<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 811 to 825.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/firstpost-danish-raza-july-10-2013-indias-central-monitoring-system-security-cant-come-at-cost-of-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/theregister-uk-phil-muncaster-july-9-2013-indias-centralised-snooping-system-facing-big-delays"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/privacy-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/policies/ethical-research-guidelines"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens">
    <title>How the world’s largest democracy is preparing to snoop on its citizens</title>
    <link>https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens</link>
    <description>
        &lt;b&gt;Monitoring system will allow govt to snoop on voice calls, SMSes, and access Internet data. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Leslie D' Monte and Joji Thomas Philip was &lt;a class="external-link" href="http://www.livemint.com/Politics/pR5zc8hCD1sn3NWQwa7cQJ/The-new-surveillance-state.html"&gt;published in Livemint&lt;/a&gt; on July 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Nothing will be secret or private.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;Every conversation on landlines and mobile phones will be  heard; some will be recorded. Every move you make on the Internet will  be tracked.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;Fiction?&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;By December, when the Nanny State goes live, it will be fact.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Once the government’s innocuously named CMS  (communication monitoring system) is in place, the state will be able to  snoop on your voice calls, fax messages, SMSes and MMSes, across all  phone networks. It will be able to access your Internet data, and see  not just what sites you visit but even build a cache of your inbox, to  decrypt at leisure.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;The process began more than a couple of years ago.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;On 29 April 2011, India’s home ministry called for bids  to set up communications monitoring systems in all state capitals. The  notice, which was published on its website and went almost unnoticed,  specified that the system should be able to monitor voice calls, fax  messages, SMSes and MMSes, and work across terrestrial networks, GSM and  CDMA (the dominant mobile telephony platforms), and the Internet.&lt;/p&gt;
&lt;div class="p"&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/q9fAaeNdzUQ" width="320"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The tender specified that the system should be able to  listen in live, and be able to analyse intercepted data. It should have  the ability to record, store and playback, without interfering “with the  operation of telecommunication network or make the target aware that he  is being monitored”.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;The CMS is no longer a concept. It has undergone  successful pilots and is likely to be commissioned by the year-end,  according to an internal note dated 10 June from the department of  telecommunications (DoT).&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;A top government official, who did not want to be named, said the CMS  centralized data centre is likely to be ready by July and commissioned  by October. The official also added that the Centre for Development of  Telematics (C-DoT), the government’s telecom technology arm, has “signed  an agreement with the Centre for Artificial Intelligence and Robotics  (CAIR) for Internet Service Provider integration”. This agreement will  allow monitoring agencies to track an individual’s Internet use.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;Subsequent media reports, which have cited internal government documents, peg the cost of the CMS at around Rs.400 crore, but there is hardly any official data from the government about the implementation of the CMS.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;In its 2012-13 annual report, DoT said the government has decided to set up the CMS for lawful interception and monitoring by law enforcement agencies, “reducing the manual intervention at many stages as well as saving of time”.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;The system, according to the report, was to be installed by C-DoT after which the Telecom Enforcement, Resource and Monitoring (TERM) cells would take over. As on 31 March, there were 34 such TERM cells in the country. The current number could not be ascertained.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;How does the government justify this invasive system? Its purpose is unclear, but national security is always a handy spectre. And so what if such a system can be misused to bully, spy and curtail the freedom of individuals? Indeed, India’s track record of using existing laws doesn’t inspire confidence.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;Student &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shaheen%20Dhada"&gt;Shaheen Dhada&lt;/a&gt; was arrested (under the law) for criticizing the shutdown of Mumbai after the death of Shiv Sena supremo &lt;a href="http://www.livemint.com/Search/Link/Keyword/Bal%20Thackeray"&gt;Bal Thackeray&lt;/a&gt; on her personal Facebook account. Her friend, &lt;a href="http://www.livemint.com/Search/Link/Keyword/Renu%20Srinivasan"&gt;Renu Srinivasan&lt;/a&gt;, who had “liked” the comment was also arrested. The two were later freed, on bail.&lt;/p&gt;
&lt;h3 class="documentcontent" style="text-align: justify; "&gt;No known safeguards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But how does the CMS work? According to the government official cited above, the Central Bureau for Investigation (CBI), for instance, is likely to be provided interception facilities through the CMS in Delhi initially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“CBI shall enter data related to target in the CMS system and approach the telecom services provider”, at which point the process is automated, and the provider simply sends the data to a server which forwards the requested information, he explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He didn’t mention any safeguards, nor have any been made public, which means that there are likely none. In a Q&amp;amp;A session on the popular social network Reddit on Tuesday, academic and activist &lt;a href="http://www.livemint.com/Search/Link/Keyword/Lawrence%20Lessig"&gt;Lawrence Lessig&lt;/a&gt;, the co-founder of Creative Commons, wrote on the subject of snooping in the US, “I’m really troubled by national security programmes. We don’t know what protections are built into the system.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That has become the subject of much debate following the leaks by whistleblower &lt;a href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt; about the US National Security Agency’s surveillance programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lessig pointed out that protection based on code is the only real protection from misuse, as other safeguards are dependent on people choosing not to violate reasonable expectations of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is the heart of the problem. From what we know, the list of agencies with access to data in India is already large: the Research and Analysis Wing, CBI, the National Investigation Agency, the Central Board of Direct Taxes, the Narcotics Control Bureau, and the Enforcement Directorate. More may be added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the system to be useful in any practical fashion, access will have to be given to a large number of officials in each of these agencies. And in the absence of safeguards, one must assume that all data is accessible to all officials.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, some of this information is already being tracked by Internet companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravina Kothari, a 22-year-old student at Cardiff University, said she learnt a bitter lesson “last year when I Googled my name”. “It revealed all the personal details I had put up on social media sites. My childhood school photos popped up on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google"&gt;Google&lt;/a&gt; image search results. Worse, I had not put them there. My friends had tagged me in—all so scary. And I can’t do anything about it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has since stopped uploading personal details such as videos, pictures or telephone numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twenty-one-year-old Shruti Lodha, studying to be a chartered accountant, feels a similar discomfort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I am definitely not comfortable with Google, and how every time I Google myself it reveals my identity and shows information that is on social media sites.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, 24-year-old &lt;a href="http://www.livemint.com/Search/Link/Keyword/Max%20Schrems"&gt;Max Schrems&lt;/a&gt; of Vienna, Austria, asked the world’s largest social networking site &lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook%20Inc."&gt;Facebook Inc.&lt;/a&gt; for a copy of every piece of information it had collected on him since he had created an account with it two years earlier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Schrems was delivered a CD packing a 1,222-page file that included information he had deleted, but had been stored on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt;’s servers, according to ThreatPost, a publication on information technology (IT) security run by Kaspersky Lab, a leading maker of antivirus software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Had Schrems been a resident of India, he could not have known how much personal information Facebook had on him. Every person in the European Union (EU) has the right to access all the data that a company holds on him or her.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the CMS, all this information, and much more, can be called up by just about anyone—the taxman, CBI officials, Assam Police (which will also monitor the network according to some reports)—and the old bogey of national security may not even be raised.