which will be equalizing
factors in the digital age. The subaltern is a concept by Antonio
Gramsci, which tries to describe the marginalized groups of people
that do not have access to hegemonic spaces in society. Gayatri
Spivak adds to that concept by saying that not only do the subaltern
not have access to hegemonic power structures, also this denial of
access makes it impossible for the subaltern to express their own
knowledges, as they need to adopt Western ways of knowing to be
heard. A subaltern's own cultural knowledges are therefore omitted
from the discourse and a subaltern can never truly express oneself
(Spivak: 1988).&lt;/p&gt;
&lt;p&gt;Summarizing subalternity
as the oppressed and dispossessed, Mike Kent (2008) defines a new
digital divide, which is opening between people with access to the
internet and abilities to operate a computer, and people to whom, for
some reason, that description does not apply. These people may simply
not own or have access to computers on a regular basis (or at all),
but also may be excluded from a digital discourse, because they have
been marginalized in that discourse from its analog beginnings. One
of the examples was shortly addressed in one of the digital
humanities blogposts, where it was explained that many people in
India seem to believe that the digital is naturally for the
english-speaking world and not available in local languages. These
are therefore excluded in the building of gadgets and internet
infrastructure, leading users to believe that the internet is a
hegemonic space with male, white, western, or at the very least
english-speaking dominance. Therefore local Indian languages are
marginalized and the digital becomes a realm, which marginalizes
non-hegemonic culture and people with different language priorities
have difficulties finding their way into. The problem with
subalternity is that these people are not visibly excluded, and might
not even be aware of their exclusion (Kent: 2008). Providing Indian
language Wikipedia, for example, is part of the solution, but
definitely not all of it. When doing digital humanities work,
archiving or creating access through digitalization, the digital
divide grows and does so even more, as it is not, and cannot be
addressed in such a way that the people being marginalized are put
into a position of realizing the disproportion of knowledge access.&lt;/p&gt;
&lt;p&gt;So merely providing
information online will not result in the diminishment of the priorly
addressed knowledge gap. Even when addressing this gap, it happens in
terms of academics, intellectuals and people with online access
speaking on behalf of people who do not have access to the discursive
space in which these gaps are discussed. The experiences of the
subaltern are only addressed from the outside and without their
presence. This summarizes subalternity under one large, obscure
category, ignoring that the subaltern might need to be addressed
individually, according to race, class, gender, etc., to be able to
gain the knowledges needed to participate in the discourse evolving
around questions of digital humanities. Is it therefore substantive
to include subaltern positions into digital discourses, even if this
means speaking on behalf of certain positions at first to raise
awareness. However, the awareness &lt;em&gt;of &lt;/em&gt;speaking
for someone else should also exist within the discourse and if there
is any way of including subaltern positions directly, they should do
so.&lt;/p&gt;
&lt;p align="LEFT"&gt;Within
the work field of digital humanities, many projects are discussing
the infrastructure and ways of dealing with online knowledges. The
project Digital Humanities Q&amp;amp;A
(&lt;a href="http://digitalhumanities.org/answers/"&gt;http://digitalhumanities.org/answers/&lt;/a&gt;,
or &lt;a href="https://twitter.com/dhanswers"&gt;@DHanswers&lt;/a&gt; on twitter)
offers a platform to ask questions regarding anything concerned with
digital humanities. The community quickly tries to help the poster to
overcome whatever difficulties s_he might be having in 'building'.
And even questions of politics and ethics are discussed in the forum.
This is an important infrastructure for discourse happening outside
of classical academic forms and certainly retains authority through
the amount of other work the researchers participating in the project
are publishing online and off.&lt;/p&gt;
&lt;p align="LEFT"&gt;What
seems to be missing, however, is the acknowledgement that the digital
is not simply something apart from humanity, and is not something
simply extractable and usable as a tool without affecting what it
means to be human. Technology forms our very being from the first
moment of creation in our mother's wombs. It is intrinsic to every
life form in human society and even a complete lack of technology
surrounding someone (if that is even possible), is technological in a
sense that it is perceived as a lack thereof. This does not
necessarily mean that all research work results to digital
humanities, but it does point to the impossibility of leaving
questions of the social, of race, of gender, aside when dealing with
technological development.&lt;/p&gt;
&lt;p align="LEFT"&gt;To
make an analytical example, the technologically focussed concept of
the 'Internet-Geek' or the 'Hacker' gives an outlook on how questions
of race are handled within a digital space. The terms hacker and geek
are being used interchangeably, even though the concepts might
differ. Not all geeks are hackers, however, they occupy the same
space in the mainstream discourse and when speaking of an
internet-geek it is often the assumption that they hack as well.
While the term geek bore negative connotations for years, it seems to
have shaken these with the rise of the digital realm marking the turn
from 'geekism' to 'hacktivism', and with that, geekism as a new type
of expertise. Geeks are no longer seen as friendless mavericks, who
spend their time obsessing about one subject, which the mainstream
culture seems to have little interest in or use for. Much more, the
internet-geek is a political figure, which is often said to have the
best survival skills in the digital age and is able to navigate
through the digital realm like 'a fish takes to water'. The discourse
around geek-ism focusses on the geek as an anti-intellectual figure,
which overcomes classical academia, as “it's unnecessary to get a
college degree in order to be a great coder” (&lt;a href="http://larrysanger.org/2011/06/is-there-a-new-geek-anti-intellectualism/"&gt;Sanger
2011&lt;/a&gt;). However, debates around intellectualism are as old as the
concept of the intellectual itself. Historically, the discourse on
intellectualism has always been paired with antisemitism and the
concept of the intellectual was first used as a derogative term to
attack the left wing group defending the jewish captain Alfred
Dreyfus in late 19&lt;sup&gt;th&lt;/sup&gt; century France. The captain was
sentenced to life imprisonment for the wrongful accusations of having
communicated french military secrets to the German embassy. His
accusation and life sentence served the sustenance of French national
values and enforced nationalism through the 'Othering'&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;
of the jewish captain. Anti-intellectualism therefore historically
springs from structural antisemitism and it is worth looking into how
that concept has been employed in today's digital culture.
Unfortunately, dwelling on the concept of the intellectual is not
possible within the frame of this short exemplary analysis. The
ambivalence of the concept should, however, not go by unnoticed. This
polemic of the discourse is lost in the digital age and there seems
to be little engagement with historical perceptions, which may lead
to essentialists perceptions of knowledges.&lt;/p&gt;
&lt;p align="LEFT"&gt;In
embracing the priorly addressed values of the internet, the figure of
the geek is in most discourses portrayed as anarchic and dismissive
of any form of singular authority, therefore undermining
power-structures and hegemonic knowledges. While these discourses
engage in questions of authority and freedom, it is difficult to find
engagement with the categorial inequalities existent in the digital
realm. The political engagement, which is supposed to be a key
feature in the identity of the hacker, limits itself to questions of
freedom of data and open-source. As has been described before, these
technological concepts restrict themselves to data accessibility, but
do not engage in questions of the quality of access to that data, or
the quality of that data itself. The work of the geek or hacker is
therefore not subversive per se. Rather, hackerism saw the freedom of
internet usage as a right, not a privilege, thereby essentializing a
'survival of the fittest' mentality, which benefits and excuses
aggressive behaviour and therefore alienating more sensitive
positions. This usually results in re-justifying patriarchal
structures and affirming the white, male, heterosexual norm.&lt;/p&gt;
&lt;p align="LEFT"&gt;Within
the last couple of years geek feminism blogs and websites have been
springing up on the web in an attempt to overcome the existing
knowledge gaps, but the linguistic and theoretical reference seems
always to be more along the lines of feminism in an online space and
how much these discourses actually impact hetero-normative
hackerspaces is questionable. Geek feminists therefore seldom
perceive themselves to be part of the hacker-identity, but move in
the realm of feminist theory, where intersectionality with other
categories, such as race, has been established to be a key factor of
analysis. In the hacker-realm, however, when referring to color, what
is mostly being addressed is the ethical direction, in which the
hacker is performing his*&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;
task, as a short search-engine review of the topic implies. So the
political questions the geek or hacker faces, evolve around
cybersecurity, privacy and open spaces on the internet, but do not
engage in what it means to be of a certain race, gender, etc. when
writing code, hacking technologies, or processing knowledges online.
This practice of obscuring categories of inequality does not make
them any less effective, but, as has been shown above, enforce
shallow and often fetishized depictions of online spaces and the
users occupying them. This results in a naturalization of the white,
male perspective and implies every other position to be an
aberration. It is often implied that people of color simply don't
want to participate, instead of seeing the possibility of the spaces
not being inclusive and inviting enough. It has often been said that
hackerspaces are alienating towards women, but the stereotypical
depiction of any ethnic group influences the notion of the hacker to
be of a certain class and race as well. While one might perceive that
Asians occupy a great amount of online space, this does not
necessarily mean fruitful engagement in a critical discourse around
race in cyberspace.&lt;/p&gt;
&lt;p align="LEFT"&gt;So
even if there is no direct racism in online spaces or within the
notion of the hacker, the lack of theorizing race as a category which
is still being seen as inferior leads to informal discrimination and
reinforces a norm that marginalizes people of color. Research and the
building of infrastructure follows these normative interests and
marginalizes interests of groups that do not fit into the privileged
categories. The notions of free internet usage implies a choice which
is not always available, especially within marginalized communities. So it is necessary to engage with the questions of freedom, for whom they apply online, and where freedom and access stop being choices.&amp;nbsp;&lt;/p&gt;
&lt;p align="LEFT"&gt;To
reference Marshall McLuhan, the medium may not necessarily &lt;em&gt;be &lt;/em&gt;the
message, but it does inseparably intertwine itself, so that it is
impossible to tell where medium stops and message begins. If
we accept the premise that we are all cyborgs and digital
technologies are inscribed in our bodies, a mere quantitative
approach to these is not possible and believing technology to simply
be a methodology, a means to end is not either. It is necessary to
find a way to deal with the technological, the data and, in the end,
the internet as a cultural phenomenon which forms our society just as
other media does, but also creates reality in a more accurate and
impacting way than any medium has done before.&lt;/p&gt;
&lt;p&gt;Therefore
when taking a turn towards visualizations and design, one should
remember what it means to visualize and what is being left out in the
process. Of course, articulating something is always a process of
marginalizing something else, as it is simply impossible to include
all positions. However, the necessity to clarify ones own position,
vital in humanities, seems lost in the transition towards digital
humanities. The necessity of critical digital humanities has been
stressed in the past and a number of critical projects have arisen, a
number of which are summarized on the &lt;em&gt;design
for digital inclusion &lt;/em&gt;homepage
from the Washington University:
&lt;a href="https://depts.washington.edu/ddi/research.html"&gt;https://depts.washington.edu/ddi/research.html&lt;/a&gt;.
