<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-cinematograph-amendment-bill-2021"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-regulating-sexist-online-harassment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/it-for-change-february-2021-amber-sinha-regulating-sexist-online-harassment.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/investigating-tls-blocking-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ietf-103"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-logical-indian-october-27-2018-reliance-jio-users-complain-of-porn-websites-being-blocked"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-shutdown-stories"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-cinematograph-amendment-bill-2021">
    <title>Comments on the Cinematograph (Amendment) Bill, 2021</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-cinematograph-amendment-bill-2021</link>
    <description>
        &lt;b&gt;In this submission, we examine the constitutionality and legality of the Cinematograph (Amendment) Bill, 2021, which was released by the Ministry of Information and Broadcasting. &lt;/b&gt;
        
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;This submission presents comments by CIS on the Cinematograph (Amendement) Bill, 2021 (“the Bill”) which were released on 18 June 2021 for public comments. These comments examine whether the proposed amendments are compatible with established constitutional principles, precedents, previous policy positions and existing law.&amp;nbsp;While we appreciate the opportunity to submit comments, we note that the time allotted for doing so was less than a month (the deadline for submission was 2 July 2021). Given the immense public import in the proposed changes, and the number of stakeholders involved, we highlight that the Ministry of Information and Broadcasting (MIB) should have provided more time in the final submission of comments.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Read our full submission &lt;a class="external-link" href="https://cis-india.org/internet-governance/cinematograph-act-amendments-bill"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-cinematograph-amendment-bill-2021'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-cinematograph-amendment-bill-2021&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tanvi Apte, Anubha Sinha and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Broadcasting</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2021-07-05T05:59:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-regulating-sexist-online-harassment">
    <title>Regulating Sexist Online Harassment as a Form of Censorship</title>
    <link>https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-regulating-sexist-online-harassment</link>
    <description>
        &lt;b&gt;This paper is part of a series under IT for Change’s project, Recognize, Resist, Remedy: Combating Sexist Hate Speech Online. The series, titled Rethinking Legal-Institutional Approaches to Sexist Hate Speech in India, aims to create a space for civil society actors to proactively engage in the remaking of online governance, bringing together inputs from legal scholars, practitioners, and activists. The papers reflect upon the issue of online sexism and misogyny, proposing recommendations for appropriate legal-institutional responses. The series is funded by EdelGive Foundation, India and International Development Research Centre, Canada.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;Introduction&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proliferation of internet use was expected to facilitate greater online participation of women and &lt;a class="external-link" href="https://ssrn.com/abstract=2039116"&gt;other marginalised groups&lt;/a&gt;.  However, over the past few years, as more and more people have come online, it is evident that social power in online spaces mirrors offline hierarchies. While identity and security thefts may be universal experiences, women and the LGBTQ+ community continue to face barriers to safety that men often do not, aside from structural barriers to access. Sexist harassment pervades the online experience of women, be it on dating sites, &lt;a class="external-link" href="https://academic.oup.com/bjc/article/57/6/1462/2623986"&gt;online forums, or social media&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her book, &lt;i&gt;&lt;a class="external-link" href="https://yalebooks.yale.edu/book/9780300215120/twitter-and-tear-gas"&gt;Twitter and Tear Gas: The Power and Fragility of Networked Protest&lt;/a&gt;&lt;/i&gt;, Zeynep Tufekci argues that the nature and impact of censorship on social media are very different. Earlier, censorship was enacted by restricting speech. But now, it also works in the form of organised harassment campaigns, which use the qualities of viral outrage to impose a disproportionate cost on the very act of speaking out. Therefore, censorship plays out not merely in the form of the removal of speech but through disinformation and hate speech campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most cases, this censorship of content does not necessarily meet the threshold of hate speech, and free speech advocates have traditionally argued for counter speech as the most effective response to such speech acts. However, the structural and organised nature of harassment and extreme speech often renders counter speech ineffective. This paper will explore the nature of online sexist hate and extreme speech as a mode of censorship. Online sexualised harassment takes various forms including doxxing, cyberbullying, stalking, identity theft, incitement to violence, etc. While there are some regulatory mechanisms – either in law, or in the form of community guidelines that address them, this paper argues for the need to evolve a composite framework that looks at the impact of such censorious acts on online speech and regulatory strategies to address them.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/files/it-for-change-february-2021-amber-sinha-regulating-sexist-online-harassment.pdf/at_download/file" class="external-link"&gt;Click on to read the full text&lt;/a&gt; [PDF; 495 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-regulating-sexist-online-harassment'&gt;https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-regulating-sexist-online-harassment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2021-05-31T09:56:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/it-for-change-february-2021-amber-sinha-regulating-sexist-online-harassment.pdf">
    <title>Regulating Sexist Online Harassment: A Model of Online Harassment as a Form of Censorship</title>
    <link>https://cis-india.org/internet-governance/files/it-for-change-february-2021-amber-sinha-regulating-sexist-online-harassment.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/it-for-change-february-2021-amber-sinha-regulating-sexist-online-harassment.pdf'&gt;https://cis-india.org/internet-governance/files/it-for-change-february-2021-amber-sinha-regulating-sexist-online-harassment.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2021-05-31T09:39:14Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad">
    <title>New intermediary guidelines: The good and the bad </title>
    <link>https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad</link>
    <description>
        &lt;b&gt;In pursuance of the government releasing the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, this blogpost offers a quick rundown of some of the changes brought about the Rules, and how they line up with existing principles of best practices in content moderation, among others. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This article originally appeared in the Down to Earth &lt;a class="external-link" href="https://www.downtoearth.org.in/blog/governance/new-intermediary-guidelines-the-good-and-the-bad-75693"&gt;magazine&lt;/a&gt;. Reposted with permission.&lt;/p&gt;
&lt;p&gt;-------&lt;/p&gt;
&lt;p&gt;The Government of India notified the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021. The operation of these rules would be in supersession of the existing intermediary liability rules under the Information Technology (IT) Act, made back in 2011.&lt;/p&gt;
&lt;p&gt;These IL rules would have a significant impact on our relationships with internet ‘intermediaries’, i.e. gatekeepers and getaways to the internet, including social media platforms, communication and messaging channels.&lt;/p&gt;
&lt;p&gt;The rules also make a bid to include entities that have not traditionally been considered ‘intermediaries’ within the law, including curated-content platforms such as Netflix and Amazon Prime as well as digital news publications.&lt;/p&gt;
&lt;p&gt;These rules are a significant step-up from the draft version of the amendments floated by the Union government two years ago; in this period, the relationship between the government around the world and major intermediaries changed significantly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The insistence of these entities in the past, that they are not ‘arbiters of truth’, for instance, has not always held water in their own decision-makings.&lt;/p&gt;
&lt;p&gt;Both Twitter and Facebook, for instance, have locked the former United States president Donald Trump out of their platforms. Twitter has also resisted to fully comply with government censorship requests in India, spilling into an interesting policy tussle between the two entities. It is in the context of these changes, therefore, that we must we consider the new rules.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What changed for the good?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the immediate standouts of these rules is in the more granular way in which it aims to approach the problem of intermediary regulation. The previous draft — and in general the entirety of the law — had continued to treat ‘intermediaries’ as a monolithic entity, entirely definable by section 2(w) of the IT Act, which in turn derived much of its legal language from the EU E-commerce Directive of 2000.&lt;/p&gt;
&lt;p&gt;Intermediaries in the directive were treated more like ‘simple conduits’ or dumb, passive carriers who did not play any active role in the content. While that might have been the truth of the internet when these laws and rules were first enacted, the internet today looks much different.&lt;/p&gt;
&lt;p&gt;Not only is there a diversification of services offered by these intermediaries, there’s also a significant issue of scale, wielded by a few select players, either by centralisation or by the sheer number of user bases. A broad, general mandate would, therefore, miss out on many of these nuances, leading to imperfect regulatory outcomes.&lt;/p&gt;
&lt;p&gt;The new rules, therefore, envisage three types of entities:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;There are the ‘intermediaries’ within the traditional, section 2(w) meaning of the IT Act. This would be the broad umbrella term for all entities that would fall within the ambit of the rules.&lt;/li&gt;&lt;li&gt;There are the ‘social media intermediaries’ (SMI), as entities, which enable online interaction between two or more users.&lt;/li&gt;&lt;li&gt;The rules identify ‘significant social media intermediaries’ (SSMI), which would mean entities with user-thresholds as notified by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The levels of obligations vary based on these hierarchies of classification. For instance, an SSMI would be obligated with a much higher standard of transparency and accountability towards their users. They would have to fulfill by publishing six-monthly transparency reports, where they have to outline how they dealt with requests for content removal, how they deployed automated tools to filter content, and so on.&lt;/p&gt;