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Need for a privacy law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Publicly at least, companies agree that the new monitoring systems infringe on our rights. &lt;a href="http://www.livemint.com/Search/Link/Keyword/Subho%20Ray"&gt;Subho Ray&lt;/a&gt;, president, Internet and Mobile Association of India said, “Without any prior permission, government should not take or use any information which is considered private. The biggest challenge for us is that we do not have a privacy law in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber law experts and privacy lobby groups caution that the world’s largest democracy’s attempt to snoop on its citizens with the CMS, ostensibly for security reasons, could be abused in the absence of a transparent process and a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue has become alarming, they add, with the US admitting to be collecting billions of pieces of information on immigrants—6.3 billion from Indian citizens alone under the Foreign Intelligence Surveillance Act, according to an 8 June report in the UK-based &lt;i&gt;The Guardian&lt;/i&gt; newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We don’t know much about the CMS, except that when implemented, it could be plugged directly into telecom nodes and lead to widespread tapping,” said Apar Gupta, a partner at law firm Advani and Co. specializing in IT law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There’s no legal sanction as of now for any type of mass surveillance, such as the one that the CMS suggests,” said Pavan Duggal, a Supreme Court lawyer and cyberlaw expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta added that since India lacks privacy legislation, which obliges companies to maintain privacy standards when they export the data which they’ve gathered in India overseas, “this poses a problem”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;N.S. Nappinai, a Bombay high court advocate, said, “India has lived without any codified laws to protect privacy all these years and has relied primarily on Article 21 of the Constitution. Protecting privacy has just become more complicated with the humongous quantity of data being uploaded online. People seem totally unaware of the trouble they are inviting upon themselves.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current laws are already compromised&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The lack of a privacy law makes it easier for the government to take such extreme steps. The Indian Telegraph Act and the IT Act, 2008 (amendments introduced in the IT Act, 2000), already gives the government the power to monitor, intercept and even block online conversations and websites. The addition of the CMS will greatly widen the number of sources and could simplify access to these records as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 25 April 2011, the government admitted that the existing laws include provisions for interception and pointed out that the Supreme Court had, on 18 December 1996, upheld the constitutional validity of interceptions and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the court had added that telephone tapping infringes on the right to life and the right to freedom of speech and expression, unless permitted under special procedures, these guidelines are not usually implemented, according to activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shortcomings of the existing laws already make it possible to misuse the vast amount of information that is available today. These laws were written at a time when the Internet was not a fact of life, and where the lines between public and private were not already blurred. Given that, the perspectives on privacy can be worrisome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a report presented to the Lok Sabha on 13 December 2011, the ministry of planning said, “Collection of information without a privacy law in place does not violate the right to privacy of the individual…There is no bar on collecting information, the only requirement to be fulfilled with respect to the protection of the privacy of an individual is that care should be taken in collection and use of information, consent of individual would be relevant, information should be kept safe and confidential.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This proposed Right to Privacy Bill was leaked to the public, and eventually nothing came of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 16 October 2012, a commission headed by justice (retired) &lt;a href="http://www.livemint.com/Search/Link/Keyword/A.P.%20Shah"&gt;A.P. Shah&lt;/a&gt; issued a report that included the study of privacy laws and related Bills from around the world. The report noted that with the “increased collection of citizen information by the government, concerns have emerged on their impact on the privacy of persons”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the report being given to the Planning Commission, the government has continued with its plans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early this year, a privacy lobby body, the Centre for Internet and Society (CIS) drafted the Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS worked with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India and held round table meetings around the country to bring about a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director, CIS, said, “While the government sets out to protect national interests, it’s also very important to protect the rights of individuals.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The way ahead&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Human Rights Watch, in a 7 June media release, described the CMS as “chilling, given its (India’s) reckless and irresponsible use of sedition and Internet laws”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;i&gt;Freedom on the Net 2012&lt;/i&gt;, released on 24 September, India—which scored 39 points out of 100—was termed “partly-free”. But India is not alone. Around 40 countries filter the Internet in varying degrees, including democratic and non-democratic governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/YouTube"&gt;YouTube&lt;/a&gt; and Gmail (both owned by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google%20Inc."&gt;Google Inc.&lt;/a&gt;), &lt;a href="http://www.livemint.com/Search/Link/Keyword/BlackBerry"&gt;BlackBerry&lt;/a&gt;, WikiLeaks, Skype (owned by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Microsoft%20Corp."&gt;Microsoft Corp.&lt;/a&gt;), &lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt; and Facebook have all been censored, at different times, in countries such as China, Iran, Egypt and India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;European Union countries have strong privacy laws as is evident from the Schrems case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Australia is engaged in putting similar safeguards in place. On 24 June, a Senate committee recommended that Australia’s proposed data retention scheme only be considered if it just collected metadata, avoided capture of browser histories and contained rigorous privacy controls and oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian politicians could take a cue from such countries when balancing national interest with protecting the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gopal Sathe in New Delhi and Zahra Khan in Mumbai contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens'&gt;https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T09:41:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/firstpost-danish-raza-july-10-2013-indias-central-monitoring-system-security-cant-come-at-cost-of-privacy">
    <title>India’s Central Monitoring System: Security can’t come at cost of privacy</title>
    <link>https://cis-india.org/news/firstpost-danish-raza-july-10-2013-indias-central-monitoring-system-security-cant-come-at-cost-of-privacy</link>
    <description>
        &lt;b&gt;During a Google hangout session in June this year, Milind Deora, minister of state for communications and information technology, addressed concerns related to the central monitoring system (CMS).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Danish Raza's article was&lt;a class="external-link" href="http://www.firstpost.com/tech/indias-central-monitoring-system-security-cant-come-at-cost-of-privacy-944475.html"&gt; published in FirstPost &lt;/a&gt;on July 10, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The surveillance project, described as the Indian version of &lt;a href="http://www.firstpost.com/topic/organization/prism-profile-230137.html" target="_blank" title="PRISM"&gt;PRISM&lt;/a&gt;, will allow the government to monitor online and telephone data of citizens. &lt;a href="http://www.medianama.com/2013/06/223-%3Ca%20href=" rel="nofollow" target="_blank" title="prism"&gt;prism&lt;/a&gt;-milind-deora-cms-central-monitoring-system/” target=”_blank”&amp;gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The minister tried to justify the project arguing that the union  government will become the sole custodian of citizen’s data which is now  accessible to other parties such as telecom operators. But his  justification failed to persuade experts who argue that the data is  hardly safe because it is held by the government.  And the limited  information available about the project has raised serious concerns  about its need and the consequences of government snooping on such a  mass scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A release by the Press Information Bureau, dated November 26, 2009, is  perhaps the only government document related to CMS available in public  domain. It &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679" target="_blank"&gt;merely states&lt;/a&gt; that the project will strengthen the security environment in the  country. “In the existing system secrecy can be easily compromised due  to manual intervention at many stages while in CMS these functions will  be performed on secured electronic link and there will be minimum manual  intervention.  Interception through CMS will be instant as compared to  the existing system which takes a very long time.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the primary concerns raised by experts is the sheer lack of  public information on the project. So far, there is no official word  from the government about which government bodies or agencies will be  able to access the data; how will they use this information; what  percentage of population will be under surveillance; or how long the  data of a citizen will be kept in the record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This makes it impossible for India’s citizens to assess whether  surveillance is the only, or the best, way in which the stated goal can  be achieved. Also, citizens cannot gauge whether these measures are  proportionate i.e. they are the most effective means to achieve this  aim. The possibility of having such a debate is crucial in any  democratic country,” said Dr Anja Kovacs, project director at Internet  Democracy Project, Delhi based NGO working for online freedom of speech  and related issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also no legal recourse for a citizen whose personal details  are being misused or leaked from the central or regional database.  