It is necessary to critically engage with concepts that occupy the
digital space and this short analysis of the hacker may serve as a
starting point for future research.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Annotations:&lt;/p&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;'Othering'
	is a concept introduced by Edward Said, saying that the construction
	of a norm usually develops through the demarcation of what they are
	not. In this case, the french nationality was built upon a notion of
	anti-semitism and the concept of treason as the biggest offense to
	the nation state. The concept of 'othering' has also been employed by several other theorists and subaltern researchers, amongst them Gayatri Spivak. See Said: 1977, Spivak: 1985&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote2"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc"&gt;2&lt;/a&gt;Unless
	explicitly feminist, most literature still addresses the hacker as a
	male figure. Although of course there are several female hackers,
	the concept is still connoted as a male identity. In following, this
	connotation will be applied, however the * indicates the critical
	engagement with the concept, mirroring the differential gap of power
	and authority according to the concept of hegemonic masculinity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;References:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Deleuze, G./Guattari, F. (1993):&amp;nbsp;&lt;em&gt;A Thousand Plateaus. Capitalism and Schizophrenia.&amp;nbsp;&lt;/em&gt;Minnesota: U of Minnesota Press.&lt;/p&gt;
&lt;p&gt;Gold, M.K. (2012):&amp;nbsp;&lt;em&gt;Debates in the Digital Humanities. Open Access Edition&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Kuhn, T. S.(1996):&amp;nbsp;&lt;em&gt;The Structure of Scientific Revolutions&lt;/em&gt;, University of Chicago Press. 3&lt;sup&gt;rd&lt;/sup&gt;&amp;nbsp;edition.&lt;/p&gt;
&lt;p&gt;Kent, M. (2008):&amp;nbsp;&lt;em&gt;Digital Divide 2.0 and the Digital Subaltern.&lt;/em&gt;&amp;nbsp;In: Nebula 5.4, 2008. Accessed July 26&lt;sup&gt;th&lt;/sup&gt;&amp;nbsp;2013:&lt;a href="http://www.nobleworld.biz/images/Kent3.pdf"&gt;http://www.nobleworld.biz/images/Kent3.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Moore-Gilbert, B. (2000):&amp;nbsp;&lt;em&gt;Spivak and Bhabha,&lt;/em&gt;&amp;nbsp;In: Schwarz/Ray (ed.), A Companion to Postcolonial Studies.&amp;nbsp;Oxford: Blackwell Publishers, 2000, p. 453.&lt;/p&gt;
&lt;p&gt;Nakamura, L. (2008):&amp;nbsp;&lt;em&gt;Digitizing Race. Visual Cultures of the Internet.&lt;/em&gt;&amp;nbsp;Minnesota: U of Minnesota Press.&lt;/p&gt;
&lt;p&gt;Said, E. (1977):&amp;nbsp;&lt;em&gt;Orientalism.&lt;/em&gt;&amp;nbsp;London: Penguin&lt;/p&gt;
&lt;p&gt;&lt;a name="parent-fieldname-title"&gt;&lt;/a&gt;Shah, N. (2012):&amp;nbsp;&lt;em&gt;The Digital Classroom in the Time of Wikipedia&lt;/em&gt;&lt;em&gt;.&amp;nbsp;&lt;/em&gt;Accessed July 26&lt;sup&gt;th&lt;/sup&gt;&amp;nbsp;2013:&amp;nbsp;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia"&gt;http://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Spivak, Gayatri Chakravorty. " Can the Subaltern Speak?" in&amp;nbsp;&lt;em&gt;Marxism and the Interpretation of Culture&lt;/em&gt;. Eds. Cary Nelson and Lawrence Grossberg. Urbana, IL: University of Illinois Press, 1988: 271-313.&lt;/p&gt;
&lt;p&gt;Sterne, J. (2000):&amp;nbsp;&lt;em&gt;Computer Race goes to Class. How Computers in Schools Helped Shape the Racial Topography of the Internet.&lt;/em&gt;&amp;nbsp;In: Kolko/Nakamura/Rodman (ed.): Race in Cyberspace. New York/London: Routledge. Accessed 29&lt;sup&gt;th&lt;/sup&gt;&amp;nbsp;July 2013:&amp;nbsp;&lt;a href="http://sterneworks.org/ComputerRaceGoestoClass.pdf"&gt;http://sterneworks.org/ComputerRaceGoestoClass.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/theorizing-the-digital-subaltern'&gt;https://cis-india.org/raw/theorizing-the-digital-subaltern&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sara</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-08-06T07:20:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou">
    <title>The Phishing Society: Why 'Facebook' is more Dangerous than the Government Spying on You - A Talk by Maria Xynou</title>
    <link>https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou</link>
    <description>
        &lt;b&gt;Next Wednesday, you are all invited to listen to Maria Xynou's crazy - or not-so-crazy theory of the "Phishing Society", in which surveillance, control and oppression is not imposed in a traditional top-down manner, but rather a personal and collective "choice"...come and engage in a heated debate! &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;We have read and heard a lot of theories on the contemporary "Surveillance Society"...but how much of that is about surveillance per se? Are we being spied on a top-down manner...or are we enabling our own surveillance? Have the masses ever directly or indirectly "pursued" their own surveillance in the past...or are we witnessing a new phenomenon in history?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Most geeks would probably agree that the term "phishing" is used to describe the act of attempting to acquire sensitive information, such as usernames, passwords, private encryption keys and credit card details, by masquerading as a trustworthy entity. In other words, "phishing" is commonly used to describe the acquisition of sensitive, personal data through the use of bait.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aim of the talk on Wednesday is to discuss the possible existence of a "Phishing Society", through which the act of providing bait &lt;span class="fsl"&gt;&lt;span class="text_exposed_show"&gt;— &lt;/span&gt;&lt;/span&gt;whether it being security, commodities, services or relationships &lt;span class="fsl"&gt;&lt;span class="text_exposed_show"&gt;—&lt;/span&gt;&lt;/span&gt; is a common, contemporary practice on a social, political and economic level in the pursuit of the "Gold of the Digital Age": personal data. Through this discussion, the &lt;strong&gt;"Government spying vs. Corporate spying" &lt;/strong&gt;debate will be looked at, in an attempt to understand why the dynamics of surveillance have changed over the last year.&lt;/p&gt;
&lt;p&gt;Everyone with an open mind is welcome to attend this talk and to share all opinions, ideas and concerns!&lt;/p&gt;
&lt;strong&gt;Video&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&amp;nbsp;&lt;iframe src="//www.youtube.com/embed/nVabV9odeAI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou'&gt;https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-27T09:16:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance">
    <title>More than a Hundred Global Groups Make a Principled Stand against Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance</link>
    <description>
        &lt;b&gt;For some time now there has been a need to update understandings of existing human rights law to reflect modern surveillance technologies and techniques.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nothing could demonstrate the urgency of this situation more than the &lt;a href="https://www.privacyinternational.org/blog/looking-at-prism-nsas-mass-surveillance-program"&gt;recent&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/spy-without-borders"&gt;revelations&lt;/a&gt; confirming the mass surveillance of innocent individuals around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To move toward that goal, today we’re pleased to announce the formal launch of the &lt;a href="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf" class="internal-link"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;. The principles articulate what international human rights law – which binds every country across the globe – require of governments in the digital age. They speak to a growing global consensus that modern surveillance has gone too far and needs to be restrained. They also give benchmarks that people around the world can use to evaluate and push for changes in their own legal systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The product of over a year of consultation among civil society, privacy and technology experts, including the Centre for Internet and Society (read &lt;a href="https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/deeplinks/2012/12/tackling-state-surveillance-and-human-rights-protecting-universal-freedoms"&gt;here&lt;/a&gt;, &lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;here&lt;/a&gt; and &lt;a href="https://www.privacyinternational.org/blog/pi-is-pleased-to-announce-a-public-consultation-on-the-international-principles-on"&gt;here&lt;/a&gt;), the principles have already been co-signed by over hundred organisations from around the world. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;. The process was led by &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt;, &lt;a href="https://accessnow.org/"&gt;Access&lt;/a&gt;, and the &lt;a href="https://eff.org/"&gt;Electronic Frontier Foundation&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The release of the principles comes on the heels of a &lt;a href="https://www.privacyinternational.org/blog/un-report-the-link-between-state-surveillance-and-freedom-of-expression"&gt;landmark&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2013/06/internet-and-surveillance-UN-makes-the-connection"&gt;report&lt;/a&gt; from the United Nations Special Rapporteur on the right to Freedom of Opinion and Expression, which details the widespread use of state surveillance of communications, stating that such surveillance severely undermines citizens’ ability to enjoy a private life, freely express themselves and enjoy their other fundamental human rights. And recently, the UN High Commissioner for Human Rights, Nivay Pillay, &lt;a href="http://www.ohchr.org/EN/NewsEvents/Pages/Media.aspx?IsMediaPage=true&amp;amp;LangID=E"&gt;emphasised the importance&lt;/a&gt; of applying human right standards and democratic safeguards to surveillance and law enforcement activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While concerns about national security and criminal activity may justify the exceptional and narrowly-tailored use of surveillance programmes, surveillance without adequate safeguards to protect the right to privacy actually risk impacting negatively on the enjoyment of human rights and fundamental freedoms," Pillay said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles, summarised below, can be found in full at &lt;a class="external-link" href="http://necessaryandproportionate.org"&gt;necessaryandproportionate.org&lt;/a&gt;. Over the next year and beyond, groups around the world will be using them to advocate for changes in how present laws are interpreted and how new laws are crafted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We encourage privacy advocates, rights organisations, scholars from legal and academic communities, and other members of civil society to support the principles by adding their signature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To sign, please send an email to &lt;a class="mail-link" href="mailto:rights@eff.org"&gt;rights@eff.org&lt;/a&gt;, or visit &lt;a class="external-link" href="https://www.necessaryandproportionate.org/about"&gt;https://www.necessaryandproportionate.org/about&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Summary of the 13 principles&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Legality: Any limitation on the right to privacy must be prescribed by law.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legitimate Aim: Laws should only permit communications surveillance by specified State authorities to achieve a legitimate aim that corresponds to a predominantly important legal interest that is necessary in a democratic society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Necessity: Laws permitting communications surveillance by the State must limit surveillance to that which is strictly and demonstrably necessary to achieve a legitimate aim.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Adequacy: Any instance of communications surveillance authorised by law must be appropriate to fulfill the specific legitimate aim identified.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proportionality: Decisions about communications surveillance must be made by weighing the benefit sought to be achieved against the harm that would be caused to users’ rights and to other competing interests.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Competent judicial authority: Determinations related to communications surveillance must be made by a competent judicial authority that is impartial and independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Due process: States must respect and guarantee individuals' human rights by ensuring that lawful procedures that govern any interference with human rights are properly enumerated in law, consistently practiced, and available to the general public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;User notification: Individuals should be notified of a decision authorising communications surveillance with enough time and information to enable them to appeal the decision, and should have access to the materials presented in support of the application for authorisation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency: States should be transparent about the use and scope of communications surveillance techniques and powers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Public oversight: States should establish independent oversight mechanisms to ensure transparency and accountability of communications surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Integrity of communications and systems: States should not compel service providers, or hardware or software vendors to build surveillance or monitoring capabilities into their systems, or to collect or retain information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards for international cooperation: Mutual Legal Assistance Treaties (MLATs) entered into by States should ensure that, where the laws of more than one State could apply to communications surveillance, the available standard with the higher level of protection for users should apply.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Safeguards against illegitimate access: States should enact legislation criminalising illegal communications surveillance by public and private actors.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance'&gt;https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-31T14:26:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review">
    <title>India's National Cyber Security Policy in Review</title>
    <link>https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review</link>
    <description>
        &lt;b&gt;Earlier this month, the Department of Electronics and Information Technology released India’s first National Cyber Security Policy. Years in the making, the Policy sets high goals for cyber security in India and covers a wide range of topics, from institutional frameworks for emergency response to indigenous capacity building.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;What the Policy achieves in breadth, however, it often lacks in depth. Vague, cursory language ultimately prevents the Policy from being anything more than an aspirational document. In order to translate the Policy’s goals into an effective strategy, a great deal more specificity and precision will be required.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Scope of National Cyber Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Where such precision is most required is in &lt;i&gt;definitions&lt;/i&gt;. Having no legal force itself, the Policy arguably does not require the sort of legal precision one would expect of an act of Parliament, for example. Yet the Policy deals in terms plagued with ambiguity, &lt;i&gt;cyber security&lt;/i&gt; not the least among them. In forgoing basic definitions, the Policy fails to define its own scope, and as a result it proves remarkably broad and arguably unfocused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy’s preamble comes close to defining &lt;i&gt;cyber security&lt;/i&gt; in paragraph 5 when it refers to "cyber related incident[s] of national significance" involving "extensive damage to the information infrastructure or key assets…[threatening] lives, economy and national security." Here at least is a picture of cyber security on a national scale, a picture which would be quite familiar to Western policymakers: computer security practices "fundamental to both protecting government secrets and enabling national defence, in addition to protecting the critical infrastructures that permeate and drive the 21st century global economy."&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; The paragraph 5 definition of sorts becomes much broader, however, when individuals and businesses are introduced, and threats like identity theft are brought into the mix.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here the Policy runs afoul of a common pitfall: conflating threats to the state or society writ large (e.g. cyber warfare, cyber espionage, cyber terrorism) with threats to businesses and individuals (e.g. fraud, identity theft). Although both sets of threats may be fairly described as cyber security threats, only the former is worthy of the term &lt;i&gt;national&lt;/i&gt; cyber security. The latter would be better characterized as cyber &lt;i&gt;crime&lt;/i&gt;. The distinction is an important one, lest cyber crime be “securitized,” or elevated to an issue of national security. National cyber security has already provided the justification for the much decried Central Monitoring System (CMS). Expanding the range of threats subsumed under this rubric may provide a pretext for further surveillance efforts on a national scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from mission creep, this vague and overly broad conception of national cyber security risks overwhelming an as yet underdeveloped system with more responsibilities than it may be able to handle. Where cyber crime might be left up to the police, its inclusion alongside true national-level cyber security threats in the Policy suggests it may be handled by the new "nodal agency" mentioned in section IV. Thus clearer definitions would not only provide the Policy with a more focused scope, but they would also make for a more efficient distribution of already scarce resources.