&lt;p&gt;I have previously argued how transparency reports, when done well, are an excellent way of understanding the breadth of government and social media censorships. Legally mandating this is then perhaps a step in the right direction.&lt;/p&gt;
&lt;p&gt;Some other requirements under this transparency principle include giving notice to users whose content has been disabled, allowing them to contest such removal, etc.&lt;/p&gt;
&lt;p&gt;One of the other rules from the older draft that had raised a significant amount of concern was the proactive filtering mandate, where intermediaries were liable to basically filter for all unlawful content. This was problematic on two counts:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Developments in machine learning technologies are simply not up there to make this a possibility, which would mean that there would always be a chance that legitimate and legal content would get censored, leading to general chilling effect on digital expression&lt;/li&gt;&lt;li&gt;The technical and financial burden this would impose on intermediaries would have impacted the competition in the market.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The new rules seemed to have lessened this burden, by first, reducing it from being mandatory to being best endeavour-basis; and second, by reducing the ambit of ‘unlawful content’ to only include content depicting sexual abuse, child sexual abuse imagery (CSAM) and duplicating to already disabled / removed content.&lt;/p&gt;
&lt;p&gt;This specificity would be useful for better deployment of such technologies, since previous research has shown that it’s considerably easier to train a machine learning tool on corpus of CSAM or abuse, rather than on more contextual, subjective matters such as hate speech.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What should go?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;That being said, it is concerning that the new rules choose to bring online curated content platforms (OCCPs) within the ambit of the law by proposals of a three-tiered self-regulatory body and schedules outlining guidelines about the rating system these entities should deploy.&lt;/p&gt;
&lt;p&gt;In the last two years, several attempts have been made by the Internet and Mobile Association of India (IAMAI), an industry body consisting of representatives of these OCCPs, to bring about a self-regulatory code that fills in the supposed regulatory gap in the Indian law.&lt;/p&gt;
&lt;p&gt;It is not known if these stakeholders were consulted before the enactment of these provisions. Some of this framework would also apply to publishers of digital news portals.&lt;/p&gt;
&lt;p&gt;Noticeably, this entire chapter was also missing from the old draft, and introducing it in the final form of the law without due public consultations is problematic.&lt;/p&gt;
&lt;p&gt;Part III and onwards of the rules, which broadly deal with the regulation of these entities, therefore, should be put on hold and opened up for a period of public and stakeholder consultations to adhere to the true spirit of democratic participation.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The author would like to thank Gurshabad Grover for his editorial suggestions.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad'&gt;https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>TorShark</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2021-03-15T13:52:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations">
    <title>Mapping Web Censorship &amp; Net Neutrality Violations</title>
    <link>https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For over a year, researchers at the Centre 
for Internet and Society have been studying website blocking by internet
 service providers (ISPs) in India. We have learned that major ISPs 
don’t always block the same websites, and also use different blocking 
techniques. &lt;strong&gt;To take this study further, and map net neutrality violations by ISPs, we need your help.&lt;/strong&gt;
 We have developed CensorWatch, a research tool to collect empirical 
evidence about what websites are blocked by Indian ISPs, and which 
blocking methods are being used to do so. Read more about this project (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/qxKoDnnG4cR8mPZaiOr8immlHKFilRoRSYOvX_26BcZRtiN_hoo5VrFfQHbDqaES1OV6jUM0RbWCZs1ODSHr_Pf9yeJFesRxxQvyUrZm4Tlcvdjmh232QQV3fOkmrj9wiVh5LQiW1LQAprvYWmHp_s-TW5ZdNXZY07QvlFR01dKzIxnv7TorEfkyazo" target="_blank"&gt;link&lt;/a&gt;), &lt;strong&gt;download CensorWatch&lt;/strong&gt; (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/F9Wsq5zbx6VJKZxrsjYFy3Q5-jSkk0-3nr5hBfuyQiDUEKyEm_fLY6kh4W9MB7GOLoPZbowqsXDT17DEmFgMoFY4IIOEjxq0rNCtFeEc7b-0GSnRPeLDi9VmYX5WE1vGlwMvM7BPtyfmXD6lNdIWzAdjq_MpSqWRACk3JJNPhzqieJXoEoOnY8WH1rxR4HnJwDjyJHSkHgMTmWcm0POB_kDOtt2fk_GnXkkjv5LK7MxRZe8f" target="_blank"&gt;link&lt;/a&gt;), and help determine if ISPs are complying with India’s net neutrality regulations.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="https://play.google.com/store/apps/details?id=com.censorwatch.netprobesapp"&gt;&lt;img src="https://cis-india.org/internet-governance/censorwatch/" alt="null" width="75%" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;Learn more about website blocking in India, through our recent work on the issue —&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Using information from court orders, 
user reports, and government orders, and running network tests from six 
ISPs, Kushagra Singh, Gurshabad Grover and Varun Bansal presented the &lt;strong&gt;largest study of web blocking&lt;/strong&gt;
 in India. Through their work, they demonstrated that major ISPs in 
India use different techniques to block websites, and that they don’t 
block the same websites (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/mgmW9wuVo0QjRGqm9DnDQiVT4lYy3lgY5maOgjAk05baH_NWtRSfznWooMtcTgQ2a059mWk91p_lMZqJAqaRHXZOLSEQQOAMeM5RowiyfY3giKQm3aDJoYnWw7VhAHeBjdkObBFF0PYWjoC1NJi21fSZyifOWm_CvlC3gq7nxbHtejEy" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Gurshabad Grover and Kushagra Singh 
collaborated with Simone Basso of the Open Observatory of Network 
Interference (OONI) to study &lt;strong&gt;HTTPS traffic blocking in India&lt;/strong&gt; by running experiments on the networks of three popular Indian ISPs: ACT Fibernet, Bharti Airtel, and Reliance Jio (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/oP_eOysGeBOsgRW-5k8V-ReWU_DMUhykR2wN9ZAqndgHev3bxY1c8kSSviR3jjOMqzOJhP05AfK2CtHAH8-Zv21mU7uAW2ainkl5tmS-uZx3LG15MjZXbRQyE71871AouDuXY0hLTVEVG3ovaEvb8BSFOhJz7NpnTZdsY5vIOeBqSsaB31HJdMT8bNELQJ8VjhUoNw" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;For &lt;em&gt;The Leaflet&lt;/em&gt;, Torsha Sarkar and Gurshabad Grover wrote about the &lt;strong&gt;legal framework of blocking in India&lt;/strong&gt;
 — Section 69A of the IT Act and its rules. They considered commentator 
opinions questioning the constitutionality of the regime, whether 
originators of content are entitled to a hearing, and whether Rule 16, 
which mandates confidentiality of content takedown requests received by 
intermediaries from the Government, continues to be operative (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/WggQUDysA9mWPEzvGTRc43aPpKNmNjDcdEzj1ALhrbXgQWqnZRY9L9J45XXbJ3yCnX9-XIuYyRTQ588cBiYNQIs2KsfB0Dydz2QY4Z5VdMTdJ-RMr2M5uDqJ8Amr5gT3APy01bg8gNTyoEvdIcKryjrWnUFlTdxFAtohQ_AwVRjTbzC5FcAFhO9DdHOQV0Xp9X65At3tR17epGvo" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;In the &lt;em&gt;Hindustan Times&lt;/em&gt;, Gurshabad Grover critically analysed &lt;strong&gt;the confidentiality requirement embedded within Section 69A of the IT Act&lt;/strong&gt; and argued how this leads to internet users in India experiencing arbitrary censorship (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/j75HVdd7j4huKQd0kP9lusNpz1ZL0CxXMEWeySOhsQZbcKECrEKfaq52LlB-QjnT1TIB1mjqhB0TyweA7rLCq41Rd_6uyBUo8-Uc4iHiHSXYxC06rhW7o7ZFtCt7bKdNldDWkoMhSD7x0daAhzcSdLSPbNBRSy1HkGEGZ7Z_11tovlleodez9gm60zyvkGNM1YMQSLZ4NZ0k8RD2zncGPoWXjsytI4YwnQyy_QZNSKOSdY2_X6GoVSugRZhmyWwWCpHpk-yDM7XJ0OF4GZlTUSgfhcfftJEGBlQlkQ" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Torsha Sarkar, along with Sarvjeet Singh of the Centre for Communication Governance (CCG), spoke to &lt;em&gt;Medianama&lt;/em&gt; delineating the &lt;strong&gt;procedural aspects of section 69A of the IT Act &lt;/strong&gt;(&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/QAWrguo8Vx6X1PsmbTvCTYQ6U6nycGdSRg9gfDYFTRxUAa82nB6gYpuPyEE3VztSJzG2888ua224upBlg-k9Tu29TZdhl3ET71WwsKUfKxdyUPkLiY1A4jSD1p59sH0KXlQBqU10H38gDFHZ5WVsMCwZXLTISv9SvXIRx7Vu59U4HBV-hhB3BSpe_SApQnHQgPN0BIl0g852jSINvTI6Bh5HGNTWZ3nQWRn5H1vShoG4Q3VcZBWfewbc" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;li&gt;Arindrajit Basu spoke to the &lt;em&gt;Times of India&lt;/em&gt; about the &lt;strong&gt;geopolitical and regulatory implications&lt;/strong&gt; of the Indian government’s move to ban fifty-nine Chinese applications from India (&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/lICwdbQnezwqQKZHQ_Xso6Qp7735jleiJJJI88DgKZx348ewlSRWU1uFyEbtMwZOoJRS5MjHbX9KgklFrlc-jKTXKL2S4K5aCXEU2isCuFhwORAz_DnnBai7nr2pyiK0HmM0Eb3AD_JyTUwWtg9O6c0jV0Nf8cbTuT3FD7WypVO_NWUJ_GZVo7er10LMUXE_1EP_d2nh2uziuXXmM1JV-9NN6klSATsLa_tprf0bDNbNa_U4DHMm6oQvXFfVHj74jRhq3nKDkCzQeQZ_SRMxNNqIUIN5aMLGbQfBAziZ_E3hIYp-ptOQ7Y2cqF_4eiYdY20tBm5ltySmFBQQi5_nFQ" target="_blank"&gt;link&lt;/a&gt;).&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations'&gt;https://cis-india.org/internet-governance/blog/mapping-web-censorship-net-neutrality-violations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2020-10-05T07:59:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/investigating-tls-blocking-in-india">
    <title>Investigating TLS blocking in India</title>
    <link>https://cis-india.org/internet-governance/blog/investigating-tls-blocking-in-india</link>
    <description>
        &lt;b&gt;A study into Transport Layer Security (TLS)-based blocking by three popular Indian ISPs: ACT Fibernet, Bharti Airtel and Reliance Jio.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Gurshabad Grover and Kushgra Singh collaborated with Simone Basso (OONI) to investigate TLS-based blocking in India. The research report was published on &lt;a class="external-link" href="https://ooni.org/post/2020-tls-blocking-india/"&gt;OONI's blog&lt;/a&gt;. It was edited and reviewed by Maria Xynou and Arturo Filastò.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;This report investigates Transport Layer Security
(&lt;a href="https://en.wikipedia.org/wiki/Transport_Layer_Security"&gt;TLS&lt;/a&gt;)-based
blocking in India. &lt;a href="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites"&gt;Previous
research&lt;/a&gt;
by the &lt;a href="https://cis-india.org/"&gt;Centre for Internet &amp;amp;
Society, India&lt;/a&gt; (CIS) has already
exposed TLS blocking based on the value of the &lt;a href="https://en.wikipedia.org/wiki/Server_Name_Indication"&gt;SNI
field&lt;/a&gt;.