Unlike America’s PRISM project under which surveillance orders are  approved by courts, CMS does not have any judicial oversight. “This  means that the larger ecosystem of checks and balances in which any  surveillance should be embedded in a democratic country is lacking.  There is an urgent requirement for a strong legal protection of the  right to privacy; for judicial oversight of any surveillance; and for  parliamentary or judicial oversight of the agencies which will do  surveillance. At the moment, all three are missing.” said Kovacs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the use of technology by criminals and terrorists, government  surveillance per se, seems inevitable. Almost in every nation, certain  chunk of population is always under the scanner of intelligence  agencies. However, mass-scale tracking the data of all citizens — not  just those who are deemed persons of interest — enabled by the CMS has  sparked a public furor. Sunil Abraham, executive director, Centre for  Internet &amp;amp; Society, Bangalore, compared surveillance with salt in  cooking. “A tiny amount is essential but any excess is  counterproductive,” he said. “Unlike target surveillance, blanket  surveillance increases the probability of false positives. Wrong data  analysis will put more number of innocent civilians under suspicion as,  by default, their number in the central server is more than those are  actually criminals.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such blanket surveillance techniques also pose a threat to online  business. With all the data going in one central pool, a competitor or a  cyber criminal rival can easily tap into private and sensitive  information by hacking into the server. “As vulnerabilities will be  introduced into Internet infrastructure in order to enable surveillance,  it will undermine the security of online transactions,” said Abraham.  He notes that the project also can undermine the confidentiality of  intellectual property especially pre-grant patents and trade secrets.  “Rights-holders will never be sure if their IPR is being stolen by some  government in order to prop up national players.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every time a surveillance system is exposed or its misuse sparks a  debate, governments argue that such programs are required for internal  security purposes and to help abort terror attacks. Obama made the same  argument after PRISM was revealed to the public. Civil rights groups, on  the other hand, argue that security cannot be prioritised by  large-scale invasions of privacy especially in a country like India  where there is little accountability or transparency. So is there a  middle ground that will satisfy both sides?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Yes, security and privacy can coexist,” said Commander (rtd) Mukesh  Saini, former national information security coordinator, government of  India, “We can design a system which takes care of national security  aspect and yet gains the confidence of the citizens. Secrecy period must  not be more than three to four years in such projects. Thereafter who  all were snooped and when and why and under whose  direction/circumstances must be made public through a website after this  time gap.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kovacs agrees and says the right kind of surveillance program would  focus on the needs of the citizen and not the government. “If a  contradiction seems to exist between cyber security and privacy online,  this is only because we have lost sight of who is supposed to benefit  from any security measures. Only if a measure contributes to citizen’s  sense of security, can it really be considered a legitimate security  measure.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/firstpost-danish-raza-july-10-2013-indias-central-monitoring-system-security-cant-come-at-cost-of-privacy'&gt;https://cis-india.org/news/firstpost-danish-raza-july-10-2013-indias-central-monitoring-system-security-cant-come-at-cost-of-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T06:43:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/theregister-uk-phil-muncaster-july-9-2013-indias-centralised-snooping-system-facing-big-delays">
    <title>India's centralised snooping system facing big delays</title>
    <link>https://cis-india.org/news/theregister-uk-phil-muncaster-july-9-2013-indias-centralised-snooping-system-facing-big-delays</link>
    <description>
        &lt;b&gt;Central Monitoring System lacks algorithms, database and data.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Phil Muncaster was &lt;a class="external-link" href="http://www.theregister.co.uk/2013/07/09/india_cms_hit_by_delays/"&gt;published in "The Register, UK" &lt;/a&gt;on July 9, 2013. The Centre for Internet &amp;amp; Society is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After recent revelations about governments snooping on their own  citizens, it's nice to know that not every such effort is going  smoothly, as India’s much criticised NSA-style Centralised Monitoring  System (CMS) is facing big delays after it emerged that the project is  still missing the vital software which will allow analysts to search  comms data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nation's Department of Telecommunications has now told the Center  for Development of Telematics (C-DoT), which is installing the system,  to speed things up, according to official documents seen by the &lt;a href="http://blogs.wsj.com/indiarealtime/2013/07/06/indias-surveillance-program-stalled/" target="_blank"&gt;&lt;i&gt;Wall Street Journal&lt;/i&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;div id="article-mpu-container" style="text-align: justify; "&gt;
&lt;div id="ad-mu1-spot"&gt;
&lt;div id="ad-mu1-spot_ad_container"&gt;&lt;ins&gt;&lt;ins&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;The Rs.4 billion (£47.8m) CMS was originally conceived as a way of  allowing the authorities to lawfully intercept voice calls and texts,  emails, social media and the geographical location of individuals.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;However, the Intelligence Bureau, which will be manning the system, has delayed its introduction for several reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, mobile operators in only seven of the sub-continent’s 22  service areas have been connected to the CMS, leaving holes in its  reach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s also a major issue in that the system currently lacks the  search algorithms needed to identify specific documents, meaning that as  it stands operatives would have to search every email in the CMS to  find the one they’re looking for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The datacentre where intercepted data is to be stored is also  apparently not yet ready, while the country’s Central Bureau of  Investigation has yet to be given access to the system, causing further  delays.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when mass government monitoring of communications networks  is a hot topic around the world thanks to Edward Snowden’s NSA  revelations, rights groups have roundly slammed India’s CMS plans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Human Rights Watch branded the scheme “chilling” in a strongly worded &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights" target="_blank"&gt;response&lt;/a&gt;, while India’s Centre for Internet and Society &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system" target="_blank"&gt;warned&lt;/a&gt; that the country currently doesn’t have privacy laws which could protect individuals from potential abuse of the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="http://stopicms.org/" target="_blank"&gt;Stop ICMS campaign&lt;/a&gt; has also been launched online in an attempt to mobilise opposition to the plans.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/theregister-uk-phil-muncaster-july-9-2013-indias-centralised-snooping-system-facing-big-delays'&gt;https://cis-india.org/news/theregister-uk-phil-muncaster-july-9-2013-indias-centralised-snooping-system-facing-big-delays&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T06:35:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security">
    <title>Is CMS a Compromise of Your Security?</title>
    <link>https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security</link>
    <description>
        &lt;b&gt;By secretly monitoring and recording all Indians through a Central Monitoring System, our government will end up making citizens and businesses less safe.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a class="external-link" href="http://forbesindia.com/article/real-issue/is-cms-a-compromise-of-national-security/35543/1#ixzz2YX7nI92k"&gt;article appeared in the Forbes India magazine&lt;/a&gt; of 12 July, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are you reading this article on your PC or smartphone? No? Do you own a smartphone? Surely a phone then?&lt;br /&gt;&lt;br /&gt;If you also happen to live in Delhi, Haryana or Karnataka, then from  April this year nearly all your electronic communication—telephony,  emails, VOIP, social networking—has been sucked up under an innocuous  sounding programme called the Central Monitoring System, or CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s no way to tell if you are being watched really, because telecom service providers aren’t part of the set-up. In most cases, they may not even be aware which of their users is being monitored. Neither can you approach a government agency or court to find out more, because there’s practically very little oversight or disclosure. What the government does with the data—how it is stored, secured, accessed or deleted—we don’t know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the US and other Western democracies where even for a large scale programme like Prism (leaked recently by 29-year-old whistleblower and now fugitive Edward Snowden), surveillance orders need to be signed by a judge. But in India most orders are signed by either the Central or state home secretary, says Sunil Abraham, executive director for Centre for Internet and Society, Bangalore. This leads to a conflict of interest as the executive branch is both undertaking law enforcement and providing oversight on its own work.&lt;br /&gt;&lt;br /&gt;In most cases, the officials are overwhelmed with other work, and don’t have the time to apply their minds to each request. “There is supposed to be an oversight committee that reviews the decisions of home secretaries, but we don’t have any idea about that committee either,” says Abraham.