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What It Get Right&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Definitions aside, the Policy actually gets a lot of things right — at least as an aspirational document. It certainly covers plenty of ground, mentioning everything from information sharing to procedures for risk assessment / risk management to supply chain security to capacity building. It is a sketch of what could be a very comprehensive national cyber security strategy, but without more specifics, it is unlikely to reach its full potential. Overall, the Policy is much of what one might expect from a first draft, but certain elements stand out as worthy of special consideration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First and foremost, the Policy should be commended for its commitment to “[safeguarding] privacy of citizen’s data” (sic). Privacy is an integral component of cyber security, and in fact other states’ cyber security strategies have entire segments devoted specifically to privacy. India’s Policy stands to be more specific as to the &lt;i&gt;scope&lt;/i&gt; of these safeguards, however. Does the Policy aim primarily to safeguard data from criminals? Foreign agents? Could it go so far as to protect user data even from its &lt;i&gt;own&lt;/i&gt; agents? Indeed this commitment to privacy would appear at odds with the recently unveiled CMS. Rather than merely paying lip service to the concept of online privacy, the government would be well advised to pass &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback"&gt;legislation&lt;/a&gt; protecting citizens’ privacy and to use such legislation as the foundation for a more robust cyber security strategy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy also does well to advocate “fiscal schemes and incentives to encourage entities to install, strengthen and upgrade information infrastructure with respect to cyber security.” Though some have argued that such regulation would impose inordinate costs on private businesses, anyone with a cursory understanding of computer networks and microeconomics could tell you that “externalities in cybersecurity are so great that even the freest free market would fail”—to quote expert &lt;a href="http://www.schneier.com/blog/archives/2012/10/stoking_cyber_f.html"&gt;Bruce Schneier&lt;/a&gt;. In less academic terms, a network is only as strong as its weakest link. While it is true that many larger enterprises take cyber security quite seriously, small and medium-sized businesses either lack immediate incentives to invest in security (e.g. no shareholders to answer to) or more often lack the basic resources to do so. Some form of government transfer for cyber security related investments could thus go a long way toward shoring up the country’s overall security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy also “[encourages] wider usage of Public Key Infrastructure (PKI) within Government for trusted communication and transactions.” It is surprising, however, that the Policy does not &lt;i&gt;mandate&lt;/i&gt; the usage of PKI. In general, the document provides relatively few details on what specific security practices operators of Critical Information Infrastructure (CII) can or should implement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Where It Goes Wrong&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One troubling aspect of the Policy is its ambiguous language with respect to acquisition policies and supply chain security in general. The Policy, for example, aims to “[mandate] security practices related to the design, &lt;i&gt;acquisition&lt;/i&gt;, development, use and operation of information resources” (emphasis added). Indeed, section VI, subsection A, paragraph 8 makes reference to the “procurement of indigenously manufactured ICT products,” presumably to the exclusion of imported goods. Although supply chain security must inevitably factor into overall cyber security concerns, such restrictive acquisition policies could not only deprive critical systems of potentially higher-quality alternatives but—depending on the implementation of these policies—could also &lt;a href="http://csis.org/blog/diffusion-and-discrimination-global-it-marketplace"&gt;sharpen the vulnerabilities&lt;/a&gt; of these systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not only do these preferential acquisition policies risk mandating lower quality products, but it is unlikely they will be able to keep pace with the rapid pace of innovation in information technology. The United States provides a cautionary tale. The U.S. National Institute of Standards and Technology (NIST), tasked with producing cyber security standards for operators of critical infrastructure, &lt;a href="http://www.computerweekly.com/news/2240183045/NIST-revises-US-federal-cyber-security-standards"&gt;made its first update&lt;/a&gt; to a 2005 set of standards earlier this year. Other regulatory agencies, such as the Federal Energy Regulatory Commission (FERC) move at a marginally faster pace yet nevertheless are delayed by bureaucratic processes. FERC has already &lt;a href="http://www.tripwire.com/state-of-security/compliance/nerc-cip/nerc-cip-version-5-one-giant-leap/"&gt;moved to implement&lt;/a&gt; Version 5 of its Critical Infrastructure Protection (CIP) standards, nearly a year before the deadline for Version 4 compliance. The need for new standards thus outpaces the ability of industry to effectively implement them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fortunately, U.S. cyber security regulation has so-far been technology-neutral. Operators of Critical Information Infrastructure are required only to ensure certain functionalities and not to procure their hardware and software from any particular supplier. This principle ensures competition and thus security, allowing CII operators to take advantage of the most cutting-edge technologies regardless of name, model, etc. Technology neutrality does of course raise risks, such as those &lt;a href="http://www.businessweek.com/magazine/content/10_20/b4178036082613.htm"&gt;emphasized by the Government of India&lt;/a&gt; regarding Huawei and ZTE in 2010. Risk assessment must, however, remain focused on the technology in question and avoid politicization. India’s cyber security policy can be technology neutral as long as it follows one additional principle: &lt;i&gt;trust but verify&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Verification may be facilitated by the use of free and open-source software (FOSS). FOSS provides &lt;i&gt;security through transparency &lt;/i&gt;as opposed to &lt;i&gt;security through obscurity&lt;/i&gt; and thus enables more agile responses to security responses. Users can identify and patch bugs themselves, or otherwise take advantage of the broader user community for such fixes. Thus open-source software promotes security in much the same way that competitive markets do: by accepting a wide range of inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the virtues of FOSS, there are plenty of good reasons to run proprietary software, e.g. fitness for purpose, cost, and track record. Proprietary software makes verification somewhat more complicated but not impossible. Source code escrow agreements have recently gained some traction as a verification measure for proprietary software, even with companies like Huawei and ZTE. In 2010, the infamous Chinese telecommunications giants &lt;a href="http://www.ft.com/intl/cms/s/0/bd360448-7733-11e1-baf3-00144feab49a.html#axzz2ZUalpnWq"&gt;persuaded the Indian government&lt;/a&gt; to lift its earlier ban on their products by concluding just such an agreement.  Clearly&lt;i&gt; trust but verify&lt;/i&gt; is imminently practicable, and thus technology neutrality.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What’s Missing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Level of detail aside, what is most conspicuously absent from the new Policy is any framework for institutional cooperation beyond 1) the designation of CERT-In “as a Nodal Agency for coordination of all efforts for cyber security emergency response and crisis management” and 2) the designation of the “National Critical Information Infrastructure Protection Centre (NCIIPC) to function as the nodal agency for critical information infrastructure protection in the country.” The Policy mentions additionally “a National nodal agency to coordinate all matters related to cyber security in the country, with clearly defined roles &amp;amp; responsibilities.” Some clarity with regard to roles and responsibilities would certainly be in order. Even among these three agencies—assuming they are all distinct—it is unclear who is to be responsible for what.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More confusing still is the number of other pre-existing entities with cyber security responsibilities, in particular the National Technical Research Organization (NTRO), which in an earlier draft of the Policy was to have authority over the NCIIPC. The Ministry of Defense likewise has bolstered its cyber security and cyber warfare capabilities in recent years. Is it appropriate for these to play a role in securing civilian CII? Finally, the already infamous Central Monitoring System, justified predominantly on the very basis of cyber security, receives no mention at all. For a government that is only now releasing its first cyber security policy, India has developed a fairly robust set of institutions around this issue. It is disappointing that the Policy does not more fully address questions of roles and responsibilities among government entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not only is there a lack of coordination among government cyber security entities, but there is no mention of how the public and private sectors are to cooperate on cyber security information—other than oblique references to “public-private partnerships.” Certainly there is a need for information sharing, which is currently facilitated in part by the sector-level CERTS. More interesting, however, is the question of liability for high-impact cyber attacks. To whom are private CII operators accountable in the event of disruptive cyber attacks on their systems? This legal ambiguity must necessarily be resolved in conjunction with the “fiscal schemes and incentives” also alluded to in the Policy in order to motivate strong cyber security practices among all CII operators and the public more broadly.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Next Steps&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s inaugural National Cyber Security Policy is by and large a step in the right direction. It covers many of the most pressing issues in national cyber security and lays out a number of ambitious goals, ranging from capacity building to robust public-private partnerships. To realize these goals, the government will need a much more detailed roadmap.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, the extent of the government’s proposed privacy safeguards must be clarified and ideally backed by a separate piece of &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback" class="external-link"&gt;privacy legislation&lt;/a&gt;. As Benjamin Franklin once said, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” When it comes to cyberspace, the Indian people must demand both liberty and safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, the government should avoid overly preferential acquisition policies and allow risk assessments to be technologically rather than politically driven. Procurement should moreover be technology-neutral. Open source software and source code escrow agreements can facilitate the verification measures that make technology neutrality work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, to translate this policy into a sound &lt;i&gt;strategy&lt;/i&gt; will necessarily require that India’s various means be directed toward specific ends. The Policy hints at organizational mapping with references to CERT-In and the NCIIPC, but the roles and responsibilities of other government agencies as well as the private sector remain underdetermined. Greater clarity on these points would improve inter-agency and public-private cooperation—and thus, one hopes, security—significantly.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Not only is there a lack of coordination among government cyber security entities, but there is no mention of how the public and private sectors are to cooperate on cyber security information—other than oblique references to “public-private partnerships.” Certainly there is a need for information sharing, which is currently facilitated in part by the sector-level CERTS. More interesting, however, is the question of liability for high-impact cyber attacks. To whom are private CII operators accountable in the event of disruptive cyber attacks on their systems? This legal ambiguity must necessarily be resolved in conjunction with the “fiscal schemes and incentives” also alluded to in the Policy in order to motivate strong cyber security practices among all CII operators and the public more broadly.&lt;/span&gt;&lt;/p&gt;
 &lt;/div&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. Melissa E. Hathaway and Alexander Klimburg, “Preliminary Considerations: On National Cyber Security” in &lt;i&gt;National Cyber Security Framework Manual&lt;/i&gt;, ed. Alexander Klimburg, (Tallinn, Estonia: Nato Cooperative Cyber Defence Centre of Excellence, 2012), 13&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review'&gt;https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-31T10:40:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/july-2013-bulletin">
    <title>July 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/july-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of July 2013 can be accessed below. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) welcomes you to the seventh issue of its newsletter for the year 2013. In this issue we bring you &lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report"&gt;a report on the Institute on Internet and Society&lt;/a&gt; held in the month of June, &lt;a href="https://cis-india.org/a2k/blog/comments-on-draft-guidelines-for-computer-related-inventions"&gt;comments submitted&lt;/a&gt; by us to the Office of the Controller General of Patents Designs and Trademarks on the draft guidelines on computer related inventions, &lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-5th-privacy-round-table"&gt;report from the fifth privacy roundtable meeting&lt;/a&gt; held in Kolkata,  updates from Kannada Wikipedia workshops held in &lt;a href="https://cis-india.org/openness/blog/kannada-wikipedia-workshop-at-hubli"&gt;Hubli&lt;/a&gt; and &lt;a href="https://cis-india.org/openness/kannada-wiki-workshop-at-sagara"&gt;Sagara&lt;/a&gt;, a &lt;a href="https://cis-india.org/digital-natives/digital-humanities-for-indian-higher-education"&gt;report on Digital Humanities for higher education&lt;/a&gt;, media coverage, and information on our forthcoming events.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Archives of our newsletters are &lt;a href="https://cis-india.org/about/newsletters/"&gt;here&lt;/a&gt;. Our policies on Ethical Research Guidelines, Non-Discrimination and Equal Opportunities, Privacy, Terms of Website Use and Travel can be&lt;a href="https://cis-india.org/about/policies"&gt; accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS is inviting applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project). To apply for this post, send in your resume to Nirmita Narasimhan (&lt;a href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;). CIS is also seeking applications for the post of &lt;a href="https://cis-india.org/jobs/policy-associate-internet-governance"&gt;Policy Associate&lt;/a&gt; (Internet Governance). To apply send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;).&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another for developing a screen reader and text-to- speech synthesizer for Indian languages:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;CIS and the Centre for Law and Policy Research (CLPR) are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Punjab, Uttarakhand, Maharashtra and Chandigarh:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-punjab-chapter-call-for-comments"&gt;The Punjab Chapter&lt;/a&gt; (by Anandhi Viswanathan, July 31, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-uttarakhand-chapter-call-for-comments"&gt;The Uttarakhand Chapter&lt;/a&gt; (by Anandhi Viswanathan, July 31, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-chandigarh-chapter-call-for-comments"&gt;The Chandigarh Chapter&lt;/a&gt; (by CLPR, July 31, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-maharashtra-chapter-call-for-comments"&gt;The Maharashtra Chapter&lt;/a&gt; (by Anandhi Viswanathan, July 31, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;All the chapters published on the website are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation has given a &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;grant&lt;/a&gt; to CIS to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/a2k"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;(Previously IP Reforms)&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Comments &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/comments-on-draft-guidelines-for-computer-related-inventions"&gt;Comments on the Draft Guidelines for Computer Related Inventions&lt;/a&gt; (by Puneeth Nagaraj, July 31, 2013). The comments were submitted to the office of the Controller General of Patents Designs &amp;amp; Trademarks, Mumbai on July 26, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/the-assocham-international-conference-on-the-interface-between-intellectual-property-and-competition-law"&gt;An International Conference on Interface between Intellectual Property and Competition Law&lt;/a&gt; (organized by ASSOCHAM, July 12, 2013). Nehaa Chaudhari participated in the conference and shares select notes in a blog post.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to Knowledge (Wikipedia)&lt;/b&gt;&lt;br /&gt;The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Bangalore: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and one team member &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; who is working from Delhi office.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/kannada-wikipedia-workshop-at-hubli"&gt;A Kannada Wikipedia Workshop&lt;/a&gt; (organized by CIS-A2K team, July 21, 2013, Hubli). Dr. U.B. Pavanaja gave training to the participants on Wikipedia. Leading newspapers like the Times of India, Vijaya Karnataka, Deccan Herald, VijayaVani, Prajavani, Samyukta Karnataka and HosaDiganta covered the event. Scanned versions of the published articles can be &lt;a href="https://cis-india.org/openness/blog/hubli-workshop-press-coverage.zip"&gt;viewed here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/kannada-wiki-workshop-at-sagara"&gt;A Kannada Wikipedia Workshop at Sagara&lt;/a&gt; (organized by CIS-A2K team, Sagara, July 28, 2013). Dr. U.B. Pavanaja gave a talk on Wikipedia and Kannada Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/telegu-wiki-academy-at-centre-for-good-governance"&gt;Telugu Wiki Academy at Centre for Good Governance&lt;/a&gt; (organized by CIS-A2K and Telegu Wikipedia Community, Centre for Good Governance, Jubilee Hills, Hyderabad, April 9, 2013). T. Vishnu Vardhan participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Note: The event was organized in April but report got published only in July&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/free-software"&gt;Free Software&lt;/a&gt; (organized by Free Software Movement of Karnataka in partnership with Jnana Vikas Institute of Technology, Bidadi, July 24, 2013). Dr. U.B. Pavanaja made a presentation on Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Ongoing Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindu-r-krishna-kumar-august-2-2013-stress-on-posting-articles-on-kannada-wikipedia"&gt;A Workshop on Posting Articles in Kannada on Wikipedia&lt;/a&gt; (organised by the Centre for Proficiency Development Placement Service, University of Mysore, CPDPS premises, Manasagangotri, August 6, 2013). Dr. U.B. Pavanaja is conducting a workshop. The &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/stress-on-posting-articles-on-kannada-wikipedia/article4980552.ece"&gt;announcement was made in an article&lt;/a&gt; by R. Krishna Kumar in the Hindu on August 2, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Press Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/oheraldo-july-27-2013-diana-fernandes-konkani-wikipedia-next"&gt;Konkani Wikipedia next?