OONI has also &lt;a href="https://ooni.org/post/2020-iran-sni-blocking/"&gt;implemented and started
testing&lt;/a&gt;
SNI-based TLS blocking measurements.&lt;/p&gt;
&lt;p&gt;Recently, the Magma Project
&lt;a href="https://blog.magma.lavafeld.org/post/women-on-web-blocking/"&gt;documented&lt;/a&gt;
cases where CIS India and OONI’s methodologies could be improved. They
specifically found that blocking sometimes appears to depend not only on
the value of the SNI field but also on the address of the web server
being used. These findings were later confirmed by OONI measurements in
&lt;a href="https://ooni.org/post/2020-engine-evaluation-spain"&gt;Spain&lt;/a&gt;
and &lt;a href="https://ooni.org/post/2020-iran-dot/"&gt;Iran&lt;/a&gt; through
the use of an extended measurement methodology.&lt;/p&gt;
&lt;p&gt;We were therefore curious to see whether such an extended methodology
would discover further cases of TLS blocking in India. To answer this
research question we ran experiments on the networks of three popular
Indian Internet Service Providers (ISPs) (&lt;a href="https://ipinfo.io/AS24309"&gt;ACT
Fibernet&lt;/a&gt;, &lt;a href="https://ipinfo.io/AS45609"&gt;Bharti
Airtel&lt;/a&gt;, and &lt;a href="https://ipinfo.io/AS55836"&gt;Reliance
Jio&lt;/a&gt;) which account for &lt;a href="https://trai.gov.in/sites/default/files/PIR_08012020_0.pdf"&gt;over
70% of the internet subscribers in
India&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We recorded SNI-based blocking on both Bharti Airtel and Reliance Jio.
We also discovered that Reliance Jio blocks TLS traffic not just based
on the SNI value, but also on the web server involved with the TLS
handshake. Moreover, we noticed that ACT Fibernet’s DNS resolver directs
users towards servers owned by ACT Fibernet itself. Such servers caused
the TLS handshake to fail, but the root cause of censorship was the DNS.&lt;/p&gt;
&lt;p&gt;We also document that one of the endpoints we tested,
&lt;code&gt;collegehumor.com:443&lt;/code&gt;, does not allow establishing TCP connection from
several vantage points and control measurements. Yet, in Reliance Jio,
we see cases where the connections to such endpoints complete
successfully and a timeout occurs during the TLS handshake. We believe
this is caused by some kind of proxy that terminates the TCP connection
and performs the TLS handshake.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Read the full research report on &lt;a class="external-link" href="https://ooni.org/post/2020-tls-blocking-india/"&gt;OONI's blog&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/investigating-tls-blocking-in-india'&gt;https://cis-india.org/internet-governance/blog/investigating-tls-blocking-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Simone Basso, Gurshabad Grover and Kushagra Singh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Protocols</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2020-07-09T01:23:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1">
    <title>Content takedown and users' rights</title>
    <link>https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1</link>
    <description>
        &lt;b&gt;After Shreya Singhal v Union of India, commentators have continued to question the constitutionality of the content takedown regime under Section 69A of the IT Act (and the Blocking Rules issued under it). There has also been considerable debate around how the judgement has changed this regime: specifically about (i) whether originators of content are entitled to a hearing, (ii) whether Rule 16 of the Blocking Rules, which mandates confidentiality of content takedown requests received by intermediaries from the Government, continues to be operative, and (iii) the effect of Rule 16 on the rights of the originator and the public to challenge executive action. In this opinion piece, we attempt to answer some of these questions.&lt;/b&gt;
        
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This article was first &lt;a class="external-link" href="http://https://theleaflet.in/content-takedown-and-users-rights/"&gt;published&lt;/a&gt; at the Leaflet. It has subsequently been republished by &lt;a class="external-link" href="https://scroll.in/article/953146/how-india-is-using-its-information-technology-act-to-arbitrarily-take-down-online-content"&gt;Scroll.in&lt;/a&gt;, &lt;a class="external-link" href="https://kashmirobserver.net/2020/02/15/content-takedown-and-users-rights/"&gt;Kashmir Observer&lt;/a&gt; and the &lt;a class="external-link" href="https://cyberbrics.info/content-takedown-and-users-rights/"&gt;CyberBRICS blog&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Last year, several Jio users from different states&amp;nbsp;&lt;a href="https://www.medianama.com/2019/03/223-indiankanoon-jio-block/"&gt;reported&lt;/a&gt;&amp;nbsp;that sites like Indian Kanoon, Reddit and Telegram were inaccessible through their connections. While attempting to access the website, the users were presented with a notice that the websites were blocked on orders from the Department of Telecommunications (DoT). When contacted by the founder of Indian Kanoon, Reliance Jio&amp;nbsp;&lt;a href="https://in.reuters.com/article/us-india-internet-idINKCN1RF14D"&gt;stated&lt;/a&gt;&amp;nbsp;that the website had been blocked on orders of the government, and that the order had been rescinded the same evening. However, in response to a Right to Information (RTI) request, the DoT&amp;nbsp;&lt;a href="https://twitter.com/indiankanoon/status/1218193372210323456"&gt;said&lt;/a&gt;&amp;nbsp;they had no information about orders relating to the blocking of Indian Kanoon.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Alternatively, consider that the Committee to Protect Journalists (CPJ)&amp;nbsp;&lt;a href="https://cpj.org/blog/2019/10/india-opaque-legal-process-suppress-kashmir-twitter.php"&gt;expressed concern&lt;/a&gt;&amp;nbsp;last year that the Indian government was forcing Twitter to suspend accounts or remove content relating to Kashmir. They reported that over the last two years, the Indian government suppressed a substantial amount of information coming from the area, and prevented Indians from accessing more than five thousand tweets.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;These instances are&amp;nbsp;&lt;a href="https://www.hindustantimes.com/analysis/to-preserve-freedoms-online-amend-the-it-act/story-aC0jXUId4gpydJyuoBcJdI.html"&gt;symptomatic&lt;/a&gt;&amp;nbsp;of a larger problem of opaque and arbitrary content takedown in India, enabled by the legal framework under the Information Technology (IT) Act. The Government derives its powers to order intermediaries (entities storing or transmitting information on behalf of others, a definition which includes internet service providers and social media platforms alike) to block online resources through&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/10190353/"&gt;section 69A&lt;/a&gt;&amp;nbsp;of the IT Act and the&amp;nbsp;&lt;a href="https://meity.gov.in/writereaddata/files/Information%20Technology%20%28%20Procedure%20and%20safeguards%20for%20blocking%20for%20access%20of%20information%20by%20public%29%20Rules%2C%202009.pdf"&gt;rules&lt;/a&gt;&amp;nbsp;[“the blocking rules”] notified thereunder. Apart from this,&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/844026/"&gt;section 79&lt;/a&gt;&amp;nbsp;of the IT Act and its allied rules also prescribe a procedure for content removal.&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/files/a-deep-dive-into-content-takedown-frames"&gt;Conversations&lt;/a&gt;&amp;nbsp;with one popular intermediary revealed that the government usually prefers to use its powers under section 69A, possibly because of the opaque nature of the procedure that we highlight below.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Under section 69A, a content removal request can be sent by authorised personnel in the Central Government not below the rank of a Joint Secretary.&amp;nbsp; The grounds for issuance of blocking orders under section 69A are: “&lt;em&gt;the interest of the sovereignty and integrity of India, defence of India, the security of the state, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognisable offence relating to the above.&lt;/em&gt;” Specifically, the blocking rules envisage the process of blocking to be largely executive-driven, and require strict confidentiality to be maintained around the issuance of blocking orders. This shrouds content takedown orders in a cloak of secrecy, and makes it impossible for users and content creators to ascertain the legitimacy or legality of the government action in any instance of blocking.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;Issues&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Supreme Court had been called to determine the constitutional validity of section 69A and the allied rules in&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/110813550/"&gt;&lt;em&gt;Shreya Singhal v Union of India&lt;/em&gt;&lt;/a&gt;. The petitioners had contended that as per the procedure laid down by these rules, there was no guarantee of pre-decisional hearing afforded to the originator of the information. Additionally, the petitioners pointed out that the safeguards built into section 95 and 96 of the Code of Criminal Procedure (CrPC), which allow state governments to ban publications and persons to initiate legal challenges to those actions respectively, were absent from the blocking procedures. Lastly, the petitioners assailed rule 16 of the blocking rules, which mandated confidentiality of blocking procedures, on the grounds that it was affecting their fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Court, however, found little merit in these arguments. Specifically, the Court found that section 69A was narrowly drawn and had sufficient procedural safeguards, which included the grounds of issuance of a blocking order being specifically drawn, and mandating that the reasons of the website blocking be in writing, thus making it amenable to judicial review. Further, the Court also found that the provision of setting up of a review committee saved the law from being constitutional infirmity. In the Court’s opinion, the mere absence of additional safeguards, as the ones built into the CrPC, did not mean that the law was unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;But do the ground realities align with the Court’s envisaged implementation of these principles? Apar Gupta, a counsel for the petitioners,&amp;nbsp;&lt;a href="https://indianexpress.com/article/opinion/columns/but-what-about-section-69a/"&gt;pointed&lt;/a&gt;&amp;nbsp;out that there was no recorded instance of pre-decisional hearing being granted to show that this safeguard contained in the rules was&amp;nbsp; actually being implemented. However, Gautam Bhatia&amp;nbsp;&lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt;read&lt;/a&gt;&amp;nbsp;&lt;em&gt;Shreya Singhal&amp;nbsp;&lt;/em&gt;to make an important advance: that the right of hearing be mandatorily extended to the ‘originator’, i.e. the content creator.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Additionally, Bhatia also noted that the Court, while upholding the constitutionality of the procedure under section 69A, held that the “&lt;em&gt;reasons have to be recorded in writing in such blocking order so that they may be assailed in a writ petition under Article 226 of the Constitution.&lt;/em&gt;”&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;There are two important takeaways from this.&amp;nbsp;&lt;em&gt;Firstly&lt;/em&gt;, he argued that the broad contours of the judgment invoke an established constitutional doctrine — that the fundamental right under Article 19(1)(a) does not merely include the right of expression, but also the&amp;nbsp;&lt;em&gt;right of access to information.