&lt;br /&gt;&lt;br /&gt;Meanwhile, government bodies like the R&amp;amp;AW, Central Bureau of Investigation, National Investigation Agency, Central Board of Direct Taxes, Narcotics Control Bureau and the Enforcement Directorate will have the right to look up your data. Starting next year, all mobile telephony operators will also need to track and store the geographical location from which subscribers make or receive calls.&lt;br /&gt;&lt;br /&gt;“I see it as the rise of techno-determinism in our security apparatus. Previously, our philosophy was to avoid infringing on individual privacy, and monitor a small set of individuals directly suspected of engaging in illegal activities. Now, thanks to the Utopianism being offered up by ‘Big Data’ infrastructure, putting everybody under blanket surveillance seems like a better way to serve our security and law enforcement agendas more effectively,” says Abraham.&lt;br /&gt;&lt;br /&gt;There is a real risk that CMS and the numerous other monitoring programmes that will subsequently connect to it will end up harming more Indians than protecting them.&lt;br /&gt;&lt;br /&gt;The biggest risk is that these programmes will turn into lucrative ‘honey pots’ for hackers, criminals and rival countries. Why bother hacking individuals and companies if you can attack the CMS? We’ve seen private corporations and government agencies in the US, Israel and the UK getting hacked. So let’s not have any illusions that India is going to fare much better.&lt;br /&gt;&lt;br /&gt;Another consequence is that sooner or later innocent citizens will be wrongly accused of being criminals based on mistaken data patterns. While searching for matches in any database with hundreds of millions of records, the risk of a ‘false positive’ increases disproportionately because there are exponentially more innocents than there are guilty. And in the near-Dystopian construct of the CMS, it will take months or years for such errors to be rectified.&lt;br /&gt;&lt;br /&gt;As more Indians become aware of these programmes, they will adopt encryption and masking tools to hide their digital selves. In the process, numerous ‘unintended consequences’ of failing to differentiate law-abiding citizens from criminals will be created. What answer will a normal citizen offer to a law enforcement official who wants to know why he or she has encrypted all communications and hosted a personal server in, say, Sweden?&lt;br /&gt;&lt;br /&gt;But arguably the biggest threat of 24x7 surveillance is to businesses. Security and trust are the foundations atop which most modern businesses are built. From your purchase of a gadget on an ecommerce site to a large conglomerate’s secret bid in a government auction to discussions within a company on future business strategies to patent applications—everything requires secrecy and security. All an unscrupulous competitor, whether it be a company or a country, has to do to go one-up on you is to attack the CMS and other central databases.&lt;br /&gt;&lt;br /&gt;“The reason why the USA historically decided not to impose blanket surveillance wasn’t because of human rights, but to protect its businesses and intellectual property. Because while we may be able to live in a society without human rights, we cannot be in one without functional markets,” says Abraham.&lt;br /&gt;&lt;br /&gt;He goes on to say that the recent disclosures around the various spying programmes run by the US have made the private surveillance and security industry very happy. “Each incident becomes a case-study to pit one country against another, forcing each one to cherry-pick the worst global practices in a dangerous race to the bottom. Civil society and privacy activists don’t have the resources to fight large vendors and so the only thing that will stop this is the leak of large databases, like that of 9 million Israeli biometric records a few years back.”&lt;br /&gt;&lt;br /&gt;Recollecting the news about a family-business break-up some years ago, where two brothers agreed to split their businesses, the net result was one brother opted out of telephony services offered by the other. All of that is now moot. “There are no more shadows now. Nobody will have refuge and everybody will be exposed,” says Abraham.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security'&gt;https://cis-india.org/news/forbesindia-article-real-issue-july9-2013-rohin-dharmakumar-is-cms-a-compromise-of-your-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T06:27:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state">
    <title>Moving Towards a Surveillance State</title>
    <link>https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state</link>
    <description>
        &lt;b&gt;The cyberspace is a modern construct of communication and today, a large part of human activity takes place in cyberspace. It has become the universal platform where business is executed, discourse is conducted and personal information is exchanged.  However, the underbelly of the internet is also seen to host activities and persons who are motivated by nefarious intent. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Note: The original tender document of the Assam Police dated 28.02.2013  along with other several other tender documents for procurement of  Internet and Voice Monitoring Systems &lt;a href="https://cis-india.org/internet-governance/blog/tenders-eoi-press-release.zip" class="internal-link"&gt;is attached as a zip folder&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As highlighted in the &lt;a href="http://necessaryandproportionate.net/#_edn2"&gt;&lt;i&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;logistical barriers to surveillance have decreased in recent decades and the application of legal principles in new technological contexts has become unclear. It is often feared that in light of the explosion of digital communications content and information about communications, or "communications metadata," coupled with the decreasing costs of storing and mining large sets of data and the provision of personal content through third party service providers make State surveillance possible at an unprecedented scale. Communications surveillance in the modern environment encompasses the monitoring, interception, collection, preservation and retention of, interference with, or access to information that includes, reflects, arises from or is about a person's communications in the past, present or future.&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; These fears are now turning into a reality with the introduction of mass surveillance systems which penetrate into the lives of every person who uses any form of communications. There is ample evidence in the form of tenders for Internet Monitoring Systems (IMS) and Telecom Interception Systems (TCIS) put out by the Central government and various state governments that the Indian state is steadily turning into an extensive surveillance state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While surveillance and intelligence gathering is essential for the maintenance of national security, the creation and working of a mass surveillance system as it is envisioned today may not necessarily be in absolute conformity with the existing law. A mass surveillance system like the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System&lt;/a&gt; (CMS) not only threatens to completely eradicate any vestige of the right to privacy but in the absence of a concrete set of procedural guidelines creates a tremendous risk of abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although information regarding the Central Monitoring System is quite limited on the public forum at the moment it can be gathered that a centralized system for monitoring of all communication was first proposed by the Government of India in 2009 as indicated by the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;press release&lt;/a&gt; of the Ministry of Communications &amp;amp; Information. Implementation of the system started subsequently as indicated by another government &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;press release&lt;/a&gt; and the Center for Development of Telematics (C-DOT) was entrusted with the responsibility of implementing the system. As per the C-DOT &lt;a href="http://www.cdot.in/media/publications.htm"&gt;annual report&lt;/a&gt; 2011-12, research, development, trials and progressive scaling up of a Central Monitoring System were conducted by the organization in the past 4 years and the requisite hardware and CMS solutions which support voice and data interception have been installed and commissioned at various Telecom Service Providers (TSP) in Delhi and Haryana as part of the pilot project. &lt;a href="http://articles.economictimes.indiatimes.com/2013-05-07/news/39091148_1_single-window-pranesh-prakash-internet"&gt;Media reports&lt;/a&gt; indicate that the project will be fully functional by 2014. While an extensive surveillance system is being stealthily introduced by the state, several concerns with regard to its extent of use, functioning, and real world impact have been raised owing to ambiguities and &lt;a href="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy"&gt;wide gaps in procedure and law&lt;/a&gt;. Moreover, the lack of a concrete privacy legislation coupled with the absence of public discourse indicates the lack of interest of the state over the rights of an ordinary citizen. It is under these circumstances that awareness must first be brought regarding &lt;a href="https://www.eff.org/deeplinks/state-surveillance-%26-human-rights"&gt;the risks of the mass surveillance&lt;/a&gt; on civil liberties which in the absence of established procedures protecting the rights of the citizens of the state can result in the abuse of powers by the state or its agencies and lead to the demise of civil freedoms even in democratic states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The architecture and working of a &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;proposed Internet Monitoring System&lt;/a&gt; must be examined in an attempt to better understand the functioning, capabilities and possible impact of a Central Monitoring System on our society and lives. This can perhaps allow more open discourse and a committed effort to preserve the rights of the citizens especially the right to privacy can be made while allowing for the creation of strong procedural guidelines which will help maintain legitimate intelligence gathering and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Monitoring System: Setup and Working&lt;/b&gt;&lt;br /&gt;Very broadly, The Internet Monitoring System enables an agency of the state to intercept and monitor all content which passes through the Internet Service Provider’s (ISP) server which includes all electronic correspondence (emails, chats or IM’s, transcribed call logs), web forms, video and audio files, and other forms of internet content. The electronic data is stored and also subject to various types of analysis. While Internet Monitoring Systems are installed locally and their function is limited to specific geographic region, the Central Monitoring System will consolidate the data acquired from the different voice and data interception systems located across the country and create a centralized architecture for interception, monitoring and analysis of communications. Although the exact specifications and functions of the central monitoring system still remain unclear and ambiguous, some parallels regarding the functioning of the CMS can be drawn from the the specifications revealed in the Assam Police &lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;tender document&lt;/a&gt; for the procurement of an Internet Monitoring System.