&lt;/a&gt; (by Diana Fernandes, OHeralO, July 27, 2013). T. Vishnu Vardhan is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Events Organised &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/digital-activism-in-europe"&gt;Delhi: Digital Activism in Europe&lt;/a&gt; (The Sarai Programme, Centre for the Study of Developing Societies, New Delhi, July 8, 2013). Bernadette Längle gave a talk about the hacker scene and digital activism in Europe, with a focus on the &lt;a href="http://ccc.de/en"&gt;Chaos Computer Club&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/open-hardware-lab"&gt;Open Hardware Lab: Play &amp;amp; Invent + Bonus Film Screening&lt;/a&gt; (CIS, Bangalore, August 4, 2013). There was a film screening of &lt;a href="https://en.wikipedia.org/wiki/Theremin:_An_Electronic_Odyssey"&gt;Theremin: An Electronic Odyssey&lt;/a&gt; at the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS began two projects earlier this year. The first one on facilitating research and events on surveillance and freedom of expression is with Privacy International and support from the International Development Research Centre, Canada. The second one on mapping cyber security actors in South Asia and South East Asia is with the Citizen Lab, Munk School of Global Affairs, University of Toronto and support from the International Development Research Centre, Canada:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt;SAFEGUARDS Project&lt;/span&gt;&lt;br /&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/cryptoparty-delhi"&gt;Delhi: Learn to Secure Your Online Communication&lt;/a&gt;! (IIC, DU Campus, Delhi, July 6, 2013). A cryptoparty was held in Delhi. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.cryptoparty.in/dharamsala"&gt;Dharamsala: Learn to Secure Your Online Communication&lt;/a&gt;! (Dharamsala, July 13, 2013). A cryptoparty was held in Dharamsala. This was also covered in an article published in &lt;a href="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night"&gt;the Caravan&lt;/a&gt; on August 1, 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-5th-privacy-round-table"&gt;Privacy Roundtable Meeting&lt;/a&gt; (co-organized by CIS, DSCI, and FICCI, Kolkata, July 13, 2013).  An event report was written by Maria Xynou. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/the-hackers-way-of-reshaping-policies"&gt;The Hackers Way of Reshaping Policies&lt;/a&gt; (CIS, Bangalore, August 2, 2012). Bernadette Langle gave a talk on privacy.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis"&gt;Biometrics or bust? India's Identity Crisis&lt;/a&gt; (organised by the Oxford Internet Institute, Oxford University Press, July 2, 2013). Malavika Jayaram participated as a speaker on UID and Privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/dsci-bpm-2013-conference-notes"&gt;DSCI Best Practices Meet 2013&lt;/a&gt; (organized by DSCI, Anna Salai, Chennai, July 12, 2013). Kovey Coles attended the meeting.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cii-conference-on-act"&gt;Achieve Cyber Security Together&lt;/a&gt; (organized by the Confederation of Indian Industries, Chennai, July 13, 2013). Kovey Coles attended this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Ongoing / Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou"&gt;The Phishing Society: Why 'Facebook' is more dangerous than the Government Spying on You - A Talk by Maria Xynou&lt;/a&gt; (CIS, Bangalore, August 7, 2013). Maria Xynou will give a talk on phishing society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai"&gt;Learn to Protect your Online Activities!&lt;/a&gt; (ACJ - Asian College of Journalism, Second Main Road (Behind M.S. Swaminathan Research Foundation), Taramani, Chennai, August 7, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore"&gt;Privacy Meeting: Brussels – Bangalore&lt;/a&gt; (CIS, Bangalore, August 14, 2013). Gertjan Boulet and Dariusz Kloza will give a talk on privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-delhi"&gt;Privacy Round Table, New Delhi&lt;/a&gt; (co-organised with FICCI and DSCI, FICCI, Federation House, Tansen Marg, New Delhi, August 24, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Columns&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt;How Surveillance Works in India&lt;/a&gt; (by Pranesh Prakash, New York Times, July 10, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt;Can India Trust Its Government on Privacy?&lt;/a&gt; (by Pranesh Prakash, New York Times, July 11, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy"&gt;Parsing the Cyber Security Policy&lt;/a&gt; (by Chinmayi Arun, &lt;a href="http://www.thehoot.org/web/Parsing-the-cyber-security-policy/6899-1-1-19-true.html"&gt;The Hoot&lt;/a&gt;, and cross-posted in &lt;a href="http://thefsiindia.wordpress.com/2013/07/13/indias-national-cyber-security-policy-preliminary-comments/"&gt;Free Speech Initiative&lt;/a&gt;, July 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt;The Difficult Balance of Transparent Surveillance&lt;/a&gt; (by Kovey Coles, July 10, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt;Moving Towards a Surveillance State&lt;/a&gt; (by Srinivas Atreya, July 15, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance&lt;/a&gt; (by Elonnai Hickok, July 31, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-audacious-right-to-be-forgotten"&gt;The Audacious ‘Right to Be Forgotten’&lt;/a&gt; (by Kovey Coles, July 31, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/interview-with-finnish-data-protection-ombudsman"&gt;An Interview with Reijo Aarnio&lt;/a&gt;: Maria Xynou conducted an interview with Reijo, the Finnish Data Protection Ombudsman.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/economic-times-july-30-2013-indu-nandakumar-google-brings-tabs-to-sneak-advertisements-into-your-inbox"&gt;Google brings tabs to sneak advertisements into your inbox&lt;/a&gt; (by Indu Nandakumar, Economic Times, July 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens"&gt;How the world’s largest democracy is preparing to snoop on its citizens&lt;/a&gt; (by Leslie D' Monte and Joji Thomas Philip, July 3, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography"&gt;Geeks have a solution to digital surveillance in India: Cryptography&lt;/a&gt; (by Joanna Lobo, DNA, July 7, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/theregister-uk-phil-muncaster-july-9-2013-indias-centralised-snooping-system-facing-big-delays"&gt;India's centralised snooping system facing big delays&lt;/a&gt; (by Phil Muncaster, The Register, July 9, 2013). CIS is mentioned in this article.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/firstpost-danish-raza-july-10-2013-indias-central-monitoring-system-security-cant-come-at-cost-of-privacy"&gt;India’s Central Monitoring System: Security can’t come at cost of privacy&lt;/a&gt; (by Danish Raza, FirstPost, July 10, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security"&gt;Is CMS a Compromise of Your Security?&lt;/a&gt; (by Rohin Dharmakumar, Forbes India magazine, July 12, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology"&gt;Snooping technology: Will CMS work in India?&lt;/a&gt; (by Pierre Fitter, FirstPost, July 17, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/bbc-uk-july-18-2013-parul-aggarwal-social-media-monitoring"&gt;सावधान आपके प्रोफ़ाइल पर है पुलिस की नज़र!&lt;/a&gt; (by Parul Aggarwal, BBC, July 18, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook"&gt;Your life's an open Facebook&lt;/a&gt; (by Shikha Kumar, DNA, July 21, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop"&gt;Concerns over central snoop&lt;/a&gt; (by Aloke Tikku, Hindustan Times, June 28, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you"&gt;Your telco could help spy on you&lt;/a&gt; (by Joji Thomas Philip, Leslie D'Monte and Shauvik Ghosh, LiveMint, July 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;DNA Profiling Bill&lt;/b&gt;&lt;br /&gt;A sub-committee has been constituted as per the recommendations of the Expert Committee of DNA Profiling Bill. The sub-committee will have a meeting in Hyderabad on August 6, 2013. &lt;a href="https://cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill"&gt;Sunil Abraham is one of the members of the sub-committee&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Cyber Stewards Project&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project.&lt;/p&gt;
&lt;p&gt;Video Interviews&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Part 3: &lt;a href="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin"&gt;Interview with Eva Galperin&lt;/a&gt; (July 10, 2013).&lt;/li&gt;
&lt;li&gt;Part 4: &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake"&gt;Interview with Marietje Schaake&lt;/a&gt; (July 11, 2013).&lt;/li&gt;
&lt;li&gt;Part 5: &lt;a href="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter"&gt;Interview with Amelia Andersdotter&lt;/a&gt; (July 12, 2013).&lt;/li&gt;
&lt;li&gt;Part 6: &lt;a href="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong"&gt;Interview with Lhadon Tethong&lt;/a&gt; (July 15, 2013).&lt;/li&gt;
&lt;li&gt;Part 7: &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-7-jochem-de-groot"&gt;Interview with Jochem de Groot&lt;/a&gt; (July 18, 2013).&lt;/li&gt;
&lt;li&gt;Part 8: &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss"&gt;Interview with Jeff Moss&lt;/a&gt; (July, 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;Cyber Security&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;Blog Entries &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-national-cyber-security-policy-in-review"&gt;India's National Cyber Security Policy in Review&lt;/a&gt; (by Jonathan Diamond, July 31, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/guidelines-for-protection-of-national-critical-information-infrastructure"&gt;Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation?&lt;/a&gt; (by Jonathan Diamond, July 31, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Free Speech, Expression and Censorship&lt;/b&gt;&lt;br /&gt;Column&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/down-to-earth-july-17-2013-nishant-shah-you-have-the-right-to-remain-silent"&gt;You Have the Right to Remain Silent&lt;/a&gt; (by Nishant Shah, July 22, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights"&gt;Connaught Summer Institute on Monitoring Internet Openness and Rights&lt;/a&gt; (organized by the Munk School of Global Affairs, Bloor Street West, July 23, 2013). Malavika Jayaram participated in this event and spoke on "&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#jayaram"&gt;India's Civil Liberties Crisis: Digital Free Will in Free Fall&lt;/a&gt;".&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation is executing a project to create a knowledge repository on Internet and society. This repository will comprise content targeted primarily at civil society with a view to enabling their informed participation in the Indian Internet and ICT policy space. The repository is available at &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report"&gt;Institute on Internet and Society: Event Report&lt;/a&gt; (supported by Ford Foundation, Golden Palms Resort, Bangalore, June 8 – 14, 2013). Pranesh Prakash, Bernadette Längle, Vir Kamal Chopra, AK Bhargava, Ananth Guruswamy, Archana Gulati, Chakshu Roy, Elonnai Hickok, Gaurab Raj Upadhaya, Helani Galpaya, Michael Ginguld, Dr. Nadeem Akhtar, C. Nandini, Dr. Nirmita Narasimhan, Dr. Nishant Shah, Parminder Jeet Singh, Ravikiran Annaswamy, Dr. Ravina Aggarwal, Satyen Gupta, Dr. Subbiah Arunachalam, Sunil Abraham, Tulika Pandey and T. Vishnu Vardhan were speakers at the event. The presentations and videos can now be accessed in this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/business-standard-op-ed-shyam-ponappa-july-3-2013-building-up-vs-tearing-down"&gt;Building Up vs Tearing Down&lt;/a&gt; (by Shyam Ponappa, July 3, 2013, originally published in the Business Standard, and also mirrored in Organizing India Blogspot).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-humanities-for-indian-higher-education"&gt;Digital Humanities for Indian Higher Education&lt;/a&gt; (co-organised by HEIRA, CSCS, Tumkur University, Tata Institute of Social Sciences, Mumbai and CIS, Indian Institute of Science, Bangalore, July 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-talk-at-cis"&gt;Digital Humanities Talk&lt;/a&gt; (CIS, Bangalore, July 31, 2013). Sara Morais gave a talk on the advantages and problems in doing digital humanities work.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/iippee-july-8-2013-fourth-annual-conference-in-political-economy"&gt;Political Economy, Activism and Alternative Economic Strategies&lt;/a&gt; (organized by the International Institute of Social Studies, Erasmus University of Rotterdam, The Hague, July 9 – 13, 2013). Nishant Shah presented his paper on paper on &lt;a href="http://onlinelibrary.wiley.com/doi/10.1111/dech.12036/full"&gt;Citizen Action in the Time of Network.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/designing-change-gatekeepers-in-digital-humanities"&gt;Designing Change? Gatekeepers in Digital Humanities&lt;/a&gt; (by Sara Morais, July 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/towards-critical-tool-building"&gt;Towards Critical Tool-building&lt;/a&gt; (by Sara Morais, July 12, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p&gt;Follow us elsewhere&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Support Us&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Request for Collaboration&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/july-2013-bulletin'&gt;https://cis-india.org/about/newsletters/july-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-08-21T09:30:32Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf">
    <title>International Principles on the Application of Human Rights to Communications Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf'&gt;https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-31T09:02:12Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cryptoparty-chennai">
    <title>Chennai: Learn to Protect your Online Activities!</title>
    <link>https://cis-india.org/internet-governance/cryptoparty-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society cordially invites you to a Crypto Party at Asian College of Journalism Second main Road (Behind M.S. Swaminathan Research Foundation) Taramani in Chennai on August 7, 2013, 4.30 p.m. to 6.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Governments around the world, are greatly increasing their surveillance of the Internet. Alongside a loss of the private sphere, this also represents a clear danger to basic civil liberties. The good news is that we already have the solution: encrypting communications makes it very hard, if not entirely impossible, for others to eavesdrop on our conversations. The bad news is that crypto is largely ignored by the general public, partly because they don't know about it, and partly because even if they do, it seems too much trouble to implement." (&lt;a href="https://www.techdirt.com/articles/20121009/06132920660/cryptoparty-like-its-1993.shtml"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&lt;img alt="yes we scan and obama with headphones" height="167" src="https://netzpolitik.org/wp-upload/1012366_534624166585046_1146520866_n.png" width="450" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;So lets go and have a party, and teach each other how to crypto!&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Everyone is invited! Especially do not hesitate to join if you are not using any crypto at all (yet!)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai-1/at_download/file"&gt;Here is a Flyer / Printout for you&lt;/a&gt; to spread the message!&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cryptoparty-chennai'&gt;https://cis-india.org/internet-governance/cryptoparty-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bernadette</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Crypto Party</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-01T12:16:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you">
    <title>Your telco could help spy on you</title>
    <link>https://cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you</link>
    <description>
        &lt;b&gt;Telecom minister gives approval to changes in rules for mobile licences to enable such mass surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Joji Thomas Philip, Leslie D'Monte and Shauvik Ghosh was originally &lt;a class="external-link" href="http://www.livemint.com/Politics/rpWFiDJroLgpLQ6yKdR3pJ/Telcos-to-soon-link-with-government-monitoring-system.html"&gt;published in Livemint&lt;/a&gt; on July 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Telecom companies and Internet service providers will soon help the government monitor every call made, every email sent and every website visited, with the Centre deciding to connect their networks to its automated surveillance platform known as the Centralised Monitoring System (CMS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Communications minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Kapil%20Sibal"&gt;Kapil Sibal&lt;/a&gt;&lt;/span&gt; has approved changes in existing rules and new clauses to be inserted  in mobile licences for enabling such mass surveillance, copies of  documents reviewed by &lt;i&gt;Mint&lt;/i&gt; reveal.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/o1r6OSv-WyI" width="320"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;The department of telecommunications (DoT) will shortly send a letter to all telcos asking them to connect their “lawful interception system (LIS)” to the CMS “at a regional monitoring centre through an interception, store and forward (ISF) server placed in the licensee’s premises”, according to the documents.&lt;/p&gt;