&amp;nbsp;&lt;/em&gt;Accordingly, the right of challenging a blocking order was not only vested in the originator or the concerned intermediary, but may rest with the general public as well. And&amp;nbsp;&lt;em&gt;secondly&lt;/em&gt;, by the doctrine of necessary implication, it followed that for the general public to challenge any blocking order under Article 226, the blocking orders must be made public. While Bhatia concedes that public availability of blocking orders may be an over-optimistic reading of the judgment, recent events suggest that even the commonly-expected result, i.e. that the content creators having the right to a hearing, has not been implemented by the Government.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Consider the&amp;nbsp;&lt;a href="https://internetfreedom.in/delhi-hc-issues-notice-to-the-government-for-blocking-satirical-dowry-calculator-website/"&gt;blocking&lt;/a&gt;&amp;nbsp;of the satirical website DowryCalculator.com in September 2019 on orders from the government. The website displayed a calculator that suggests a ‘dowry’ depending on the salary and education of a prospective groom: even if someone misses the satire, the contents of the website are not immediately relatable to any grounds of removal listed under section 69A of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;Tanul Thakur, the creator of the website, was not granted a hearing despite the fact that he had publicly claimed the ownership of the website at various times and that the website had been covered widely by the press. The information associated with the domain name also publicly lists Thakur’s name and contact information. Clearly, the government made no effort to contact Thakur when passing the order. Perhaps even more worryingly, when he&amp;nbsp;&lt;a href="https://internetfreedom.in/delhi-hc-issues-notice-to-the-government-for-blocking-satirical-dowry-calculator-website/"&gt;tried&lt;/a&gt;&amp;nbsp;to access a copy of the blocking order by filing a RTI, the MeitY cited the confidentiality rule to deny him the information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This incident documents a fundamental problem plaguing the rules: the confidentiality clause is still being used to deny disclosure of key information on content takedown orders. The government has also used the provision to deny citizens a list of blocked websites , as responses to RTI requests have proven&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/rti-application-to-bsnl-for-the-list-of-websites-blocked-in-india"&gt;time&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://sflc.in/deity-provides-list-sites-blocked-2013-withholds-orders"&gt;again&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Clearly, the Supreme Court’s rationale in considering Section 69A and the blocking rules as constitutional is not one that is implemented in reality. The confidentiality clause is preventing legal challenges to content blocking in totality: content creators are unable access the orders, and hence are unable to understand the executive’s reasoning in ordering their content to be blocked from public access.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;As we noted earlier, the grounds of issuing a blocking order under section 69A pertain to certain reasonable restrictions on expression permitted by Article 19(2), which are couched in broad terms. The government’s implementation of section 69A and the rules make it impossible for any judicial review or accountability on the conformity of blocking orders &amp;nbsp;with the mentioned grounds under the rules, or any reasonable restriction at all.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;strong&gt;The Way Forward&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;From the opacity of proceedings under the law, to the lack of information regarding the same on public domain, the Indian content takedown regime leaves a lot to be desired from both the government and intermediaries at play.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;First, we believe the Supreme Court’s decision in&amp;nbsp;&lt;em&gt;Shreya Singhal v. Union of India&lt;/em&gt;&amp;nbsp;casts an obligation on the government to attempt to contact the content creator if they are passing a content takedown order to an intermediary.&amp;nbsp;&lt;em&gt;Second&lt;/em&gt;, even if the content creator is unavailable for a hearing at that instance, the confidentiality clause should not be used to prevent future disclosure of information to the content creator, so that affected citizens can access and challenge these orders.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;While we wait for legal reform, intermediaries can also step up to ensure the rights of users online are upheld. On receiving formal orders, intermediaries should&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/torsha-sarkar-suhan-s-and-gurshabad-grover-october-30-2019-through-the-looking-glass"&gt;assess&lt;/a&gt;&amp;nbsp;the legality of the received request. This should involve ensuring that only authorised agencies and personnel have sent the content removal orders, that the order specifically mentions what provision the government is exercising the power under, and that the content removal requests relate to the grounds of removal that are permissible under section 69A. For instance, intermediaries should refuse to entertain content removal requests under section 69A of the IT Act if they relate to obscenity, a ground not covered by the provision.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The representatives of the intermediary should also push for the committee to grant a hearing to the content creator. Here, the intermediary can act as a liaison between the uploader and the governmental authorities.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Supreme Court’s recent decision in&amp;nbsp;&lt;a href="https://indiankanoon.org/doc/82461587/"&gt;&lt;em&gt;Anuradha Bhasin v. Union of India&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;offers a glimmer of hope for user rights online&lt;em&gt;.&amp;nbsp;&lt;/em&gt;While the case primarily challenged the orders imposing section 144 of the CrPC and a communication blockade in Jammu and Kashmir, the final decision does affirm the fundamental principle that government-imposed restrictions on the freedom of expression and assembly must be made available to the public and affected parties to enable challenges in a court of law.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;The judiciary has yet another opportunity to consider the provision and the rules: late last year, Tanul Thakur&amp;nbsp;&lt;a href="https://internetfreedom.in/delhi-hc-issues-notice-to-the-government-for-blocking-satirical-dowry-calculator-website/"&gt;approached&lt;/a&gt;&amp;nbsp;the Delhi High Court to challenge the orders passed by the government to ISPs to block his website. One hopes that the future holds robust reforms to the content takedown regime.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&amp;nbsp;We live in an era where the ebb and flow of societal discourse is increasingly channeled through intermediaries on the internet. In the absence of a mature, balanced and robust framework that enshrines the rule of law, we risk arbitrary modulation of the marketplace of ideas by the executive.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Torsha Sakar and Gurshabad Grover are researchers at the Centre for Internet and Society.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Disclosure: The Centre for Internet and Society is a recipient of research grants from Facebook and Google.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1'&gt;https://cis-india.org/internet-governance/blog/content-takedown-and-users-rights-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Torsha Sarkar, Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2020-02-17T05:18:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites">
    <title>Reliance Jio is using SNI inspection to block websites</title>
    <link>https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites</link>
    <description>
        &lt;b&gt;Reliance Jio, the most popular ISP in India, is employing a deep packet inspection technique to block websites for its users.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was written by Gurshabad Grover and Kushagra Singh, and edited by Elonnai Hickok.&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;Background&lt;/h2&gt;
&lt;p&gt;In April this year, several Jio users were &lt;a class="external-link" href="https://in.reuters.com/article/us-india-internet-idINKCN1RF14D"&gt;puzzled&lt;/a&gt; to find that Reddit and Telegram were being blocked by the ISP. Around the same time, Sushant Sinha was perplexed to note that those using Jio connections were &lt;a class="external-link" href="https://in.reuters.com/article/us-india-internet-idINKCN1RF14D"&gt;unable&lt;/a&gt; to access IndianKanoon.com, the legal database he founded and runs.&lt;/p&gt;
&lt;p&gt;These experiences of arbitrary web censorship are the natural conclusion of an &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/to-preserve-freedoms-online-amend-the-it-act/story-aC0jXUId4gpydJyuoBcJdI.html"&gt;opaque legal framework&lt;/a&gt; that allows the Government of India to order ISPs to block certain websites for its users. The Central Government draws such powers from sections &lt;a class="external-link" href="https://indiankanoon.org/doc/10190353/"&gt;69A&lt;/a&gt; and &lt;a class="external-link" href="https://cis-india.org/internet-governance/resources/section-79-information-technology-act"&gt;79&lt;/a&gt; of the Information Technology (IT) Act and the rules issued thereunder. Notably, the “&lt;a class="external-link" href="https://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009"&gt;blocking rules&lt;/a&gt;” issued under Section 69A describe an executive-driven process, and further mandate the confidentiality of blocking orders issued to intermediaries. These rules have meant that it is next to impossible for netizens to know the complete list of websites blocked in India and the reasons for such blocking.&lt;/p&gt;
&lt;p&gt;Pertinently, the blocking rules do not mandate ISPs to use any particular technical method to block websites. This has meant that Indian ISPs are at liberty to pick whatever filtering mechanism they wish, which has had implications for how internet users experience and circumvent web censorship. Researchers at IIIT-Delhi have already &lt;a class="external-link" href="https://censorbib.nymity.ch/pdf/Yadav2018a.pdf"&gt;documented&lt;/a&gt; Indian ISPs are using two methods:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;Domain Name System (DNS) based blocking&lt;br /&gt;Users trying to access websites usually contact the ISP’s DNS directory to translate a human-parseable address like ‘example.com’ to its network address ‘93.184.216.34’. Some ISPs in India, like BSNL and MTNL, respond with incorrect network addresses to the users’ queries for websites they wish to block.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p dir="ltr"&gt;Hypertext Transfer Protocol (HTTP) header based blocking&lt;br /&gt;HTTP is the most popular way to transmit web pages. Since classic HTTP communication is unencrypted, ISPs can monitor for the website’s name that is attached (the HTTP Host header field) to such traffic. ISPs like Jio, Airtel and Vodafone monitor this field for names of websites they wish to block, intercept such requests, and return anything they wish as a response.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-6f251a6f-7fff-6dd6-c3f5-9d387d679381"&gt;Generally, ISPs’ use of either method directs users to a censorship notice when they find that the user is trying to access a ‘blocked’ website.&lt;/span&gt;&lt;/p&gt;
&lt;div align="center"&gt;&lt;img src="https://gurshabad.github.io/img/jio-sni-temp/http-block.png" alt="Error users will face when Jio censors websites with SNI-based filtering: notice that says the website is blocked on DoT orders" width="100%" /&gt;&lt;/div&gt;