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Setup&lt;/b&gt;&lt;br /&gt;The deployment architecture of an Internet Monitoring System (IMS) contains probe servers which are installed at the Internet Service Provider’s (ISP) premises and the probes are installed at various tapping points within the entire ISP network.  A collection server is also installed and hosted at the site of the ISP. The collection server is used to either collect, analyze, filter or simple aggregate the data from the ISP servers and the data is transferred to a master aggregation server located a central data center. The central data center may also contain more servers specifically for analysis and storage. This type of architecture is being referred to as a ‘high availability clustered setup’ which is supposed to provide security in case of a failure or outage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Assam Police Internet Monitoring System tender document specifically indicates that the deployment in the state of Assam shall require 8 taps or probes to be installed at different ISPs, out of which 6 taps/probes shall be of 10 GBPS and 2 taps are of 1 GBPS. The document however mentions that the specifications are preliminary and subject to change.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of data&lt;/b&gt;&lt;br /&gt;The proposed internet monitoring system of the Assam state can provide network traffic interception and a variety of internet protocols including Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP) and Session Initiation Protocol (SIP), Voice over Internet Protocol (VoIP) can be intercepted and monitored. The system can also support monitoring of Internet Relay Chat and various other messaging applications (such as Google Talk, Yahoo Chat, MSN Messenger, ICQ, etc.).  The system can be equipped to capture and display multiple file types like text (.doc, .pdf), zipped (.zip) and executable applications (.exe). Further, information regarding login details, login pattern, login location, DNS address, routing address can be acquired along with the IP address and other details of the user.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Web crawling capabilities can be installed on the system which can provide data from various data sources like social networking sites, web based communities, wikis, blogs and other forms of web content. Social media websites (such as Twitter, Facebook, Orkut, MySpace etc.), web pages and data on hosted applications can also be intercepted, monitored and analyzed.  The system also allows capture of additional pages if updated; log periodical updates and other changes. This allows the monitoring agencies the capability of gathering internet traffic based on several parameters like Protocols, Keywords, Filters and Watch lists. Keyword matching is achieved by including phonetically similar words in various languages including local languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More specific functions of the IMS can include complete email extraction which will disclose the address book, inbox, sent mail folder, drafts folder, personal folders, delete folders, custom folders etc. and can also provide identification of dead drop mails. The system can also be equipped to allow country wise tracking of instant messages, chats and mails.&lt;/p&gt;
&lt;p&gt;Regarding retention and storage of data, the tender document specifies that the system shall be technically capable of retaining the metadata of Internet traffic for at least one year and the defined traffic/payload/content is to be retained in the storage server at least for a week.  However, the data may be retained for a longer period if required. The metadata and qualified data after analysis are integrated to a designated main intelligence repository for storage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Types of Analysis&lt;/b&gt;&lt;br /&gt;The Internet Monitoring System apart from intercepting all the data generated through the Internet Service Providers is essentially equipped for various types of data analysis. The solutions that are installed in the internet monitoring system provide the capability for real time as well as historical analysis of network traffic, network perimeter devices and internal sniffers.  The kinds of analysis based on ‘slicing and dicing of data’ range from text mining, sentiment analysis, link analysis, geo-spatial analysis, statistical analysis, social network analysis, transaction analysis, locational analysis and fusion based analysis, CDR analysis, timeline analysis and histogram based analysis from various sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The solutions installed in the IMS can enable monitoring of specific words or phrases (in various languages) in blogs, websites, forums, media reports, social media websites, media reports, chat rooms and messaging applications, collaboration applications and deep web applications. Phone numbers, addresses, names, locations, age, gender and other such information from content including comments and such can also be monitored. Specifically with regard to social media, the user’s profile and information related to it can be extracted and a detailed ontology of all the social media profiles of the user can be created.&lt;br /&gt;&lt;br /&gt;Based on the information, the analysis supposed to provide the capability to identify suspicious behavior based on existing and new patterns as they emerge and are continuously applied to combine incoming and existing information on people, profiles, transactions, social network, type of websites visited, time spent on websites, type of content download or view and any other type of gatherable information. The solutions on the system are also supposed to create single or multiple or parallel scenario build-ups that may occur in blogs, social media forums, chat rooms, specific web hosting server locations or URL, packet route that may be defined from time to time and such scenario build-ups can be based on parameters like sentiments, language or expressions purporting hatred or anti-national expressions, and even emotions like expression of joy, compassion and anger, which as may be defined by the agency depending on operational and intelligence requirement. Based on these parameters, automated alerts can be generated relating to structured or unstructured data (including metadata of contents), events, pattern discovery, phonetically similar words or phrases or actions from users. &lt;br /&gt;&lt;br /&gt;Based on the data analysis, reports or dossiers can be generated and visual analysis allowing a wide variety of views can be created.  Further, real time visualization showing results from real-time data can be generated which allows alerts, alert categories or discoveries to be ranked (high, medium, and low priority, high value asset, low value asset, moderate value asset, verified information, unverified information, primary evidence, secondary evidence, circumstantial evidence, etc.) based on criteria developed by the agency. The IMS solutions can also be capable of offering web-intelligence and open source intelligence and allow capabilities like simultaneous search capabilities which can be automated providing a powerful tool for exploration of the intercepted data.&lt;br /&gt;&lt;br /&gt;Another important requirement mentioned in the tender document is the systems capability to integrate with other interception and monitoring systems for 2G, 3G/UMTS and other evolving mobile carrier technologies including fixed line and Blackberry services and encrypted IP services like Skype services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;It is clear that a system like IMS with its extensive interception and analysis capabilities gives complete access to an agency or authority of all information that is accessed or transmitted by a person on the internet including information which is private and confidential such as email and instant messages. Although the state has the power to issue directions for interception or monitoring of information under the Information Technology Act, 2000 and certain rules are prescribed under section 69B, they are wholly inadequate compared to the scope and extent of the Internet Monitoring System and its scale of operations. The interception and monitoring systems that are either proposed or already in place effectively bypass the existing procedures prescribed under the Information Technology Act. &lt;br /&gt;&lt;br /&gt;The issues, concerns and risks are only compounded when it comes to the Central Monitoring System. The solutions installed in present day interception and monitoring systems give the state unprecedented powers to intercept, monitor and analyze all the data of any person who access the internet. Tools like deep packet inspection and extensive data mining solutions in the absence of concrete safeguards and when deployed through a centralized system can be misused to censor any content including legitimate discourse. Also, the perception that access to a larger amount of data or all data can help improve intelligence can also be sometimes misleading and it must be asked whether the fundamental rights of the citizens of the state can be traded away under the pretext of national security. Furthermore, it is essential for the state to weigh the costs of such a project both economically and morally and balance it with sufficient internal measures as well as adequate laws so that the democratic values are persevered and not endangered by any act of reckless force.&lt;br /&gt;&lt;br /&gt;Reiterating what has been said earlier, while it is important for the state to improve its intelligence gathering tools and mechanisms, it must not be done at the cost of a citizen’s fundamental right. It is the duty of the democratic state to endure and maintain a fine balance between national interest and fundamental rights through timely creation of equitable laws.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. &lt;a class="external-link" href="http://necessaryandproportionate.net/#_edn2"&gt;http://necessaryandproportionate.net/#_edn2&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state'&gt;https://cis-india.org/internet-governance/blog/moving-towards-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>atreya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T05:57:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india">