&lt;p&gt;Telcos including &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Bharat%20Sanchar%20Nigam%20Ltd"&gt;Bharat Sanchar Nigam Ltd&lt;/a&gt;&lt;/span&gt; (&lt;span class="brand"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/BSNL"&gt;BSNL&lt;/a&gt;&lt;/span&gt;), &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Mahanagar%20Telephone%20Nigam%20Ltd"&gt;Mahanagar Telephone Nigam Ltd &lt;/a&gt;&lt;/span&gt;(MTNL), &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Reliance%20Communications%20Ltd"&gt;Reliance Communications Ltd&lt;/a&gt;&lt;/span&gt;, &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Bharti%20Airtel%20Ltd"&gt;Bharti Airtel Ltd&lt;/a&gt;&lt;/span&gt;, &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Vodafone%20India%20Ltd"&gt;Vodafone India Ltd&lt;/a&gt;&lt;/span&gt; and &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Tata%20TeleServices%20Ltd"&gt;Tata TeleServices Ltd&lt;/a&gt;&lt;/span&gt; declined to comment on questions emailed in this regard.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;“The automated process of the CMS will be subjected to the same  regulatory scrutiny as is available in the present manual system under  Section 5(2) of Indian Telegraph Act and Rules 419-A thereunder, with  the added advantage of having a safeguard against any illegal  provisioning by the telecom service providers in the present system,  however, remote it may be,” DoT said in an email reply to a  questionnaire with a brief on CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Safeguard has also been built against any unauthorized provisioning by having a different interception provisioning agency than the interception requisitioning and monitoring agencies thus having an inbuilt system of checks and balances. Further, a non-erasable command log will be maintained by the system, which can be examined anytime for misuse, thus having an additional safeguard,” DoT said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS was approved by the cabinet committee on security (CCS) on 16 June 2011, with government funding of Rs.400 crore. It is expected to enable the government to monitor all forms of communication, from emails to online activity to phone calls, text messages and faxes by automating the existing process of interception and monitoring. The government completed a pilot project in September 2011 under which the Centre for Development of Telematics (C-DoT) installed two ISF servers, one of them for MTNL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The interception services have been integrated and tested successfully for these two telecom services providers (TSPs),” the note said, referring to MTNL and Tata Communications Ltd. MTNL officials declined to comment. There was no response to queries by Tata Communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It added that training had been imparted to six law enforcement agencies—the Intelligence Bureau, the Central Bureau of Investigation, the Directorate of Revenue Intelligence, the Research and Analysis Wing, the Delhi Police and the National Investigation Agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the documents also reveal that the CMS project is getting delayed over technical issues such as lawful interception systems sending the intercept-related information (IRI) in “their own proprietary format”; difficulty in tracing the movement of “the target from the home network to the roaming network”; and how to independently provision voice and data interception of mobile users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is simultaneously devising a strategy to counter criticism from the media and privacy lobby groups that this surveillance platform has no privacy safeguards. Mint reported on 13 July that fresh questions were raised on the CMS infringing on the rights of individuals, especially in the wake of the US government’s PRISM surveillance project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an  internal note on 16 July to help Sibal brief the media, DoT said even  as the CMS will automate the existing process of interception and  monitoring “... all safeguards that are currently in place in the manual  mode of interception will continue”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The note argued that  implementation of the CMS “will rather enhance the privacy of the  citizens” since it will not be necessary to take the authorization (for  tapping) to the nodal officer of the telecom service providers “who  comes to know whose or which phone is being intercepted”. The  note added that after the CMS is implemented, provisioning of  interception will be done by a CMS authority, who would be different  from the law enforcement agency authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  law enforcement agency (LEA) cannot provision for interception and  monitoring and the CMS authority cannot see the content but would be  able to provision the request from the LEA.Hence, complete check and  balance will be ensured. Further, a non-erasable command log will be  maintained by the system, which can be examined anytime for misuse, thus  having an additional safeguard,” added the department’s note briefing  the minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also,  acknowledging that “questions were being asked about the practices of  Indian agencies and the privacy and rights of its citizens”, national  security adviser &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shivshankar%20Menon"&gt;Shivshankar Menon&lt;/a&gt; in a 23 June note to the ministries of home, external affairs and  telecom, the department of electronics and information technology, and  the cabinet secretary said: “Only home secretaries of the Centre and  states can authorize such monitoring; orders are valid for two months,  are not extendable beyond six months; records are to be maintained, use  of storage is limited and a review committee of cabinet secretary, law  secretary and secretary of the telecom department regularly screens all  cases.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Menon also admitted that when it came to individual privacy rights, there were “larger issues that needed serious consideration and wider consultation with industry, advocacy groups and NGOs (non-governmental organizations) as has been the case so far in the draft privacy Bill... For data protection and retention in India, however, there may be a need to consider legislation or strengthening existing legislation, as the march of technology has made most present laws irrelevant.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy experts are convinced that safeguards are needed, especially since India does not have a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To safeguard public interest, the government should also draft a law  that will make it a criminal offence if a CMS authority is found in  possession of any personal information culled through the CMS. That will  prove to be a deterrent,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;,  executive director of the Centre for Internet and Society, a privacy  lobby body. “Also, the government must build an audit trail using PKI  (public key encryption) and people as an additional safeguard.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As I understand it, there is also no clear statutory backing for the CMS,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Apar%20Gupta"&gt;Apar Gupta&lt;/a&gt;&lt;/span&gt;,  a partner at law firm Advani and Co. that specializes in information  technology (IT) law. “What is important is that every tapping order  should be backed by a reason. This was the case with the manual process.  Will this be possible in an automated surveillance system such as the  CMS?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What is disturbing is that there is no transparency with regard to the  CMS. Everything is happening under the radar with media reports  periodically giving us glimpses into the project,” he said. “A state  should protect its interests but should do so in a manner that  safeguards privacy and limits abuse.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the &lt;i&gt;Freedom on the Net 2012&lt;/i&gt; report by Freedom House,  an independent privacy watchdog body, of the 47 countries analysed, 19  had introduced new laws or other directives since January 2011 that  could affect free speech online, violate users’ privacy, or punish  individuals who post certain types of content. India, which scored 39  points out of 100 (score achieved out of 100 for censoring the  Internet), was termed partly free by the report, which was released on  24 September.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Globally, 79% of the respondents in another study said they were  concerned about their privacy online, with India (94%), Brazil (90%) and  Spain (90%) showing the highest level of concern, according to a June  survey undertaken by research firm ComRes, and commissioned by Big  Brother Watch, an online privacy campaign.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you'&gt;https://cis-india.org/news/livemint-july-30-2013-joji-thomas-philip-leslie-d-monte-shauvik-ghosh-your-telco-could-help-spy-on-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-30T06:13:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report">
    <title>Institute on Internet &amp; Society: Event Report</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report</link>
    <description>
        &lt;b&gt;The Institute on Internet and Society organized by the Centre for Internet and Society (CIS) with grant supported by the Ford Foundation took place from June 8 to 14, 2013 at the Golden Palms Resort in Bangalore.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;A total of 20 participants spent the seven days in a residential institute, learning about the fundamental technologies of the Internet and topics on which CIS has expertise on such as Accessibility, Openness, Privacy, Digital Natives and Internet Governance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants belonged to various stakeholder groups and it provided a common forum (first of its kind in India) to discuss and share ideas. Twenty-four expert speakers from various domains came to share their knowledge and speak about their work, so as to encourage activity in the field and supply resources from which participants could learn to increase their accessibility, range and funding possibilities, as well as network with the speakers and amongst themselves.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Institute has triggered a&amp;nbsp; number of follow-up events — those that the participants organized themselves with the help of CIS staff, including Crypto Parties in Bangalore, Delhi and Mumbai, that taught netizens to keep their online communication private. In addition to that, the CIS Access2Knowledge (A2K) team could rope in eight new Wikipedians who will contribute to Wikipedia in Indic languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The day wise talks and activities that took place are listed below:&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 1: June 8, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The seven day residential Institute began on Saturday, the 8th of June with a warm welcome by Dr. Ravina Aggarwal and Dr. Nirmita Narasimhan. They outlined the purpose of the residential institute and briefly went over the topics which would get covered over the week long duration. This was followed by each of the participants introducing themselves briefly and also stating their expectations from the Institute, why they were attending the same and what they hope to get at the end.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session 1: History of the Internet&lt;/h3&gt;
&lt;p&gt;(by Pranesh Prakash and Bernadette Längle)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Pranesh.png/@@images/539b71f7-111a-4700-a90b-17cbdb5589bc.png" alt="" class="image-inline" title="Pranesh Prakash" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Above is a picture of Pranesh Prakash &lt;br /&gt;speaking about the History of the Internet during &lt;br /&gt;the first session on Day 1.&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;The Institute proceedings kicked off with the first session, &lt;strong&gt;History of the Internet&lt;/strong&gt; by Pranesh Prakash and Bernadette Längle. Participants learned where the Internet originally came from and how it is organized, as well as different technologies surrounding the Internet. Pranesh Prakash and Bernadette Längle set the start point of the Internet in the late 50's when the Russians send the first satellite in space (Sputnik) and the US founded the DARPA(&lt;em&gt;Defense Advanced Research Projects Agency&lt;/em&gt;), a research agency that was tasked with creating new technologies for military use. DARPA is credited with development of many technologies which have had a major effect on the world, including computer networking, as well as NLS, which was both the first hypertext system, and an important precursor to the contemporary ubiquitous graphical user interface (GUI). A few years later the first four computers were connected to a network.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;After the Network Control Protocol (NCP, later replaced by the TCP/IP)  was invented in 1970, the first applications were made: email  (connecting people), telnet (connecting computers) and the file  transport protocol (FTP) (connecting information) — all of these are  still in use today. Participants were surprised to learn that the Web,  most commonly used today, known to be invented by one single person in  the 90's, actually existed for a long time prior to the '90s.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/p4iFqDnhNZI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Domestic Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash)&lt;br /&gt;After lunch, Pranesh Prakash led the second session about Domestic Bodies and Mechanisms and he started with some of the problems associated with the Domestic Regulatory Bodies:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Lack of coherence and consistency in Internet related policies&lt;/li&gt;
&lt;li&gt;Rather than co-operating, the different agencies compete with each other.&lt;/li&gt;
&lt;li&gt;Communication with the public is of different degrees and openness of different agencies varies.&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Department of Electronics and Information Technology (DEITY), is one of the most important public agencies &amp;amp; the CERT-in focuses on issues like malware and content regulation. There is also the STQC (Standard Setting and Quality Setting Body).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The work of these organizations is to govern the Internet, bring about better privacy policies and ensure freedom of speech.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Other governing bodies include DOT (Department of Telecommunications) which governs the telecom and internet policies of India. In India, certain content regulation takes place under a notification as part of the IT Act, 2003.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;TRAI (Telecom Regulatory Authority of India) also looks into the tariff, interconnections and quality of telecom sector, spectrum regulation and so on.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The USOF (Universal Service Obligation Fund) seeks to provide funds for setting up telecom services in rural areas.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ministry of Information and Broadcasting (MIB) has been extending copyright restrictions to online publications.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VIDEO&lt;br /&gt;&lt;/h3&gt;
&lt;iframe src="//www.youtube.com/embed/e0VlI12fODE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: Emerging trends in Internet usage in India&lt;/h3&gt;
&lt;p&gt;(by Nandini C and Vir Kamal Chopra)&lt;br /&gt;&lt;strong&gt;Emerging Trends in Internet Usage with specific focus on BSNL offerings&lt;/strong&gt; (by Vir Kamal Chopra)&lt;br /&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;In 1995, the VSNL provided internet in 4 metros of India, by 1998 DOT had provided internet in 42 cities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the facilities internet provides include Tele-education, Tele-medicine, mobile banking, payment of bills via mobile internet, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL has got maximum broadband market share in India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Present Scenario, there are 900 million mobiles in India, 430 million wireless connections with capability to access data.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The total broadband connections are 15 million in country, 10 million provided by BSNL.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Total internet users are 120 million with a growth rate of 30%.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Public access is not only about network intermediaries but about info-mediaries who understand internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL lost Rs 18,000 crores from 3G license.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G to 3G shifting is not seamless and leads to lot of packet loss, and 3G coverage is not as extensive as 2G. Thus 3G is not efficient however; the government has made a lot of money from selling 3G licenses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Future trends include technology trends for internet access, optical fiber technologies, fiber to the curb, fibre to the home, metro Ethernet, etc. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet has created an online Public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 2000 Parliament passed the Information Technology Act 2000 and the dot.com boom is seen.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Making internet access meaningful in the Indian Context&lt;/strong&gt; (by Nandini.C) &lt;br /&gt;(&lt;a class="external-link" href="http://internet-institute.in/repository/womens-access-to-the-internet"&gt;Click to see the presentation slides&lt;/a&gt;)&lt;br /&gt;Some of the salient points discussed were: &lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Status of internet access today sees&amp;nbsp;low level of overall penetration of internet, high rate of household mobile penetration and&amp;nbsp;huge rural-urban divide in internet access.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relationship b/w women and internet in India&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 8.4% of women in India have access to internet in India and 43% of women using internet in India perceived it as being an important part of their life.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Some area of concerns include ensuring adequate access of internet for the women, entrenched patriarchies, contextual relevance, the imaginary of ‘public access’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The importance of an existing strong social support network, ITC itself cannot open up economic/social empowerment opportunities for women&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; ICT-enabled micro-enterprises may also force the burden of double work on women, who undertake both productive activities for the micro-enterprise and re/productive activities for the household.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The Internet today has created an online public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Countering the threat of online violence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Censorship and content regulation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Women’s rights and the spaces of internet governance.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Arbitrary censorship and self-regulation by the corporate and slide towards an illusory freedom; state is used as a bogeyman by corporate to create an online culture that is suitable to the corporate values.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/CUaGZh5nNR4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify;"&gt;&lt;strong&gt;﻿Activity&lt;/strong&gt;&lt;br /&gt;Day 1 featured an interesting activity called the Creative Handshake. The goal of the game was to teach the participants the concept of "Handshake" in Internet terms and why it is important to make sure that integrity of data transferred is maintained.&lt;/div&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 2: June 9, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The focus of the second day was more on the nuts and bolts behind the working of the Internet by Dr. Nadeem Akhtar, Wireless Technologies and a case-study in Air Jaldi by Michael Ginguld, Collaborative Knowledge base building by Vishnu Vardhan and Affordable Devices on the Internet by Ravikiran Annaswamy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points of each of the talks are listed below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: How Internet Works&lt;/h3&gt;
&lt;p&gt;(by Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/how-internet-works"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Internet structure and hierarchy:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Data Networks comprise of set of nodes, connected by transmission links, for exchange of data between nodes. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the key principles which underpin data networks include digital transmission, multiplexing and data forwarding/routing.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Data networks through ownership include public and private networks.&lt;/li&gt;
&lt;li&gt;Data networks through coverage include local area networks (small area), metro area networks (may comprise of a city) and wide area networks (wide geographic area across cities).&lt;/li&gt;
&lt;li&gt;Protocols include:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Open systems interconnection (OSI) model divides a communication system into smaller parts. Each part is referred to as a layer. Similar communication functions are grouped into logical layers.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OSI model defines the different stages that data must go through to travel from one device to another over a network &amp;amp; this enables a modular approach towards developing complex system functionality i.e. functionality at layer X does not depend on how layer Y is implemented.&lt;/li&gt;&lt;/ol&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nadeem.png" alt="" class="image-inline" title="Nadeem Akhtar" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Dr. Nadeem Akhtar speaking on the working of the internet on Day 2&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;