&lt;p align="center" class="discreet"&gt;&lt;em&gt;Image 1: The notice served by Jio (through HTTP-header based filtering and injected response) when a user tries to access a blocked website. &lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-6f251a6f-7fff-6dd6-c3f5-9d387d679381"&gt;&lt;span id="docs-internal-guid-6be3aed2-7fff-de31-a209-cdf4fbcd1c3a"&gt;&lt;/span&gt;&lt;/span&gt;&lt;span id="docs-internal-guid-6f251a6f-7fff-6dd6-c3f5-9d387d679381"&gt;&lt;span id="docs-internal-guid-6be3aed2-7fff-de31-a209-cdf4fbcd1c3a"&gt;In this blogpost, we document how Jio is using, in addition to HTTP-based blocking, another censorship method: Server Name Indication (SNI) inspection. First, we explain what the SNI is. Then, we detail how you can independently confirm that Jio is using information in the SNI to block website access. In the end, we explain the implications of Jio’s decision.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;SNI Inspection&lt;/h2&gt;
&lt;p&gt;Transport Layer Security (&lt;a href="https://tools.ietf.org/html/rfc5246"&gt;TLS&lt;/a&gt;) is a cryptographic protocol for providing communication confidentiality and authenticity, commonly used for encrypting web traffic (as done in HTTPS). The SNI, defined first in &lt;a href="https://tools.ietf.org/html/rfc4366"&gt;RFC 4366&lt;/a&gt; and then in &lt;a href="https://tools.ietf.org/html/rfc6066"&gt;RFC 6066&lt;/a&gt;, is an extension to TLS designed to facilitate the hosting of multiple HTTPS websites on the same server. While establishing a secure connection (a TLS Client Hello), a client just fills in the SNI attribute with the hostname of the website it wishes to connect to.&lt;/p&gt;
&lt;p dir="ltr"&gt;SNI, unfortunately, travels on the network in cleartext, i.e. network operators can not only see the websites you’re visiting, but also filter traffic based on this information. The use of SNI inspection in state-directed web censorship was &lt;a href="https://tools.ietf.org/html/draft-irtf-pearg-censorship-00"&gt;not very common&lt;/a&gt; until recently. Only this year, the use of SNI inspection to censor websites was documented in &lt;a href="https://www.usenix.org/system/files/foci19-paper_chai_0.pdf"&gt;China&lt;/a&gt; and &lt;a href="https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/analysis-south-koreas-sni-monitoring/"&gt;South Korea&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In the Indian context, the aforementioned &lt;a href="https://censorbib.nymity.ch/pdf/Yadav2018a.pdf"&gt;paper&lt;/a&gt;, the researchers note that in Indian ISPs they investigated (including Jio), they “observed fewer than five instances of HTTPS filtering which were actually due to manipulated DNS responses [...], and not because of SNI field in TLS [...].” However, as the next section documents, Jio is now in fact using SNI-inspection based filtering.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The test&lt;br /&gt;&lt;/h2&gt;
&lt;p id="docs-internal-guid-98ae08c8-7fff-1a5e-7dc0-808494912d76" dir="ltr"&gt;To run our tests, we can take advantage of the fact that Google's server is configured to respond successfully to TLS connection attempts even if we send an SNI with a website’s name that it does not host on that server.&lt;/p&gt;
Using &lt;a href="https://www.openssl.org/"&gt;OpenSSL&lt;/a&gt;'s s_client utility, we attempt to establish a TLS 1.3 connection with an IP address (216.58.196.174) corresponding to google.com. However, instead of specifying 'google.com' in the SNI, we specify a potentially blocked website (PBW) 1337x.be.
&amp;nbsp;
&lt;pre&gt;openssl s_client -state -connect 216.58.196.174:443 -servername 1337x.be -tls1_3&lt;/pre&gt;
&lt;p&gt;Two important notes here:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;We are not connecting to the PBW at all! This simple approach is allowing us to rule out other censorship methods (like DNS, HTTP, and even IP/TCP-level blocking) from interfering with our results.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p&gt;We’re using TLS 1.3 to make our connections. This is because in older versions of TLS, the server passes its certificate to the client in cleartext. ISPs may also be using that information to block websites if older TLS versions are used. Using TLS 1.3 allows us to ensure that ISPs are indeed using SNI inspection to block websites.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We notice that when we specify a PBW in the SNI, we receive a TCP packet with the RST (reset) bit set almost immediately after the connection is established, which closes the established connection. Of course, a plausible explanation could be that the Google server itself might be resetting the connection upon realising that it does not host the PBW. However, this is neither the expected behaviour as per &lt;a href="https://tools.ietf.org/html/rfc6066"&gt;RFC 6066&lt;/a&gt;, nor do we notice the server doing so in all cases where we specify a SNI for a website that it is not hosted on the server. For example, when we specify facebook.com as the SNI, not only are we able to complete the TLS handshake but we're also able to make subsequent requests to the server after completing the handshake (albeit receiving an expected "not found" error in response).&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;You can find and compare the OpenSSL requests and responses for a PBW (1337x.be) and an uncensored website (facebook.com) &lt;a href="https://gist.github.com/kush789/3e1ce7901591225d7e7b4d89935ceaf0"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr"&gt;A caveat here is that we do not always notice such behaviour. For instance, while trying to detect such censorship, we found that connecting to one of Google’s IP address (216.58.196.174) resulted in connection resets. Whereas doing the same with a different IP address which google.com resolves to (172.217.161.14) resulted in successful connections. This seems to suggest that Jio has employed a limited number of middleboxes inspecting and filtering traffic based on the SNI.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2 dir="ltr"&gt;Implications&lt;/h2&gt;
&lt;p dir="ltr"&gt;The scale of users impacted by this technical choice is huge: according to &lt;a href="https://main.trai.gov.in/sites/default/files/PIR_01102019.pdf"&gt;data&lt;/a&gt; released by the Telecom Regulatory Authority of India last month, Jio is the most popular ISP in India. It currently serves 331.25 million internet subscribers in the country, which constitute 49.79% of internet subscribers in India. If Jio installs middleboxes at enough points across the regions it serves, all Jio customers potentially face SNI-based censorship.&lt;/p&gt;
&lt;p dir="ltr"&gt;The technical methods that ISPs use to implement website censorship have direct implications for how easily users can access blocked websites. Working around DNS spoofing, for example, can be fairly simple: one can change system settings to use to one of the many censorship-free DNS resolvers. The paper by IIIT-Delhi researchers also &lt;a href="https://censorbib.nymity.ch/pdf/Yadav2018a.pdf"&gt;found&lt;/a&gt; that circumventing HTTP-based censorship is easy in India because of how ISPs are implementing the mechanism. The currently &lt;a href="https://hal.inria.fr/hal-01202712/document"&gt;documented&lt;/a&gt; ways for clients to bypass SNI-based censorship is by either not specifying an SNI or specifying a modified SNI while connecting to the blocked website. However, both these approaches can be futile as the server hosting the website &lt;a href="https://tools.ietf.org/html/rfc6066"&gt;might close the connection&lt;/a&gt; upon observing such an SNI. To effectively circumvent SNI-based censorship, Jio users may have no choice but to resort to using Tor or VPNs to access blocked websites.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Another aspect is how the technical method chosen by ISPs can have implications for transparency in censorship. As pointed out in the beginning of the blogpost, the legal framework of web censorship in India lacks transparency, fails to make the Government accountable for its orders, and places no obligations on ISPs to be transparent about the websites they block or the methods they use for doing so. The choice of Jio to use SNI-inspection based filtering to implement web censorship aggravates this already-opaque system because it is technically impossible to serve censorship notices using this method. TLS is designed in a way that clients abort connections when they detect interception and on-path attacks. Thus, Jio can only create connection failures when it wishes to block websites using SNI inspection. Since users facing SNI-based censorship will not see censorship notices, they may be left confused as to whether the website they wish to access is unavailable, or being blocked by the ISP.&lt;/p&gt;
&lt;div align="center"&gt;&lt;img src="https://gurshabad.github.io/img/jio-sni-temp/sni-block.png" alt="Error users will face when Jio censors websites with SNI-based filtering: connection reset error." width="100%" /&gt;&lt;/div&gt;
&lt;p align="center" class="discreet"&gt;&lt;em&gt;Image 2: Error users will face when Jio censors websites with SNI-based filtering. &lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;h2&gt;&lt;span id="docs-internal-guid-495a8f9b-7fff-c336-98d9-3aac95b596f8"&gt;The way forward&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span id="docs-internal-guid-bc8e608a-7fff-b0be-f6c2-fefff911ea44"&gt;There is already ongoing work in the TLS working group at the Internet Engineering Task Force to encrypt the SNI. When there is wide deployment of encrypted SNI, we can expect SNI-inspection based filtering to be ineffective. However, the group currently faces several thorny &lt;/span&gt;&lt;a href="https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/?include_text=1"&gt;design problems&lt;/a&gt;; of primary relevance in this context is how TLS connection attempts that use encrypted SNI should not “stick out”, i.e. such traffic should not be easily distinguishable from TLS connection attempts that use cleartext SNI. Traffic relying on implementations of encrypted SNI that “stick out” can be filtered out, as South Korean networks are &lt;a href="https://twitter.com/grittygrease/status/1095530153319358465"&gt;doing&lt;/a&gt; already. Hopefully, we can expect that no Indian ISP will take such drastic measures.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://gurshabad.github.io/img/jio-sni-temp/ccby4.png" alt="CC 4.0 BY" /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites'&gt;https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover and Kushagra Singh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2020-07-09T01:31:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content">
    <title>MHA snoop order &amp; bid to amend IT rules: China-like clampdown or tracking unlawful content?</title>
    <link>https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content</link>
    <description>