    <title>RTI on Officials and Agencies Authorized to Intercept Telephone Messages in India</title>
    <link>https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india</link>
    <description>
        &lt;b&gt;In an RTI mailed on April 17, 2013, the Centre for Internet and Society sought comprehensive information on the officials and agencies authorized to intercept telephone messages in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;A portion of the RTI still awaits response, as it was &lt;a href="https://cis-india.org/internet-governance/blog/redirected-to-deity.pdf" class="internal-link"&gt;redirected to the Department of Electronics and Information Technology&lt;/a&gt;. But on May 23, 2013 &lt;/span&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/response-from-ministry-of-home-affairs.pdf" class="internal-link"&gt;Rakesh Mittal of the Ministry of Home Affairs responded in brief and directed us to the 2007 Amendment to the 1885 Indian Telegraph Act&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Referring to rule 419-A of the amendment and the Ministry of Home Affairs website, we find that within central government the power to order communications surveillance is normally reserved for Union Home Secretary, a position held by Shir Anil Goswami as of June 30, 2013 (previously R.K. Singh). The amendment goes on to say,  “In unavoidable circumstances,” however, such an order can be commanded by a Joint Secretary who has been authorized by Union Home Secretary Goswami. On the federal level, the Ministry of Home Affairs includes nearly 20 such Joint Secretaries able to be authorized for making interception commands.&lt;/p&gt;
&lt;p&gt;A listing of the original question requests are given below:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the      officers/agencies authorized by the Central Government to issue an order      for interception under section 5(2) of the Telegraph Act, 1885&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the officers      authorized to issue interception orders under Rule 419A(1) of the      Telegraph Rules, 1951 in unavoidable circumstances when such orders cannot      be issued by the secretary to the Government of India, Ministry of Home      Affairs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing the name, rank and office address of the      officers/agencies designated as “competent authority” in terms of the Rule      419A(1) proviso of the Telegraph Rules, 1951.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list of the agencies authorized by the Central Government to      intercept, monitor, decrypt any information generated, transmitted,      received or stored in any computer resource under section 69(1) of the      Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list of the agencies authorized by the Central Government to      monitor and collect traffic data or information generated, transmitted,      received or stored in any computer resource under section 69-B of the      Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the      officers/agencies authorized to issue interception orders under Rule 3,      first proviso, of the Information Technology (Procedure and Safeguards for      Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please provide a list of the agencies authorised to intercept, monitor, decrypt any information generated, transmitted, received or stored in any computer resource under Rule 4 of the Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption of Information) Rules, 2009.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india'&gt;https://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T05:23:54Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril">
    <title>India:Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril</link>
    <description>
        &lt;b&gt;The danger of mass surveillance in India is for real. The absence of a regulating law is damning for Indians who want to protect their privacy against the juggernaut of state and private surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://www.frontline.in/cover-story/india-privacy-in-peril/article4849211.ece"&gt;published in the Frontline&lt;/a&gt; on July 12, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At the concluding scene of his latest movie, Superman disdainfully flings a  surveillance drone down to earth in front of a horrified general. “You  can’t control me,” he tells his military minder. “You can’t find out  where I hang up my cape.” This exchange goes to the crux of  surveillance: control. Surveillance is the means by which nation-states  exercise control over people. If the logical basis of the nation-state  is the establishment and maintenance of homogeneity, it is necessary to  detect and interdict dissent before it threatens the boundedness and  continuity of the national imagination. This imagination often cannot  encompass diversity, so it constructs categories of others that include  dissenters and outsiders. Admittedly, this happens less in India because  the foundation of the Indian nation-state imagined a diverse society  expressing a plurality of ideas in a variety of languages secured by a  syncretic and democratic government that protected individual freedoms.  Unfortunately, this vision is still to be realised, and the foundational  idea of India continues to be challenged by poor governance, poverty,  insurgencies and rebellion. Consequently, surveillance is, for the  modern nation-state, a &lt;i&gt;condicio sine qua non&lt;/i&gt;—an essential element  without which it will eventually cease to exist. The challenge for  democratic nation-states is to find the optimal balance between  surveillance and the duty to protect the freedoms of its citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;History of wiretaps&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some countries, such as the United States, have assembled a vast  apparatus of surveillance to monitor the activities of their citizens  and foreigners. Let us review the recent controversy revealed by the  whistle-blower Edward Snowden. In 1967, the U.S. Supreme Court ruled in &lt;i&gt;Katz vs United States&lt;/i&gt; that wiretaps had to be warranted, judicially sanctioned and supported  by probable cause. This resulted in the passage of the Wiretap Act of  1968 that regulated domestic surveillance. Following revelations that  Washington was engaging in unrestricted foreign surveillance in the  context of the Vietnam war and anti-war protests, the U.S. Congress  enacted the Foreign Intelligence Surveillance Act (FISA) in 1978. FISA  gave the U.S. government the power to conduct, without judicial  sanction, surveillance for foreign intelligence information; and, with  judicial sanction from a secret FISA court, surveillance of anybody if  the ultimate target was a foreign power. Paradoxically, even a U.S.  citizen could be a foreign power in certain circumstances. Domestically,  FISA enabled secret warrants for specific items of information such as  library book borrowers and car rentals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the 9/11 World Trade Centre attacks, Congress enacted the Patriot Act of 2001, Section 215 of which dramatically expanded the scope of FISA to allow secret warrants to conduct surveillance in respect of “any tangible thing” that was relevant to a national security investigation. In exercise of this power, a secret FISA court issued secret warrants ordering a number of U.S. companies to share, in real time, voice and data traffic with the National Security Agency (NSA). We may never know the full scope of the NSA’s surveillance, but we know this: (a) Verizon Communications, a telecommunications major, was ordered to provide metadata for all telephone calls within and without the U.S.; (b) the NSA runs a clandestine programme called PRISM that accesses Internet traffic, such as e-mails, web searches, forum comments and blogs, in real time; and (c) the NSA manages a comprehensive data analysis system called Boundless Informant that intercepts and analyses voice and data traffic around the world and subjects them to automated pattern recognition. The documents leaked by Snowden allege that Google, Facebook, Apple, Dropbox, Microsoft and Yahoo! participate in PRISM, but these companies have denied their involvement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India fifth-most monitored&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;How does this affect India? The Snowden documents reveal that India is the NSA’s fifth-most monitored country after Iran, Pakistan, Jordan and Egypt. Interestingly, China is monitored less than India. Several billion pieces of data from India, such as e-mails and telephone metadata, were intercepted and monitored by the NSA. For Indians, it is not inconceivable that our e-mails, should they be sent using Gmail, Yahoo! Mail or Hotmail, or our documents, should we be subscribing to Dropbox, or our Facebook posts, are being accessed and read by the NSA. Incredibly, most Indian governmental communication, including that of Ministers and senior civil servants, use private U.S. e-mail services. We no longer enjoy privacy online. The question of suspicious activity, irrespective of the rubric under which suspicion is measured, is moot. Any use of U.S. service providers is potentially compromised since U.S. law permits intrusive dragnet surveillance against foreigners. This clearly reveals a dichotomy in U.S. constitutional law: the Fourth Amendment’s guarantees of privacy, repeatedly upheld by U.S. courts, protect U.S. citizens to a far greater extent than they do foreigners. It is natural for a nation-state to privilege the rights of its citizens over others. As Indians, therefore, we must clearly look out for ourselves.