&lt;li&gt;Internet networks or connections.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers on the internet and these data routes are hosted by commercial, government, academic and other high-capacity network centers, the internet exchange points and network access points. The internet back bone is decentralized.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Transit Service - Passing information from small ISP to large ISP.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Peering Service - The passing of information between two similar ISP’s os similar size to let network traffic pass.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Three levels of network Tier1, Tier2 and Tier 3. TATA Company is the only Tier 1 Indian Company.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Backhaul- Transport Links which connects access edge networks with the ‘core’ network. The transmitters have to be mounted on a high level. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/8skb7ykF9jI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: Wireless Technologies&lt;/h3&gt;
&lt;p&gt;(by Michael Ginguld)&lt;br /&gt;&lt;a class="external-link" href="http://prezi.com/tjaiatxtz1ch/walking-on-the-wireless-side/"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We are surrounded by electromagnetic radiation&lt;/li&gt;
&lt;li&gt;All about transmission waves and there are both advantages and disadvantages of the same:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Pros: higher reach for lower price, overcomes topographic challenges, lower maintenance, less to damage/lose&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cons: limited resources, maintenance (energy), physical limitations to transfer rates.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite/VSAT is a very small aperture tech: a small satellite dish that connects to a geo-static satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Strength: globally usable, can connect from anywhere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Weakness: signal problems, relatively high installation charge, upstream connection is lower than the downstream, transmitter on satellite is extremely expensive, hence limitation on transmission capacity of the satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; VSATs are not scalable. It is a dead-end tech for usages where data transmission volume is expected to grow.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G Technology for mobile connection.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Limitation in transfer of data, due to technology and encryption limitations but great availability and reasonable price.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;3G Technology has a problem in India; low uptake, leading to low investment, leading to low speed, leading to low uptake. The technology allows for high-speed data transfer but the market condition in India still does not make adequate infrastructural support feasible.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;4G license auction.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A company bought the country-wide 4G license in the auction. Mukesh Ambani bought the company after some days.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The present legislation does not allow for VoIP-based Telco operation but that is expected to change soon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Wifi technology is wireless technology. It is low cost wireless transfer of data.&amp;nbsp; The Public dissemination of the ranges in which data transfer using the WiFi protocol can take place.&amp;nbsp; It was made public in India in January 2005.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Limitations: needs line of sight, limit to data transfer.&lt;/li&gt;
&lt;li&gt;Strength: cheap, de-licensed spectrum usage, easily deployable. &lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G spectrum, 3G spectrum and now 4G spectrum all are part of the wireless technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Air Jaldi started in Dharamshala; building wifi connection spanning campuses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Three types of consumer categories: (1) no coverage, (2) under-served, and (3) ‘deserving clients’. #2 is the most common group. #3 are people who should be served but cannot pay fully for the service, hence are cross-subsidised by group #2.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Deployed and managed by local staff, trained by AirJaldi.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Customer premise equipment: Rs. 3-4k.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; User charges: Rs 975 per month for 512 kbps, Rs 1500 per month for 1 mbps.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Content: by and large, AirJaldi brings infrastructure on which content can ride on, teams with various content providers (like e-learning, rural BPOs, local e-banking etc) for the content side. The biggest drivers are local BPO, banking and retail. The next big driver coming up is entertainment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; WiMax includes 4g spectrum. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/btd4MqOSRe0" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Building Knowledge Bases and Platform via Mass Collaboration on the Internet&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://commons.wikimedia.org/wiki/File:Building_Knowledge_Bases_and_Platforms_via_Mass_Collaboration_on_the_Internet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The session started off with some physical activity in the form of "Kasa Kasa Warte, Chan Chan Warte" to break off the lunch induced sleep and a mental activity where the participants were divided into two groups and both the groups were asked to collect information on "Water". One group was left to itself while the other had some expert inputs from Vishnu Vardhan on how to collaborate and organize the data. After the activity, both teams presented the information that they had collected on "Water".&lt;/p&gt;
&lt;p&gt;The benefits of collaborative authoring such as "everyone's voice  is heard", "various inputs leading to a multi-dimensional thinking" etc  were evident as against a single dimensional thought process that was  seen from the group that was un-assisted.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Participant.png/@@images/0bd8de0e-6e85-4100-80c7-070dd046fabf.png" alt="" class="image-inline" title="Participants" /&gt;&lt;br /&gt;&lt;em&gt;Given above is a picture of the participants involved in a group activity&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Salient points discussed during the presentation:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;br /&gt;Examples of knowledge platforms:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Baidu baike &lt;/li&gt;
&lt;li&gt; English wikipedia &lt;/li&gt;
&lt;li&gt; Hudong &lt;/li&gt;
&lt;li&gt;Catawiki &lt;/li&gt;
&lt;li&gt;Wikieducator &lt;/li&gt;
&lt;li&gt;Open street map &lt;/li&gt;
&lt;li&gt;Pad.ma &lt;/li&gt;
&lt;li&gt; Sahapedia &lt;/li&gt;
&lt;li&gt; Internet archive &lt;/li&gt;
&lt;li&gt; Jstor &lt;/li&gt;
&lt;li&gt; Dsal &lt;/li&gt;
&lt;li&gt; Dli&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 1994 Cunningham developed the ‘Wiki Wiki Web’ also known as the ‘Ward Wiki’. Basically it is a knowledge platform.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Internet since then has been used for dissemination of information especially in the education sector. Digital Archived have developed over the years which provide information across various platforms like Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The spread of the internet has made possible the building of knowledge bases by seamless and mass collaboration. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt; Generic challenges for Wikipedia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quality, relevance, consistency of knowledge &lt;/li&gt;
&lt;li&gt;Suitable motivation of the contributors&lt;/li&gt;
&lt;li&gt;Another issue is the scalability&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Some of the problems faced by Indian Wikipedian pages:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Technical infrastructure for Indian languages &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Typing in the regional language &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OCR: complexity of Indian language scripts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Various other technical troubles like browser compatibility, font display, etc., which deter new users&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Dearth of quality content available in digital format&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Different standards/formats/generations (gov.in/DLI)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Relative lack of research/academic standards, which is transferred on to Indic wikipedias. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lack of knowledge sharing culture.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Building a mass knowledge platform is the need of the hour.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The platform should be user friendly, easily available and adoptable; offline outreach is key to effective use of online platforms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The programme&amp;nbsp; should have feedback loop key, behavior statistics data, reinvent and replicate the programme, multi-channel awareness, ‘user connect’ programmes.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The people should communicate knowledge sharing objectives, make knowledge sharing fun, appoint ambassadors; virtual volunteer community building looks simple but its complex and leads to failure.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/2cM7CZ2hMeg" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session: 4 Affordable Devices to access the Internet&lt;/h3&gt;
&lt;p&gt;(by Ravikiran Annaswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/MeetMobileInternet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Ravikiran.png" alt="" class="image-inline" title="Ravikiran Annaswamy" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Ravikiran Annaswamy giving a demo of the low cost Akash tablet&lt;/em&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview of Affordable Mobile Phones such as Lava Iris, Karbonn A1, Nokia Asha, etc.&lt;/li&gt;
&lt;li&gt;Overview of Affordable Tablets such as Aakash, Ubislate, Karbonn Smart A34, etc.&lt;/li&gt;
&lt;li&gt; The number of Internet users in India is expected to nearly triple from 125 million in 2011 to 330 million by 2016, says a report by Boston Consulting Group.&lt;/li&gt;
&lt;li&gt; How Internet Penetration impacts society.&lt;/li&gt;
&lt;li&gt; Demo of the devices.&lt;/li&gt;
&lt;li&gt; Need for Mobile Internet&lt;/li&gt;
&lt;li&gt; Sugata Mitra &amp;amp; Arvind Eye Care examples.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/TUcbcFaX-v4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 3: June 10, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The third day of the Institute focussed on Wired means of accessing the Internet, the technology involved followed by an assignment time where the participants were introduced to 2 topics and asked to work on an assignment. This was followed by a site visit in the afternoon to MapUnity. &lt;strong&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and&amp;nbsp;development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used mostly by government departments and civil society&amp;nbsp; organisations and in the R&amp;amp;D initiatives of commercial ventures.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Wired Access Technology&lt;/h3&gt;
&lt;p&gt;(by Dr. Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/wired-access-nadeem-akhtar"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Wired and Wireless&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Wired:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Separate communication channel for each users&lt;/li&gt;
&lt;li&gt; Low signal attenuation&lt;/li&gt;
&lt;li&gt; No interference&lt;/li&gt;
&lt;li&gt; Fixed point-of-attachment&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Wireless:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Shared medium of communication&lt;/li&gt;
&lt;li&gt; Signal is attenuated by a number of factors&lt;/li&gt;
&lt;li&gt; Interference between adjacent channels&lt;/li&gt;
&lt;li&gt; Points-of-attachment can be changed on-the-fly&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Ethernet:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; A family of computer networking technologies for LANs which was Invented in 1973 and commercially introduced in 1980.&amp;nbsp; The systems communicating over ethernet divide a stream o data into individual packets called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Ethernet, by definition, is a broadcast protocol&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Any signal can be received by all hosts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Switching enables individual hosts to communicate&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Digital subscriber line (DSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; DSL uses existing telephone lines to transport data to internet subscribers and the term xDSL is used to refer to a number of similar yet competing forms of DSL technologies which includes ADSL, SDSL, HDSL, HDSL-2, G.SHDL, IDSL, and VDSL.&amp;nbsp; DSL service is delivered simultaneously with wired telephone service on the same telephone line and this is possible because DSL uses higher frequency bands for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Asymmetric DSL (ADSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; ADSL is the most commonly installed technology and an&amp;nbsp;ADSL tech can provide maximum downstream speeds of up to 8 mbps.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Modem and router:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Modem is specific to a technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Modem is de/modulator, it takes bits coming from one protocol/technology, demodulates it (converts it into original data), and re-modulated the original data to another protocol/technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Router allows creation of a local area network, allowing multiple devices to connect to the network and access internet together through the router. It has very high bitrate DSL (VDSL) and goes up to 52 mbps downstream and 16 mbps upstream. The length of the physical connection is limited to 300 meters and the second generation VDSL (CDSL2) provides data rates up to 100 mbps simultaneously in both direction, but maximum available bit rate is still achieved about 300 meters.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Cable:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Cable broadband uses existing CATV infrastructure to provide high-access internet access; uses channels specifically reserved for data transfer&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Support simultaneous access to broadband and TV programs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cable access tech is built for one-way transmission; hence some congestion takes place for bi-way data transfer, leading to much lower upstream connection relative to downstream connection for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; It is a generic term for any broadband network architecture using optical fiber; fiber to the neighborhood; fiber to the curb;&amp;nbsp; the street cabinet is much closer to the user’s premises, typically within 300m, thus allowing ethernet or radio-based connection to the final users; fiber to the basement; fiber to the home (BSNL already providing); fiber to the desktop&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Passive optical networks (PON)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Advantages of fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Immunity to electromagnetic interference.&lt;/li&gt;
&lt;li&gt; Provides very high data rates at long distances.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; When network links run over several 1000s of meters (e.g., metro area networks), fiber significantly outperforms copper.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Replacing at least part of these links with fiber shortens the remaining copper segments and allows them to run much faster.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The data rate of a fiber link is typically limited by the terminal equipment rather than the fiber itself.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Assignment&lt;/strong&gt;&lt;br /&gt;Participants were given two options for an assignment to work on in the coming days and they could choose either one.&lt;/p&gt;
&lt;p&gt;Assignment A&lt;br /&gt;The Universal Service Obligation Fund of India has put out a Call for Proposals under two schemes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mobile Connectivity and ICT related livelihood skills for womens’ SHGs (&lt;a href="http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf%29"&gt;http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf)&lt;/a&gt;, and&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Access to ICTs and ICT enabled services for persons with disabilities in rural India. (&lt;a href="http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf"&gt;http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Your NGO is committed to the task of facilitating access to the Internet&amp;nbsp;for women/ persons with disabilities in rural parts of Kerala and wishes to submit a proposal/ project idea in partnership with a service provider to the USOF.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Assignment B&lt;strong&gt;&lt;br /&gt;You&lt;/strong&gt; are a member of the ancient tribe of Meithis residing in Manipur. Over the years, there is a strong feeling in your community that although the Government has rolled out projects to connect the rural areas throughout India, these have not been successful for your tribe and there is still even a lack of basic fixed telephony, let alone mobile and broadband services. You have hence come to the conclusion that there is a need for focused efforts to target such communities as yours and have decided to submit a concept note to the USOF requesting that ‘ethnic and rural tribal communities’ be specifically included within the mandate of the USOF’s activities by defining them as an ‘underserved community’.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Raveena.png" alt="" class="image-inline" title="Participants in Discussion" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants engaged in a discussion.&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Field Trip - Destination: MapUnity.&lt;/strong&gt; &lt;strong&gt;&lt;br /&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used&amp;nbsp;mostly by government departments and civil society&amp;nbsp;organisations, and&amp;nbsp;in the R&amp;amp;D initiatives of commercial ventures. MapUnity presented their product offerings to the participants.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYOT%2BQwA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYOT+QwA" style="display:none"&gt;&lt;/embed&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 4: June 11, 2013&lt;/h2&gt;
&lt;h3&gt;Session 1: Universal Access&lt;/h3&gt;