        &lt;b&gt;An MHA order last week authorised 10 government agencies to scan data on computers. This was followed by the Modi government’s proposal to amend the Information Technology rules for social media platforms like WhatsApp, Facebook and Twitter to “proactively identify, remove or disable access to unlawful information or content” in order to curb fake news online.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Fatima Khan was &lt;a class="external-link" href="https://theprint.in/talk-point/mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content/170167/"&gt;published in the Print&lt;/a&gt; on December 28, 2018. Amber Sinha was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;No concrete steps taken by either NDA or UPA to enact laws for surveillance reform&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf"&gt;MHA order&lt;/a&gt; which  gives 10 government agencies the power to intercept, monitor and  decrypt ‘any information’ generated, transmitted, received, or stored in  any computer, reaffirms the sorry state of communication surveillance  law in India. This is reflected in the lack of judicial review, minimal  legislative oversight and no regard for the principles of necessity,  proportionality, user notification and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite detailed &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;recommendations&lt;/a&gt; by  the Committee of Experts led by Justice AP Shah back in 2013, there  have been no concrete steps taken by either the current NDA government  or the previous UPA government to enact laws for surveillance reform.  The &lt;a href="http://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;draft bill&lt;/a&gt; by  the committee led by Justice Srikrishna does refer to the principles of  necessity and proportionality, but stops short of recommending an  overhaul of the surveillance regime. This notification is but merely the  logical next step in the existing framework for communications  surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the &lt;a href="http://meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf"&gt;draft amendments&lt;/a&gt; to  the IT Act regulations seek to address the problem of ‘unlawful  content’ and seem to stem largely from concerns about the use of  platforms like Facebook and WhatsApp to spread disinformation and impact  electoral processes in India. To that extent, these steps are misguided  and betray a failure to engage with the actual problem. Already, the  powers of content moderation exercised by online platforms suffer from  problems of transparency and accountability. The draft regulations will  only serve to compound this problem while unreasonably expecting the  platforms to exercise powers which should require judicial  determination.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content'&gt;https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-12-30T10:08:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ietf-103">
    <title>IETF103</title>
    <link>https://cis-india.org/internet-governance/news/ietf-103</link>
    <description>
        &lt;b&gt;Internet Engineering Task Force (IETF) organized the IETF103 in Bangkok from November 3 to November 9, 2018. Gurshabad Grover attended the event.&lt;/b&gt;
        &lt;p class="moz-txt-link-rfc2396E"&gt;In the IETF hackathon, Gurshabad collaborated with Alp Toker (from NetBlocks.org) to develop a client-side website for testing DNS over HTTPS (DoH) servers. The tool can be used for decentralised testing of DoH servers for censorship and measurement. The tool can be found &lt;a class="external-link" href="https://netblocks.org/tmp/doh/"&gt;here&lt;/a&gt;. The slide deck we used to present can be found &lt;a class="external-link" href="https://datatracker.ietf.org/meeting/103/materials/slides-103-hrpc-hackathon-update-00"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="moz-txt-link-rfc2396E" style="text-align: justify; "&gt;In the meeting of the Human Rights Protocol Considerations (hrpc) research group, Niels ten Oever and Gurshabad presented a report from the hackathon. The video of the session is available on &lt;a class="external-link" href="https://www.youtube.com/watch?v=Bd33Be_P-FY"&gt;YouTube&lt;/a&gt;.&lt;/p&gt;
&lt;p class="moz-txt-link-rfc2396E" style="text-align: justify; "&gt;In the same meeting, it was decided that Gurshabad will be becoming a co-editor (with Niels ten Oever) on 'Guidelines for Human Rights Protocol Considerations' (draft-irtf-hrpc-guidelines), which is an active Internet Draft detailing a methodology for conducting human rights reviews of protocols and networking standards.&lt;/p&gt;
&lt;p class="moz-txt-link-rfc2396E" style="text-align: justify; "&gt;In the meeting of Registration Protocols Extensions (regext) working group, a human rights review I submitted of the 'Verification Code Extension for the Extensible Provisioning Protocol (EPP)'(draft-ietf-regext-verificationcode) was discussed at length. The video of the session is available on &lt;a class="external-link" href="https://www.youtube.com/watch?v=RTpCpfBbIiI"&gt;YouTube&lt;/a&gt;.&lt;/p&gt;
&lt;p class="moz-txt-link-rfc2396E" style="text-align: justify; "&gt;Gurshabad participated in the meetings of several other working groups, including Software Updates for IoT Devices (SUIT), Transport Layer Security (tls), and Privacy Enhancements and Assessments Research Group (pearg).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ietf-103'&gt;https://cis-india.org/internet-governance/news/ietf-103&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Freedom</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-12-14T02:05:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-logical-indian-october-27-2018-reliance-jio-users-complain-of-porn-websites-being-blocked">
    <title>Reliance-Jio Users Complain Of Porn Websites Being Blocked; Company Yet To Issue Official Statement</title>
    <link>https://cis-india.org/internet-governance/news/the-logical-indian-october-27-2018-reliance-jio-users-complain-of-porn-websites-being-blocked</link>
    <description>
        &lt;b&gt;Going by a lot of Jio network users, it seems that Mukesh Ambani’s Jio has banned hundreds of porn sites, in compliance with the order of the Department of Telecommunications.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published by &lt;a class="external-link" href="https://thelogicalindian.com/news/reliance-jio-porn-ban/"&gt;Logical Indian&lt;/a&gt; on October 27, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The order came after the Uttarakhand  High Court on September 28, 2018, had directed the Centre to block over  850 pornographic websites. Many Jio users have taken to social media to  show their protests. On Twitter, several users have threatened even to  change their network if Jio doesn’t lift the ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  the telecom operator has not issued an official statement confirming  the ban or on the development so far. The complaints have come to notice  after many users pointed out on social media platforms like Reddit and  Twitter that several porn websites are no longer available on Jio  network, as reported by the &lt;a href="https://www.financialexpress.com/industry/technology/jio-bans-popular-adult-websites-like-pornhub-xvideos-after-dot-order/1361891/" rel="noopener noreferrer" target="_blank"&gt;Financial Times&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;The High Court’s Order&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a href="https://indianexpress.com/article/india/uttarakhand-high-court-orders-blocking-porn-sites/"&gt;The Indian Express&lt;/a&gt;,  the Uttarakhand High court’s order came after the alleged gang rape of a  16-year old girl by four students at her boarding school in Dehradun.  It is alleged that the accused were “instigated by watching pornography”  on their mobile phones before committing the crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the order, the division bench of  acting chief, justice Rajiv Sharma and justice Manoj Kumar Tiwari said,  “There shall be a direction to all the Internet Service License Holders  to punctually obey the notification dated 31st July 2015 and to block  the publication or transmission of obscene material in any electronic  form.” It further added that material containing sexually explicit act  or conduct and also publishing or transmitting of material depicting  children in sexually explicit acts should also be blocked.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Same crackdown in 2015&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In 2015, the Department of  Telecommunications had issued an order to block 857 porn websites. They  had asked all the internet service providers to take compliance with the  order and block the websites. A lot of people protested against this  crackdown by the government. However, after receiving a huge criticism  from the people, the government partially lifted the ban. But, following  the rule, nothing had happened, and the porn sites were functioning as  before, reported &lt;a href="https://www.theguardian.com/culture/2015/aug/05/india-lifts-ban-on-internet-pornography-after-criticisms" rel="noopener noreferrer" target="_blank"&gt;The Guardian&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An Indian think tank, Centre for  Internet and Society member Pranesh Prakash said “It is illegitimate  because it is not as though the government has found these websites  unlawful … This is a blanket ban, and the government has not thought  through the consequences,” reported by The Guardian.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Logical Indian Take&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Watching or not watching porn is a  person’s liberty. India is a democratic nation, and according to our  constitution, we are conferred with the freedom of expression and the  right to personal liberty. So, this non-confirmed porn ban by Reliance  Jio would be getting into the freedom of an individual.&lt;/p&gt;
&lt;p&gt;After China, India has the  second-largest number of internet users in the world. And, Reliance-Jio  is just the third user base in India. The ban would not affect the  population much but is definitely a threat to the user rights.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-logical-indian-october-27-2018-reliance-jio-users-complain-of-porn-websites-being-blocked'&gt;https://cis-india.org/internet-governance/news/the-logical-indian-october-27-2018-reliance-jio-users-complain-of-porn-websites-being-blocked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-10-29T02:35:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news">
    <title>A trust deficit between advertisers and publishers is leading to fake news</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news</link>
    <description>
        &lt;b&gt;Transparency regulations is need of the hour. And urgently for election and political advertising. What do the ads look like? Who paid for them? Who was the target? How many people saw these advertisements? How many times? Transparency around viral content is also required.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news/story-SVNH9ot3KD50XRltbwOyEO.html"&gt;Hindustan Times&lt;/a&gt; on September 24, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, we have depended on the private censorship that  intermediaries conduct on their platforms. They enforce, with some  degree of success, their own community guidelines and terms of services  (TOS). Traditionally, these guidelines and TOS have been drafted keeping  in mind US laws since historically most intermediaries, including  non-profits like Wikimedia Foundation were founded in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across  the world, this private censorship regime was accepted by governments  when they enacted intermediary liability laws (in India we have Section  79A of the IT Act). These laws gave intermediaries immunity from  liability emerging from third party content about which they have no  “actual knowledge” unless they were informed using takedown notices.  Intermediaries set up offices in countries like India, complied with  some lawful interception requests, and also conducted geo-blocking to  comply with local speech regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For years, the Indian  government has been frustrated since policy reforms that it has pursued  with the US have yielded little fruit. American policy makers keep  citing shortcomings in the Indian justice systems to avoid expediting  the MLAT (Mutual Legal Assistance Treaties) process and the signing of  an executive agreement under the US Clout Act. This agreement would  compel intermediaries to comply with lawful interception and data  requests from Indian law enforcement agencies no matter where the data  was located.