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and personal liberty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the Kharak Singh (1964) and Gobind (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around homes of suspects. In the latter case, the court found that some of the Fundamental Rights “could be described as contributing to the right to privacy”, which was subject to a compelling public interest. This insipid inference held the field until 1994 when, in the Rajagopal (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, Rajagopal dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the People’s Union for Civil Liberties (PUCL) case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made by the Delhi High Court in the Naz Foundation case (2011) that decriminalised consensual homosexual acts; however, there is an appeal against the judgment in the Supreme Court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legislative silence&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Judicial vagueness has been compounded by legislative silence. India does not have a law to operationalise a right to privacy. Consequently, a multitude of laws permit daily infractions of privacy. These infractions have survived because they are diverse, dissipated and quite disorganised. However, the technocratic impulse to centralise and consolidate surveillance and data collection has, in recent years, alarmed many citizens. The state hopes to, through enterprises such as the Central Monitoring System (CMS), the Crime and Criminals Tracking Network and System (CCTNS), the National Intelligence Grid (NATGRID), the Telephone Call Interception System (TCIS) and the Unique Identification Number (UID), replicate the U.S. successes in surveillance and monitoring and profiling all its citizens. However, unlike the U.S., India proposes to achieve this without an enabling law. Let us consider the CMS. No documents have been made available that indicate the scope and size of the CMS.&lt;br /&gt;&lt;br /&gt;From a variety of police tenders for private equipment, it appears that the Central government hopes to put in place a system that will intercept, in real time, all voice and data traffic originating or terminating in India or being carried by Indian service providers. This data will be subject to pattern recognition and other automated tests to detect emotional markers, such as hate, compassion or intent. The sheer scale of this enterprise is intimidating; all communications in India’s many languages will be subject to interception and testing designed to detect different forms of dissent. This mammoth exercise in monitoring is taking place—it is understood that some components of the CMS are already operational—without statutory sanction. No credible authorities exist to supervise this exercise, no avenues for redress have been identified and no consequences have been laid down for abuse.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Statutory Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a recent interview, Milind Deora, Minister of State for Communications and Information Technology, dismissed public scepticism of the CMS saying that direct state access to private communications was better for privacy since it reduced dependence on the interception abilities of private service providers. This circular argument is both disingenuous and incorrect. No doubt, trusting private persons with the power to intercept and store the private data of citizens is flawed. The leaking of the Niira Radia tapes, which contain the private communications of Niira Radia taped on the orders of the Income Tax Department, testifies to this flaw. However, bypassing private players to enable direct state access to private communications will preclude leaks and, thereby, remove from public knowledge the fact of surveillance. This messy situation may be obviated by a regime of statutory regulation of warranted surveillance by an independent and impartial authority. This system is favoured by liberal democracies around the world but conspicuously resisted by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of privacy legislation was recently considered by a committee chaired by Justice Ajit Prakash Shah, a former judge of the Delhi High Court who sat on the Bench that delivered the Naz Foundation judgment. The Shah Committee was constituted by the Planning Commission for a different reason: the need to protect personal data that are outsourced to India for processing. The lack of credible privacy law, it is foreseen, will result in European and other foreign personal data being sent to other attractive processing destinations, such as Vietnam, Israel or the Philippines, resulting in the decline of India’s outsourcing industry. However, the Shah Committee also noted the absence of law sufficient to protect against surveillance abuses. Most importantly, the Shah Committee formulated nine national privacy principles to inform any future privacy legislation (see story on page 26). In 2011, the Department of Personnel and Training (DoPT) of the Ministry of Human Resource Development, the same Ministry entrusted with implementing the Right to Information Act, 2005, leaked a draft privacy Bill, marked ‘Secret’, on the Internet. The DoPT Bill received substantive criticism from the Attorney General and some government Secretaries for the clumsy drafting. A new version of the DoPT Bill is reported to have been drafted and sent to the Ministry of Law for consideration. This revised Bill, which presumably contains chapters to regulate surveillance, including the interception of communications, has not been made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for privacy legislation cannot be overstated. The Snowden affair reveals the extent of possible state surveillance of private communications. For Indians who must now explore ways to protect their privacy against the juggernaut of state and private surveillance, the absence of regulatory law is damning. Permitting, through public inaction, unwarranted and non-targetted dragnet surveillance by the Indian state without reasonable cause would be an act of surrender of far-reaching implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information, they say, is power. Allowing governments to exercise this power over us without thought for the rule of law constitutes the ultimate submission possible in a democratic nation-state. And, since superheroes are escapist fantasies, without the prospect of good laws we will all be subordinate to a new national imagination of control and monitoring, surveillance and profiling. If allowed to come to pass, this will be a betrayal of the foundational idea of India as a free and democratic republic tolerant of dissent.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;i&gt;Bhairav Acharya is a constitutional lawyer practising in the Supreme Court of India. He advises the Centre for Internet &amp;amp; Society, Bangalore, on privacy law and other constitutional issues&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T09:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance">
    <title>The Difficult Balance of Transparent Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance</link>
    <description>
        &lt;b&gt;Is it too much to ask for transparency in data surveillance? On occasion, companies like Microsoft, Facebook, and the other silicon valley giants would say no. When customers join these services, each company provides their own privacy statement which assures customers of the safety and transparency that accompanies their personal data.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Google even publishes annual “Transparency Reports” which detail the data movement behind the scenes. Governments, too, are somewhat open about surveillance methods, for example with the public knowledge of the existence and role of institutions like America’s NSA and India’s CMS. These façades of assurance, however, never satisfy the public enough to protect them from feeling cheated and deceived when information leaks about surveillance practices. And in the face of controversy around surveillance, both service providers and governments scramble to provide explanations for discrepancies between their promises and their practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So it seems that transparency might not be too much to ask, but instead is perhaps more complicated of a request than imagined. For some citizens, nothing would be more satisfying than complete transparency on all data collection. For those who recognize surveillance as crucial for national security, however, complete transparency would mean undermining the very efficacy of surveillance practices. And data companies often find themselves caught between these two ends, simultaneously seeking profits by catering to the public, while also trying to abide by political and legal frameworks. Therefore, in the process of modern data surveillance, each attempt at resolution of the transparency issue will become a delicate balance between three actors: the government, the big data companies, and the people. As rightly stated on the Digital Due Process website, rules for surveillance must carefully consider “the individual’s constitutional right to privacy, the government’s need for tools to conduct investigations, and the interest of service providers in clarity and customer trust.”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So we must unpack the idea of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, there should be a distinction made between proactive transparency and reactive transparency, or, the announcement of surveillance practices versus the later access to surveillance records. The former is more risky and therefore more difficult to entertain, while the latter may lack any real substance beyond satisfying inquiries. Also consider the discrepancy in motivation for transparency between the actors. For the citizen, is transparency really an end goal, or is it only a stepping stone in the argument for eradication of surveillance practices in the name of rights to privacy? Here, we ascertain the true value of total transparency; will it ever please citizens to learn of a government’s most recent undermining of the private sphere?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reactive transparency has been achieved only in recent years in India, during a number of well publicized legal cases. In one of the earliest cases of reactive transparency, Reliance Communications made an affidavit in the Supreme Court over the exact number of surveillance directives given by the government. It was released that 151,000 Reliance accounts were monitored for a project between 2006 and 2010, with 3,588 tapped phones just from the Delhi region alone in 2005.