&lt;p&gt;(by Archana Gulati)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/UniversalServiceConceptsandPractices_Archana.G.Gulati.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Archana.png/@@images/a1f18756-20b4-4732-b032-502b59078819.png" alt="" class="image-inline" title="Archana" /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Given above is a picture of Archana Gulati speaking on Universal Access&lt;/em&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Tuesday revolved around questions of access and openness. The day kicked off with Archana Gulati, a policy expert in access to ICTs for people with disabilities talking on &lt;strong&gt;Universal Access&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Gulati stressed the importance of ICTs for social development. ICTs are a necessary aid in development structures including education, health and increased citizen participation in national affairs &amp;amp; they provide crucial knowledge inputs into productive activities. However, even with the Telecom boom, there still exists an access gap in India, which cannot be covered by commercially viable systems.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
 &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;This 'actual access gap' exists because of geographic (scattered population, low income, low perceived utility of service, lack of commercial/industrial customers, lack of roads, power, difficult terrain, insurgency), economic (urban poor) and social inequality (gender, disabilities) differences. To achieve Universal Access or Universal Service, additional efforts must be made, so as to include these groups. However, Universal Access and Universal Service, while they may imply the same thing, are very different approaches to deal with the problematic access gap.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal service, a term coined by Theodore Vail, president of AT&amp;amp;T in 1906, argued that the government should enforce the usage of only one network. This approach suggests a monopolization of the market and goes against the liberal market principle.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal access on the other hand suggests cross-subsidizing the low and no profit service areas by high profit service areas. However, this results in the urban population to get over-charged while the rich rural areas benefit from rural subsidizing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So how do we enable a fair and inexpensive network to be able to create access for a large number of people equally? &lt;br /&gt;Ms. Archana Gulati went on to introduce the Sanchar Shakti scheme as a contribution to national access in India. It was initiated with the objective of improving rural SHG access skills, knowledge, financial services and markets through mobile connections and involved several stakeholders like NABARD, handset/modem manufacturers, DoT USOF, Mobile VAS Providers, Lead NGOs, Mobile Service Providers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This scheme shows how important is, for the commercial, private and public sector to work together on obtaining accessibility to ITCs.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Free and Open Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash) &lt;br /&gt;The following session by Pranesh Prakash on &lt;strong&gt;Free and Open Internet&lt;/strong&gt; showed how the internet can still be a restrictive place which does not allow for internet equality. His talk focussed on the concepts of free and open Internet. Prakash started by stating the Freedom of Speech and Expression Article of the Indian Constitution and in an interactive round it was discussed, how these articles are fundamental for securing other basic human rights. This was demonstrated by an example in which the distribution of food did not proceed equally, as misinformation and restrictions led to an inappropriate hoarding of goods. Therefore, it is important for everyone to have that right. In fact, the Indian constitution formulates Article 19 in a positive way, implying not only everyone should have that right, but that the government must promote the upholding of these rights.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, in the case of Article 66a, the law actually caused a problem with freedom of speech in itself, as it penalizes sending false and offensive messages through communication services. This is a massive impediment on free speech, as outsiders decide upon what is offensive and what is false.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The other side of freedom of speech and expression is censorship. Online, the removal of websites and editing of content often happens quietly and obscures the fact that someone or something is being censored. Unlike book burnings in the past, which were always made a big political spectacle, often websites are simply removed without a trace, or one is faced with a 404 error, when trying to access it. Because of the offensive content law, journals and magazines are quick to remove supposedly offensive content, as it seems more difficult to engage in argument with the people claiming offense. The CIS proposed a counter-law to secure for this to happen less, as freedom of speech includes the freedom to receive that speech.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/SGxYxLEA8OY" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Openness&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Next to ensuring freedom of speech and access, the third session of the  day focussed on Openness in terms of Open Source software. Sunil  Abraham, CIS executive director, stated the importance of free software  and open access of data, as they ensure what he called the four freedoms  of internet usage, namely the freedom to use for any purpose, the  freedom to study, to modify and to share (freely or for a fee).  Proprietary software imposes on these freedoms, as it only has  restrictive use and a strong copyright. However, there are alternatives  that have moderate copyrights, or so-called copy centred perspectives,  or even copyleft, including the above mentioned rights into the terms of  the software usage.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Sunil.png/@@images/92ac30ac-90da-4fcd-a0b2-0469aa2ecc75.png" alt="" class="image-inline" title="Sunil Abraham" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Above is a picture of Sunil Abraham speaking on Openness&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;In alignment with Sunil Abraham’s talk Pranesh Prakash criticized copyright law cutting into accessibility rights, as copyright infringements include translation into other languages, audio versions and also integral parts of education. The key is not to have a "one size fits all" copyright solution, as it is impossible to treat twitter content the same as a blockbuster movie. However, the government of India is doing exactly that and needs to interlink questions of access with copyright law.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vqv7qai5c-s" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Open Content&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Prof. Subbiah Arunachalam)&lt;br /&gt;Prof. Subbiah Arunachalam, who led the next session, discussed &lt;strong&gt;Open Content&lt;/strong&gt;. He had seen during the course of his experience India's poor performance in Science &amp;amp; Technology and outlined the reasons for the same. The lack of access to information essential in scientific research and knowledge production, he said, was the major limiting cause.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/BFJyUTNzYvE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 5: Quick Talk on Copyright Law and Access&lt;/h3&gt;
&lt;p&gt;This short session dealt with implications of copyright law on internet access.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants were divided into two groups, and they were asked build as huge a network as possible with their personal belongings and present their creations. The participants had good ideas. One&amp;nbsp;group placed their mobiles and laptops into the network to&amp;nbsp;have them as nodes. The other group implemented the re-routing around&amp;nbsp;censorship.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/nSLy1eRAndQ" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Network.png" alt="" class="image-inline" title="Networking" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants in an activity making the longest network possible with their personal belongings&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 5: (June 12, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Privacy on the Internet in India&lt;/h3&gt;
&lt;p&gt;(by Sunil Abraham and Elonnai Hickok)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/privacy-on-the-internet-by-elonnai"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Elonnai.png" title="Elonnai" height="211" width="317" alt="" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;em&gt;Given above is a picture of Elonnai Hickock speaking about privacy&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The following day, June 12th started off with “Privacy” as the theme. The session Privacy on the Internet in India was led by CIS privacy experts Sunil Abraham and Elonnai Hickock.&lt;/p&gt;
&lt;p&gt;In an exchange of anecdotes, it was made clear how there needs to be a certain degree of state surveillance to secure the citizens safety.&lt;/p&gt;
&lt;p&gt;This can happen through off air interception and active or passive cell phone towers that can track mobile devices.&lt;/p&gt;
&lt;p&gt;However, encryption is an important tool to secure one’s own privacy against cyber espionage.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Off-the Air Interception&lt;/li&gt;
&lt;li&gt; Possible to set up active or passive cell phone tower. &lt;/li&gt;
&lt;li&gt; The signal strength will be strong and everyone looks for it.&lt;/li&gt;
&lt;li&gt; Capacity to identify itself as a service provider. &lt;/li&gt;
&lt;li&gt; Interception can begin with encryption Technology today used by security agencies.&lt;/li&gt;
&lt;li&gt; NTRO- national technical Research Org and Outlook &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PQWi9hHHSpc" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: E-Accessibility&lt;/h3&gt;
&lt;p&gt;(by Nirmita Narasimhan)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/eAccessibility.pdf"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Eaccessibility.png" alt="" class="image-inline" title="E-accessibility" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Dr. Nirmita Narasimhan speaking on e-accessibility&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The second&lt;strong&gt; &lt;/strong&gt;session was on&lt;strong&gt; “E-Accessibility” &lt;/strong&gt;led by Dr. Nirmita Narasimhan&lt;strong&gt;. &lt;/strong&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Problems arising out of disability&lt;/li&gt;
&lt;li&gt; Accessibility-Infrastructure and ICT&lt;/li&gt;
&lt;li&gt; Assistive technologies for PWD’s.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Reasonable accommodation (not available or cannot be and requires extra effort and putting up an accessible copy up) and universal Design (for both for PWD’s and non-PWD’s).&lt;/li&gt;
&lt;li&gt; Web Content Accessibility is operable and easily understandable. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility standards include; Daisy (6 types of books including audio and text books) is all about marking up the documents. Really a good way to read but is expensive and time consuming, also need Daisy tools and player to make it work.&lt;/li&gt;
&lt;li&gt; In 1808 the first typewriter was developed to help the blind.&lt;/li&gt;
&lt;li&gt; Considerations involved in Web Accessibility &lt;/li&gt;
&lt;li&gt; Overlap b/w mobile accessibility and web accessibility.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Example- Raku Raku phone captured 60% of market share in Japan. It has many assistive features.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relay Services has a middle man who passes on the message b/w different PWD’s in many countries, but it is not yet available in India.&lt;/li&gt;
&lt;li&gt; PWD’s communicating with customer care – the issues involved. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility Policy- very few people are adopting accessible technologies. There is a need to have a strong policy. U.K. and U.S. already have strong policies related to accessible and assistive technology for PWD’s.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;strong&gt; Video&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vI8mixgTgCM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: International Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Tulika Pandey and Gaurab Raj Upadhyay)&lt;br /&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;br /&gt;Gaurab incorporated an &lt;strong&gt;Activity&lt;/strong&gt; into his talk to enable the students to have a clearer understanding of International Bodies and Mechanisms.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gaurab.png" alt="" class="image-inline" title="Gaurab" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Gaurab Raj Upadhaya explaining the International Bodies and Mechanisms&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed during his talk were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Definition: “Internet Governance is the development and application by Govt., the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures and programmes which shape the evolution and use of internet.”&lt;/li&gt;
&lt;li&gt;It should be multilateral, transparent and democratic&lt;/li&gt;
&lt;li&gt; Enhanced cooperation means to enable govt…&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Technical issues to keep in mind while talking about internet:&lt;br /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Critical internet resources&lt;/li&gt;
&lt;li&gt;Root server locations &lt;/li&gt;
&lt;li&gt; Open Standards (CIS leads the initiative) &lt;/li&gt;
&lt;li&gt; Interoperability &lt;/li&gt;
&lt;li&gt; Search Engines &lt;/li&gt;
&lt;li&gt; Internationalized Domain names (in own script &amp;amp; language) &lt;/li&gt;
&lt;li&gt; Content&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Virtual yet real space&amp;nbsp;and most important question to be understood is that whether, the governance of internet is possible?&lt;/li&gt;
&lt;li&gt; Public Policy- to monitor cross-border data flow, Openness vs Privacy&lt;/li&gt;
&lt;li&gt; India’s Outlook in internet policies-Pillars of Internet which is not fully addressed by the Indian government today. &lt;/li&gt;
&lt;li&gt; Established an Inter- Ministerial Group by including various government departments into the arena.&lt;/li&gt;
&lt;li&gt; Layer 0-7 Names and Numbers&lt;/li&gt;
&lt;li&gt; Layer 8 and above&lt;/li&gt;
&lt;li&gt; Applications and Usage &lt;/li&gt;
&lt;li&gt; Legal business, policy, etc.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Session-4: E-Governance&lt;/h3&gt;
&lt;p&gt;(by Tulika Pandey and Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Tulika.png" alt="" class="image-inline" title="Tulika" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Tulika Pandey speaking about e-Governance&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Making policies in India is difficult because the population is huge and implementation at rural level is difficult.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bombarded by Techno utopians- who believe in technology’s ability to change lives.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Techno determinants- Corruption solved through technology through open government data. More technology is better, the most sophisticated ones are the best are gross misconceptions.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bhoomi project tried to deal with corruption at village level. Important policy change made all paper work illegal and digitized the land records etc. every action and request will be logged. But this led to creation of new corruption. Bribes were taken even before data was logged!&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; UID Project (Cobra Post Scam) around 20 public sector and 30 private banks were involved in money laundering scams. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; People who design the systems in Delhi prepare sub-contracts&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/strong&gt;VIDEO&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/Le3b-kka5Hs" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 6: (June 13, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Critical Perspectives of the Internet&lt;/h3&gt;
&lt;p&gt;(by Dr. Nishant Shah)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/critical-perspectives-of-internet-society-dr-nishant-shah"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;The sixth day of the Institute kicked off with Nishant Shah, director of research at CIS, looking into Critical Perspectives of the Internet.&amp;nbsp; Nishant made a very important distinction between the internet as infrastructure and as social network constructing alternative universes. Nonetheless it was important to stress that technology should not be alienated in the process of this separation but seen as an integral part of it, as the digital is as much part of reality as any other technology and has become essential as a technology of change that it brings about not only in scientific but also in social development. Quoting Michel Foucault, Shah argued that technology becomes influential when it changes life, labour and language, which is why research in the field should involve critical ways of thinking about body, space and community.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Nishant.png/@@images/836aa919-b1aa-4e61-86d2-2e4a6e5fc62f.png" alt="" class="image-inline" title="Nishant Shah" /&gt;&lt;br /&gt;&lt;br /&gt; &lt;em&gt;Above is a picture of Dr. Nishant Shah speaking on Critical Perspectives of the Internet.&lt;/em&gt;  &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The body perception can be perceived through the way bodily agencies change through technology. Technology does not necessarily taint or corrupt the body, but can also be a way to escape its confines. To put it to a point, we are all born into technology and cannot free ourselves from them, as for example pregnancy already starts with nutritional supplements, regulatory diets and exercise and essentially ends with birth technologies that do not necessarily involve only the digital - we must remember, speech is one of the oldest technologies available today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/HAnwjxLGA-g" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Strategies for Policy Intervention&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Chakshu Roy)&lt;br /&gt;The second session on “Strategies for Policy Intervention” was led by Chakshu Roy. This session dealt with various ways in which policy intervention can be made and the various factors necessary to successfully engage in policy forums.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/B-tiOPu6WaU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Profile of Internet Service Providers&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Satyen Gupta)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/profile-of-isps-by-satyen-gupta"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/SatyenGupta.png" alt="" class="image-inline" title="Satyen Gupta" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Satyen Gupta speaking about Internet Service Providers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Satyen Gupta during his talk on “Profile of Internet Service Providers” discussed the nature, offerings and profile of various ISPs in India, their market share and dynamics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;National Broadband Plans&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Spectrum Issues “Management”&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reality check of Indian ISPs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Definition &amp;amp; Penetration&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Roadblocks for Broadband in India, Governments Role, Regulation&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Institutional Framework for the Indian Telecom&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Access in India- Technology-Neutrality&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite based DTH Services offer alternate for the Broadband via Receive Only Internet Service (ROIS)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband using DTH for Receive-only Internet&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;VSAT has the potential for significant impact on Broadband Penetration in Remote Areas&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fixed Wireless Access- an important access technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facilitating Radio Spectrum for Broadband Access&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fiscal measures to reduce the cost of access devices, infrastructure and broadband service&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reduction in the cost of connectivity&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Internet Exchange of India (NIXI) -National Internet Exchange of India (NIXI) has been set up on recommendation of TRAI by DIT, Government of India to ensure that Internet traffic, originating and destined for India, should be routed within India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Emerging Broadband Services&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Commission for Digital Development (BCDD)-UN Targets for Universal Broadband,2015&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NOFN India-Existing Fiber Infrastructure and Coverage by Various Service Providers&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Telecom Policy (NTP) 2012- Salient Features&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;State of Internet Services and ISPs in India:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;India’s Ranking on Key Broadband Indicators&lt;/li&gt;