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data localisation requirement in the draft  national data protection law is a result of that frustration. As with  the US, a quickly enacted data localisation policy is absolutely  non-negotiable when it comes to Indian military, intelligence, law  enforcement and e-governance data. For India, it also makes sense in the  cases of health and financial data with exceptions under certain   circumstances. However, it does not make sense for social media  platforms since they, by definition, host international networks of  people. Recently an inter ministerial committee recommended that  “criminal proceedings against Indian heads of social media giants” also  be considered. However, raiding Google’s local servers when a lawful  interception request is turned down or arresting Facebook executives  will result in retaliatory trade actions from the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the consequences of online recruitment, disinformation in  elections and fake news to undermine public order are indeed serious,  are there alternatives to such extreme measures for Indian policy  makers? Updating intermediary liability law is one place to begin. These  social media companies increasingly exercise editorial control, albeit  indirectly, via algorithms to claim that they have no “actual  knowledge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But they are no longer mere conduits or dumb pipes as  they are now publishers who collect payments to promote content.  Germany passed a law called NetzDG in 2017 which requires expedited  compliance with government takedown orders. Unfortunately, this law does  not have sufficient safeguards to prevent overzealous private  censorship. India should not repeat this mistake, especially given what  the Supreme Court said in the Shreya Singhal judgment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency  regulations are imperative. And they are needed urgently for election  and political advertising. What do the ads look like? Who paid for them?  Who was the target? How many people saw these advertisements? How many  times? Transparency around viral content is also required. Anyone should  be able to see all public content that has been shared with more than a  certain percentage of the population over a historical timeline for any  geographic area. This will prevent algorithmic filter bubbles and echo  chambers, and also help public and civil society monitor  unconstitutional and hate speech that violates terms of service of these  platforms. So far the intermediaries have benefitted from surveillance —  watching from above. It is time to subject them to sousveillance —  watched by the citizens from below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data portability mandates and  interoperability mandates will allow competition to enter these monopoly  markets. Artificial intelligence regulations for algorithms that  significantly impact the global networked public sphere could require –  one, a right to an explanation and two, a right to influence automated  decision making that influences the consumers experience on the  platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The real solution lies elsewhere. Google and Facebook  are primarily advertising networks. They have successfully managed to  destroy the business model for real news and replace it with a business  model for fake news by taking away most of the advertising revenues from  traditional and new news media companies. They were able to do this  because there was a trust deficit between advertisers and publishers.  Perhaps this trust deficit could be solved by a commons-based solutions  based on free software, open standards and collective action by all  Indian new media companies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-10-02T06:44:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society">
    <title>India’s post-truth society</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society</link>
    <description>
        &lt;b&gt;The proliferation of lies and manipulative content supplies an ever-willing state a pretext to step up surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was published in &lt;a class="external-link" href="https://www.thehindubusinessline.com/opinion/deconstructing-the-20-society/article24895705.ece"&gt;Hindu Businessline&lt;/a&gt; on September 7, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;After a set of rumours spread over WhatsApp triggered a series of  lynchings across the country, the government recently took the  interesting step of placing the responsibility for this violence on  WhatsApp. This is especially noteworthy because the party in power, as  well as many other political parties, have taken to campaigning over  social media, including using WhatsApp groups in a major way to spread  their agenda and propaganda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After all, a simple tweet or message  could be shared thousands of times and make its way across the country  several times, before the next day’s newspaper is out. Nonetheless,  while the use of social media has led to a lot of misinformation and  deliberately polarising ‘news’, it has also helped contribute to  remarkable acts of altruism and community, as seen during the recent  Kerala floods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government has taken a seemingly  techno-determinist view by placing responsibility on WhatsApp, the  duality of very visible uses of social media has led to others viewing  WhatsApp and other internet platforms more as a tool, at the mercy of  the user. However, as historian Melvin Kranzberg noted, “technology is  neither good nor bad; nor is it neutral”. And while the role of  political and private parties in spreading polarising views should be  rigorously investigated, it is also true that these internet platforms  are creating new and sometimes damaging structural changes to how our  society functions. A few prominent issues are listed below:&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Fragmentation of public sphere&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Jurgen  Habermas, noted sociologist, conceptualised the Public Sphere as being  “a network for communicating information and points of view, where the  streams of communication are, in the process, filtered and synthesised  in such a way that they coalesce into bundles of topically specified  public opinions”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a large extent, the traditional gatekeepers  of information flow, such as radio, TV and mainstream newspapers,  performed functions enabling a public sphere. For example, if a  truth-claim about an issue of national relevance was to be made, it  would need to get an editor’s approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case there was a  counter claim, that too would have to pass an editorial check. Today  however, nearly anybody can become a publisher of information online,  and if it catches the right ‘influencer’s attention, it could spread far  wider and far quicker than it would’ve in traditional media. While this  does have the huge positive of giving space to more diverse viewpoints,  it also comes with two significant downsides.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, that it  gives a sense of ‘personal space’ to public speech. An ordinary person  would think a few times, do some research, and perhaps practice a speech  before giving it before 10,000 people. An ordinary person would also  think for perhaps five seconds before putting out a tweet on the very  same topic, despite now having a potentially global audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second,  by having messages sent directly to your hand-held device, rather than  open for anyone to fact-check and counter, there is less transparency  and accountability for those who send polarising material and  misinformation. How can a mistaken and polarising view be countered, if  one doesn’t even know it is being made? And if it can’t be countered,  how can its spread by contained?&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The attention market&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Not  only is that earlier conception of public sphere being fragmented, these  new networked public spheres are also owned by giant corporations. This  means that these public spheres where critical discourse is being  shaped and spread, are actually governed by advertisement-financed  global conglomerates. In a world of information overflow, and privately  owned, ad-financed public spheres, the new unit of currency is  attention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is in the direct interest of the Facebooks and  Googles of the world, to capture user attention as long as possible,  regardless of what type of activity that encourages. It goes without  saying that neither the ‘mundane and ordinary’, nor the ‘nuanced and  detailed’ capture people’s attention nearly as well as the sensational  and exciting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nearly as addicting, studies show, are the  headlines and viewpoints which confirm people’s biases. Fed by  algorithms that understand the human desire to ‘fit in’, people are  lowered into echo chambers where like-minded people find each other and  continually validate each other. When people with extremist views are  guided to each other by these algorithms, they not only gather  validation, but also now use these platforms to confidently air their  views — thus normalising what was earlier considered extreme. Needless  to say, internet platforms are becoming richer in the process.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Censorship by obfuscation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Censorship  in the attention economy, no longer requires blocking of views or  interrupting the transmission of information. Rather, it is sufficient  to drown out relevant information in an ocean of other information. Fact  checking news sites face this problem. Regardless of how often they  fact-check speeches by politicians, only a minuscule percentage of the  original audience comes to know about, much less care about the  corrections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, repeated attacks (when baseless) on  credibility of news sources causes confusion about which sources are  trustworthy. In her extremely insightful book “Twitter and Tear Gas”,  Prof Zeynep Tufekci rightly points out that rather than traditional  censorship, powerful entities today, (often States) focus on  overwhelming people with information, producing distractions, and  deliberately causing confusion, fear and doubt. Facts, often don’t  matter since the goal is not to be right, but to cause enough confusion  and doubt to displace narratives that are problematic to these powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Viewpoints  from members of groups that have been historically oppressed, are  especially harangued. And those who are oppressed tend to have less  time, energy and emotional resources to continuously deal with online  harassment, especially when their identities are known and this  harassment can very easily spill over to the physical world.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Habermas  saw the ideal public sphere as one that is free of lies, distortions,  manipulations and misinformation. Needless to say, this is a far cry  from our reality today, with all of the above available in unhealthy  doses. It will take tremendous effort to fix these issues, and it is  certainly no longer sufficient for internet platforms to claim they are  neutral messengers. Further, whether the systemic changes are understood  or not, if they are not addressed, they will continue to create and  expand fissures in society, giving the state valid cause for intervening  through backdoors, surveillance, and censorship, all actions that  states have historically been happy to do!&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society'&gt;https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>swaraj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-09-12T12:16:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship">
    <title>Anti-trafficking Bill may lead to censorship</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship</link>