&lt;li&gt;Regulator’s Report – Growth of Internet in India&lt;/li&gt;
&lt;li&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;
&lt;li&gt;Technology trends for Internet/Broadband Access&lt;/li&gt;
&lt;li&gt;Internet/broadband Subscribers for top 10 states&lt;/li&gt;
&lt;li&gt;Tariff Plans for USO funded Broadband&lt;/li&gt;
&lt;li&gt;Contribution of Telcos in Development of Internet Services&lt;/li&gt;
&lt;li&gt;Incumbent’s Role in Growth of Broadband&lt;/li&gt;
&lt;li&gt;Plugging rural missing link- BBNL&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/DOSeo-ASOQ8" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Competition in the Market by Helani Galpaya&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Helani Galpaya during her talk on “Competition in the Market” discussed about what competition meant, &lt;em&gt;Herfindahl–Hirschman&lt;/em&gt; Index to measure how competitive a market is, what are the dangers of monopoly markets and the landscape of the Telecom market in India.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Helani.png" alt="" class="image-inline" title="Helani" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Helani Galpaya speaking about Competition in the Market&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 7: (June 14, 2013)&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The final day of the Institute focussed on how the Internet can be used to effect change on society – Activism was the theme.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Leveraging Internet for activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Ananth Guruswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/LeveragingInternetforActivism.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/AnanthGuruswamy.png" alt="" class="image-inline" title="Ananth Guruswamy" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Ananth Guruswamy speaking during the session on leveraging internet for activism&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Digital Activism&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Target Omar Abdullah. It is about an act called Administrative detention Act. One can be detained without act i.e. The Preventive Detention Act. He directly responded to the threat.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Twitter seems to be a place where the political leaders are actually accessible. This kind of access was not possible in day to day life earlier if one was a common man. This phenomenon is developing. Even in Corporate setup writing a mail directly to the CEO seems possible. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Strengths: Wide reach, Freedom of speech, Data collection is made easy, Issues can be tackled swiftly, Global communities, singular identities have lot of power. Eg: 190 Million people stood up against Poverty; this kind of mobilization impossible without internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Besides local issues even Global issues are addressed an collection of funds becomes easy. Onion.com once a struggling publication in U.S., but now with a global audience it is thriving and it has a healthy reader base today. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Earth Hour helps people connect across space and time.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Weakness: More popularity, more attention; Traditional/Real Protest has become rare and a threat; There is no real action beyond internet, threat of movement is low, there is no real commitment involved in digital activism and just one click is enough to make one ‘feel good’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Opportunities: Recruitment of protestors for real protests. Diff. b/w real and virtual blurred; anything that affects the mind space is real. The intersection is interesting.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Threats: Total removal of privacy, Government intervention in private issues and there could be misinterpretation of people’s thoughts by certain people.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Traditional vs Digital activism: Traditional fails to provide results whereas clicking a button is as easy as wearing a badge.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facebook activism: ‘Like Buttons’, People moving away from reading emails, a shift towards use of facebook; creates a sense of belongingness which the traditional activism failed to achieve.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;India against Corruption: used mobile phone effectively.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Social Media has changed the way protests happen globally and in India, one example is Twitter. Change.org is a website which gives freedom to anybody to start a petition without any external source; Awaaz.org another such petition website.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Green Peace launched a Green peace X which was a runaway success. YouTube is another platform for the masses. People today are more interested in watching rather than reading.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Pakistan in 2007: “Flash protests”; Free Fraizan Movement on Twitter.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Something to keep in mind regarding while launching a campaign online is to think who the audience is and what we want them to do and how will the campaign help our objectives?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How to measure success of a social media campaign?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Engagement- likes, tweets, comments, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Influence&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Attrition Score&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PXZE7y1qxlo" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Internet Access Activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Parminder Jeet Singh)&lt;br /&gt;The next session on “INTERNET ACCESS” ACTIVISM by Parminder Jeet Singh dealt with how people can contribute to initiatives for improving internet access amongst masses.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/_zyM3_OiUxM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h3&gt;Session 3: Ensuring Access to the Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by A.K. Bhargava)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/BBNLiis.pdf"&gt;Click to view the presentation&lt;/a&gt;&lt;br /&gt;The last session on “Ensuring Access to the Internet” by A.K. Bhargava discussed strategies to enhance access to the Internet in India with special focus on National Optical Fibre Network.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Role of Broadband in Nation Building&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy Aspiration of Broadband - How do we meet aspiration?&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Telecom Network Layers‐Gaps in OFC Reach&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; BBNL Interconnection&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN - Bridging The Gap&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Digital Knowledge Centres (DKCs)&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Architecture of BBNL&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN Impact&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Societal&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Bridging the digital divide&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Business&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Job creation, indigenous industry growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Sectoral&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Improved connectivity, data growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Technological&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Differentiators&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/4X3WSn1u3WM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Speaker Presentation Slides&lt;/strong&gt;&lt;br /&gt;All the presentation aids/slide shows barring a few have been uploaded to the website at &lt;a class="external-link" href="http://internet-institute.in/repository"&gt;http://internet-institute.in/repository&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Presentation of Assignments&lt;/strong&gt;&lt;br /&gt;The participants presented their assignments which were given to them to work on the 3rd day. The participants were presented with Wikipedia T-Shirts as a token of appreciation.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Assignments.png" alt="" class="image-inline" title="Assignments" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants presenting their assignments&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participant Feedback&lt;/strong&gt;&lt;br /&gt;All participants were asked to fill a "Session Feedback Form" for each of the sessions and also an "Overall Feedback Form". They were also constantly encouraged to come up with suggestions and inputs on how to make the Institute more interesting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Quantitative Feedback&lt;/strong&gt; provided are:&lt;br /&gt;(The figures below are averaged scores (out of 5) provided by participants in the Overall Feedback Forms)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Parameter&lt;/th&gt;
&lt;th&gt;Score (Out of 5)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Relevance of Content&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td style="text-align: justify;"&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;Comprehensiveness of Content&lt;/td&gt;
&lt;td&gt;3.44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Easy to Understand&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Well Paced&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.33&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Sufficient Breaks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Duration of Talks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Mix between Learning &amp;amp; Activities&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Qualitative Feedback&lt;/strong&gt; provided are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Points observed&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Presentations&lt;/strong&gt; – Participants felt sessions with accompanying slides/aids were most helpful. Some felt that accompanying notes could also be useful for future reference.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Use of Examples/Case Studies&lt;/strong&gt; – Participants felt concepts can be better assimilated if case-studies/examples are used. Some also felt that for the technological advancements discussed, it would have been better had the social/economic impact of the same was discussed too.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Implementation Gaps&lt;/strong&gt;– One participant, who is working at the field level in Kolkata had a specific thing to say about the talk about BSNL and its offerings– Although BSNL has so many options available on paper to connect to the Internet, common service centres in West Bengal are mostly run on Tata Indicom’s network even though the board outside says “BSNL” etc. She felt that the reality is far different from what exists on paper.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Interactive sessions&lt;/strong&gt; were most appreciated than speaker led sessions.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;There were many responses to the question “&lt;strong&gt;How will you apply this new information in the future&lt;/strong&gt;” and it is very encouraging.&amp;nbsp; People have given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, to help file RTIs, to adopt more open source software, sharing with students, advocacy efforts, etc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;The responses to the question “&lt;strong&gt;What did you learn from the session/workshop that was new?&lt;/strong&gt;” elicited more responses for the following sessions&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Domestic Bodies and Mechanisms&lt;/li&gt;
&lt;li&gt;Case-studies such as Air Jaldi&lt;/li&gt;
&lt;li&gt;Low cost devices in India&lt;/li&gt;
&lt;li&gt;USOF&lt;/li&gt;
&lt;li&gt;Free &amp;amp; Open Internet&lt;/li&gt;
&lt;li&gt;Copyright laws&lt;/li&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Accessibility&lt;/li&gt;
&lt;li&gt;Digital Natives&lt;/li&gt;
&lt;li&gt;ISPs&lt;/li&gt;&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Field Trip&lt;/strong&gt; – One participant said “&lt;em&gt;One or two of the persons from MapUnity could have made the presentation at the institute venue itself. A visit to an underserved or un-served community with interactions with the people there could also have given a good understanding of on-ground challenges and needs.”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Follow-up Session&lt;/strong&gt; –One participant had ideas about having a follow-up session “&lt;em&gt;A follow-up call [webinar?] after 6 months to see if any of these concepts were useful would be an interesting exercise to take up”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Assignment – &lt;/strong&gt;Participants felt that the assignments were good but they needed more time to work on the same.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Other Feedback:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The food and the facilities were enjoyed and appreciated by all.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The remote location of the Golden Palms Resort was a concern for most of the participants.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation Certificates&lt;/strong&gt;&lt;br /&gt;Participation Certificates (template shown below) have been mailed to all the participants in the third week of July 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Certificate.png" alt="" class="image-inline" title="Certificate of Participation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is the certificate declaring the successful completion of the event&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify;"&gt;Institute Expenses&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;A total of Rs. 19, 91,889 (Rupees nineteen lakhs ninety one thousand eight hundred and eighty nine only) was spent towards organizing and conducting the Internet Institute. A breakup of the Institute Expenditures is given below:&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Type of Expense&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Description&lt;/th&gt;
&lt;th style="text-align: right;"&gt;Total&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Venue – Golden Palms Resort&lt;/td&gt;
&lt;td&gt;Accommodation for participants, speakers and food&lt;/td&gt;
&lt;td style="text-align: right;"&gt;12,91,176&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Travel&lt;/td&gt;
&lt;td&gt;Cost of Air tickets&lt;/td&gt;
&lt;td style="text-align: right;"&gt;2,94,515&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Local Travel&lt;/td&gt;
&lt;td&gt;Airport Pickup/Drop, Local City Travel&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,41,001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Gifts &amp;amp; Printing&lt;/td&gt;
&lt;td&gt;Gifts for speakers and ad hoc document printing charges&lt;/td&gt;
&lt;td style="text-align: right;"&gt;24,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Infrastructure&lt;/td&gt;
&lt;td&gt;Telephony, Audio, Video, Stage&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,05,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Participant Bags&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;10,650&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Reimbursements&lt;/td&gt;
&lt;td&gt;Reimbursements to participants and speakers&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,25,547&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;" colspan="3"&gt;&lt;strong&gt;Total Expenses&lt;/strong&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;19,91,889&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify;"&gt;What the participants had to say&lt;/h3&gt;
&lt;blockquote class="quoted"&gt;Sangh Priya Rahul – “&lt;em&gt;One of my organisation's work is more or less related to empowerment of rural areas so knowledge about USOF will be useful there&lt;/em&gt;&lt;em&gt;.” &lt;/em&gt;(On USOF)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Rashmi. M – “&lt;em&gt;Makes me more sensitized towards the disabled people.”&lt;/em&gt; (On e-Accessibility)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Preethi Ayyaluswamy – “&lt;em&gt;Would help me in strategically planning for an online campaign” &lt;/em&gt;(On digital activism).&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Institute was highly engaging and enabled the participants to explore the various facets of Internet &amp;amp; Society. As was evident from the feedback forms, participants had given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, help file RTIs, adopt more open source software, sharing with students, advocacy efforts etc. There was a very high level of expertise amongst speakers at the Institute which was apparent from the participatory discussions and a lot of insightful perspectives were brought forth. There was a common consensus amongst all participants that inclusive growth across all dimensions would take efforts from all stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We hope to learn from the findings of this Institute and work towards a better second Institute.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/GroupPhoto.png" alt="" class="image-inline" title="Group Photo of Participants" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a group picture of all the participants and the organizers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>srividya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-10-15T06:48:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