    <description>
        &lt;b&gt;There are a few problematic provisions in the proposed legislation—it may severely impact freedom of expression.&lt;/b&gt;
        &lt;p class="S3l" style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.livemint.com/Opinion/GxZ795DUjW3fFrFcWcWp6N/Antitrafficking-Bill-may-lead-to-censorship.html"&gt;Livemint&lt;/a&gt; on July 24, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="S3l" style="text-align: justify; "&gt;The  legislative business of the monsoon session of Parliament kicked off on  18 July with the introduction of the Trafficking of Persons  (Prevention, Protection and Rehabilitation) Bill, 2018, in the Lok  Sabha. The intention of the Union government is to “make India a leader  among South Asian countries to combat trafficking” through the passage  of this Bill. Good intentions aside, there are a few problematic  provisions in the proposed legislation, which may severely impact  freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For  instance, Section 36 of the Bill, which aims to prescribe punishment  for the promotion or facilitation of trafficking, proposes a minimum  three-year sentence for producing, publishing, broadcasting or  distributing any type of material that promotes trafficking or  exploitation. An attentive reading of the provision, however, reveals  that it has been worded loosely enough to risk criminalizing many  unrelated activities as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  phrase “any propaganda material that promotes trafficking of person or  exploitation of a trafficked person in any manner” has wide amplitude,  and many unconnected or even well-intentioned actions can be construed  to come within its ambit as the Bill does not define what constitutes  “promotion”. For example, in moralistic eyes, any sexual content online  could be seen as promoting prurient interests, and thus also promoting  trafficking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rather  than imposing a rigorous standard of actual and direct nexus with the  act of trafficking or exploitation, a vaguer standard which includes  potentially unprovable causality, including by actors who may be  completely unaware of such activity, is imposed. This opens the doors to  using this provision for censorship and&lt;b&gt; &lt;/b&gt;imposes a chilling  effect on any literary or artistic work which may engage with sensitive  topics, such as trafficking of women.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  the past, governments have been keen to restrict access to online  escort services and pornography. In June 2016, the Union government  banned 240 escort sites for obscenity even though it cannot do that  under Section 69A or Section 79 of the Information Technology Act, or  Section 8 of the Immoral Traffic (Prevention) Act. In July 2015, the  government asked internet service providers (ISPs) to block 857  pornography websites sites on grounds of outraging “morality” and  “decency”, but later rescinded the order after widespread criticism. If  historical record is any indication, Section 36 in this present Bill  will legitimize such acts of censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 39 proposes an even weaker standard for criminal acts by proposing that any act of publishing or advertising “which &lt;i&gt;may &lt;/i&gt;lead  to the trafficking of a person shall be punished” (emphasis added) with  imprisonment for 5-10 years. In effect, the provision mandates  punishment for vaguely defined actions that may not actually be  connected to the trafficking of a person at all. This is in stark  contrast to most provisions in criminal law, which require &lt;i&gt;mens rea &lt;/i&gt;(intention) along with &lt;i&gt;actus reus &lt;/i&gt;(guilty  act). The excessive scope of this provision is prone to severe abuse,  since without any burden of showing a causal connect, it could be argued  that anything “may lead” to the trafficking of a person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another  by-product of passing the proposed legislation would be a dramatic  shift in India’s landscape of intermediary liability laws, i.e., rules  which determine the liability of platforms such as Facebook and Twitter,  and messaging services like Whatsapp and Signal for hosting or  distributing unlawful content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions  in the Bill that criminalize the “publication” and “distribution” of  content, ignore that unlike the physical world, modern electronic  communication requires third-party intermediaries to store and  distribute content. This wording can implicate neutral communication  pipeways, such as ISPs, online platforms, mobile messengers, which  currently cannot even know of the presence of such material unless they  surveil all their users. Under the proposed legislation, the fact that  human traffickers used Whatsapp to communicate about their activities  could be used to hold the messaging service criminally liable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By  proposing such, the Bill is in direct conflict with the internationally  recognized Manila Principles on Intermediary Liability, and in  dissonance with existing principles of Indian law, flowing from the  Information Technology Act, 2000, that identify online platforms as  “safe harbours” as long as they act as mere conduits. From the  perspective of intermediaries, monitoring content is unfeasible, and  sometimes technologically impossible as in the case of Whatsapp, which  facilitates end-to-end encrypted messaging. And as a 2011 study by the  Centre for Internet &amp;amp; Society showed, platforms are happy to  over-comply in favour of censorship to escape liability rather than  verify actual violations. The proposed changes will invariably lead to a  chilling effect on speech on online platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering  these problematic provisions, it will be a wise move to send the Bill  to a select committee in Parliament wherein the relevant stakeholders  can engage with the lawmakers to arrive at a revised Bill, hopefully one  which prevents human trafficking without threatening the Constitutional  right of free speech.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship'&gt;https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Swaraj Barooah and Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-08-02T13:59:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-shutdown-stories">
    <title>Internet Shutdown Stories</title>
    <link>https://cis-india.org/internet-governance/blog/internet-shutdown-stories</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) has published a collection of stories of the impact of internet shutdowns on people's lives in the country. This book seeks to give a glimpse into the lives of those directly affected by these internet shutdown experiments. When seen in a larger context, we hope that the stories in this book also demonstrate that access to the internet and freedom of speech is not just about an individual’s rights, but are also required for the collective good. This is a project funded by Facebook and MacArthur Foundation, and the stories were provided by 101 Reporters. Case studies from the states of Jammu &amp; Kashmir, Haryana, Rajasthan, Gujarat, Telangana, West Bengal, Tripura, Manipur, Nagaland, and Uttar Pradesh have been highlighted in this compilation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Read the report here: &lt;a class="external-link" href="https://cis-india.org/internet-shutdown-stories/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;p&gt;The report is shared under Creative Commons Attribution-NoDerivatives 4.0 International license.&lt;/p&gt;
&lt;h4&gt;Edited by Debasmita Haldar, Ambika Tandon, and Swaraj Barooah&lt;/h4&gt;
&lt;h4&gt;Print Design by Saumyaa Naidu&lt;/h4&gt;
&lt;h4&gt;Advisor: Nikhil Pahwa, Founder and Editor at &lt;a href="https://www.medianama.com/" target="_blank"&gt;MediaNama&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;Foreword&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Aside from the waves of innovation that the digital revolution brought with it, the ever increasing pervasiveness of the internet has had a tremendous impact on empowerment and freedoms in society. We are seeing unprecedented levels of access to information, along with a democratization of the means of creation, production and dissemination of information to anyone with an internet connection. This in turn has greatly amplified, and in many cases even created the ability, particularly for those traditionally left in the margins, to more meaningfully participate in their global as well as local societies. Recognising the significance of the internet to the freedom of expression as well as for the development and exercising of human rights more broadly, the United Nations Human Rights Council unanimously passed a resolution confirming internet access being a fundamental human right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Simultaneously however, we are seeing Indian states discover and experiment with their power to clamp down on these new modes of communication for a variety of reasons, ranging from the ill-intentioned to the ill-informed. An internet shutdown tracker maintained by the Software Freedom Law Centre, shows that the number of shutdowns in India is increasing every year, with 70 shutdowns reported in 2017,and 45 shutdowns already &lt;a class="external-link" href="https://internetshutdowns.in/"&gt;reported from 1st Jan, 2018 to 4th May, 2018&lt;/a&gt;.&amp;nbsp;These shutdowns also come at a significant economic cost. A 2016 &lt;a class="external-link" href="http://www.brookings.edu/wp-content/uploads/2016/10/intenet-shutdowns-v-3.pdf"&gt;Brookings report&lt;/a&gt; estimates that India faced a loss of about $968 million due to internet shutdowns. However, the democratic harms we have been accruing are more difficult to quantify and demonstrate.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This book seeks to give a glimpse into the lives of those directly affected by these internet shutdown experiments. From Jammu and Kashmir to Telangana, from Gujarat to Nagaland, we have collected 30 stories from across the country for an up-close look at how the everyday lives of common citizens have been impacted by internet shutdowns and website blocks. From CRPF members posted in Srinagar who use the internet to connect with their family, to students who have been cut off from education resources for competitive exams; from the disruptions in day to day life brought about by non-functional bank services in Darjeeling, to stock brokers in Ahmedabad who faced costly slowdowns; the idea of a Digital India is facing severe setbacks with these continuously increasing internet shutdowns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;When seen in a larger context, we hope that the stories in this book also demonstrate that access to the internet and freedom of speech is not just about an individual’s rights, but are also required for the collective good. The diversity of perspectives and activities that a healthy democracy demands is not met by the versioning of dominant narratives, but by allowing for, if not directly encouraging, the voices and activities of the unheard, oppressed and marginalised. We hope that in the telling of these personal stories of the day-to-day of people affected by such internet shutdowns, this book joins in the effort to position the dehumanized internet kill switches more aptly as dangers to democracy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Sunil Abraham&lt;/strong&gt;&lt;br /&gt;Executive Director&lt;br /&gt;The Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-shutdown-stories'&gt;https://cis-india.org/internet-governance/blog/internet-shutdown-stories&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2019-09-03T09:57:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