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But also there has been controversy over the extent of reactive transparency, because it has been especially problematic to discern the point where transparency once again encroaches on privacy, both for government and the people’s sake. After gathering the data, its release could further jeopardize the citizens and the government. It is important to carefully consider the productive extent of reactive transparency: What will become of the information? Will one publicly reveal how many people were spied on? Who was spied on? What was found when through spying? Citizens must take all of this into consideration when requesting transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, service providers embrace transparency when it can benefit their corporation, or as a recent Facebook statement explained, “we’ve been in discussions with U.S. national security authorities urging them to allow more transparency, &lt;i&gt;so that our users around the world can understand how infrequently we are asked to provide user data on national security grounds&lt;/i&gt;.” &lt;a href="#fna" name="fra"&gt;[a]&lt;/a&gt; Many of the service providers mentioned in the recently leaked PRISM report have made well-publicized requests to the U.S. government for more transparency.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not only have they allegedly written requests to the government to allow them to disclose information, but the companies (including Facebook &lt;a href="#fna" name="fra"&gt;[a]&lt;/a&gt;, Apple &lt;a href="#fnb" name="frb"&gt;[b]&lt;/a&gt;, Microsoft&lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt;, and Google &lt;a href="#fnd" name="frd"&gt;[d]&lt;/a&gt;) have all released explanatory statements in the wake of the June 2013 PRISM scandal. Although service providers claim that the request to release data about their cooperation is in the ‘interest of transparency,’ it instead seems that the motivation for this transparency is to ease consumers’ concerns and help the companies save face. The companies (and the government) will admit their participation in surveillance once it has become impossible to deny their association with the programs. This shrewd aspect of transparency can be seen most clearly in statements like those from Microsoft, who included in their statement on June 14&lt;sup&gt;th&lt;/sup&gt;, “We have not received any national security orders &lt;i&gt;of the type that Verizon was reported to have received&lt;/i&gt;.” &lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt; Spontaneous allusions like this are meant to contrast guilt-conscious service providers favorably to telecom service providers such as AT&amp;amp;T and Verizon, who allegedly yielded the most communications data and who as of now have yet to release defensive public statements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, we find ourselves in a situation where entities admit to their collusion in snooping only once information has leaked, indignation has ignited, and scandal has erupted. A half-hearted proactive transparency leads to an outrage demanding reactive semi-transparency. These weak forms of transparency neither satisfy the public, nor allow governments and service providers to maintain dignity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But now is also a crucial moment for possible reevaluation and reformation of this system, especially in India. Not only is India enacting its own national security surveillance system, the CMS&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; but the recent NSA and PRISM revelations are still sending shockwaves throughout the world of cyber security and surveillance. Last week, a Public Interest Litigation (PIL) was sent to the Indian Supreme Court, arguing that nine foreign service providers (Facebook, Hotmail, Yahoo!, Google, Apple, Skype, Paltalk, AOL, YouTube) violated the trust and privacy of their Indian customers through their collusion with the US government’s surveillance programs.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among other things, the PIL emphatically sought prosecution of the mentioned corporations, demands for the service providers to establish servers in India, and also sought stricter rules to prevent Indian officials from using these foreign services for work involving national security. Ultimately, the PIL was rejected by the Supreme Court; although the PIL stated the grounds of Rule 6 of the Information Technology Rules 2011 for the guidelines in protecting sensitive Indian citizen information, the SC saw the PIL as addressing problems outside of SC jurisdiction, and was quoted as saying “we cannot entertain the &lt;a href="https://cis-india.org/internet-governance/blog/pil.pdf" class="internal-link"&gt;petition&lt;/a&gt; as an Indian agency is not involved.”&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The SC considered the PIL only partially, however, as certain significant parts of the petition were indeed within Indian domestic agency, for example the urge to prohibit federal officials from using the private email services such as Gmail, Hotmail, and Yahoo. And although the SC is not the correct place to push for new safeguard legislation, the ideas of the PIL are not invalid, as Indian leaders have long searched for ways of ensuring basic Indian privacy laws in the context of international service providers. This is also not a problem distinctive to India. International service providers have entered into agreements regarding the same problems of incorporating international customers’ rights, formal agreements which India could emulate if it wanted to demand greater privacy or transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, there is the Safe Harbor Framework, an institution in place to protect and mediate European Union citizens’ privacy rights within the servers of foreign (i.e. American) Internet companies. These regulations were established in 2000, and serve the purpose of adjusting foreign companies’ standards to incorporate E.U. privacy laws. In accordance with the agreement, E.U. data is only allowed to be sent to outside providers who maintain the seven Safe Harbor principles, several of which focus on transparency of data usage.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;India could enact a system similar to this, and it would likely alleviate some of the concerns raised in the most recent PIL. These frameworks, however, have not proven completely reliable safeguards either, especially when the service providers’ own government uses national security as a means to override the agreement. Although the U.S. government has yet to fully confirm or deny many of the NSA and PRISM allegations in regards to Europe, there is currently strong room to believe that the surveillance practices may have violated the Safe Harbor agreements by delivering sensitive E.U. citizen data to the U.S. government.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; It is uncertain how these revelations will impact the agreements made between the big Silicon-Valley companies and their E.U. customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent PIL also strongly suggested establishing domestic data servers to keep Indian citizens’ information within the country and under the direct supervision of Indian entities. It strongly pushes for self-reliance as the best way to ensure both citizen and national security. The PIL assumes that domestic servers will not only offer better information protection, but also create much needed jobs and raise national tax revenue.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; If allegations about PRISM and the E.U. prove true, then the E.U. may also decide to support establishment of European servers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several of the ideas outlined in the PIL have merit, but may not be as productive as the requesters assume. It is true that establishing servers and domestic regulators in India may temporarily protect from unwanted foreign, i.e. American, surveillance. But at the same time, this also increases likelihood of India’s own central government taking a stronger surveillance stance, more stringently monitoring their own servers and databases. It has not yet been described how the CMS will be operate its surveillance methods, but moving data to domestic servers may just result in shifting power from NSA to CMS. Rather than more privacy or transparency, the situation could easily become a matter of &lt;i&gt;who&lt;/i&gt; citizens prefer spying over them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if one government establishes rules which enforce transparency, this may clash with the laws of the service providers’ domestic government, i.e. confidentiality in surveillance. Considering all of this, rejection of foreign service providers and promotion of domestic self reliance may ultimately prove the most effective alternative for nations which are growing rapidly in both internet presence and internet consciousness. But that does not make this option the easiest. Facing the revelations and disillusionment of domestic (CMS) and international (PRISM) surveillance methods, countries like India are reaching an impeding critical juncture. Now is the most important time to establish new norms, while public sentiment is at its highest and transition is most possible, not only creating new laws which can safeguard privacy, but also strongly considering alternatives to foreign service providers like those outlined in June’s PIL. Privacy International’s guiding principles of communications surveillance also offer useful advice, urging for the establishment of oversight institutions which can access surveillance records and periodically publish aggregate data on surveillance methods.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Although the balance between security on the national level and security on the personal level will continue to be problematic for nations in the upcoming years, and even though service providers’ positions on surveillance usually seem contrived, Microsoft Vice President John Frank made a statement which deserves appreciation, rightly saying, “Transparency alone may not be enough to restore public confidence, but it’s a great place to start.”&lt;a href="#fnc" name="frc"&gt;[c]&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a href="http://digitaldueprocess.org/"&gt;http://digitaldueprocess.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/151Ue1H"&gt;http://bit.ly/151Ue1H&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/12XDb1Z"&gt;http://bit.ly/12XDb1Z&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://ti.me/11Xh08V"&gt;http://ti.me/11Xh08V&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a href="https://cis-india.org/internet-governance/blog/pil.pdf" class="internal-link"&gt;Copy of 2013 PIL to Supreme Court, Prof. S.N. Singh&lt;/a&gt; [attached]&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/1aXWdbU"&gt;http://bit.ly/1aXWdbU&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a class="external-link" href="http://1.usa.gov/qafcXe"&gt;http://1.usa.gov/qafcXe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/114hcCX"&gt;http://bit.ly/114hcCX&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/156wspI"&gt;http://bit.ly/156wspI&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fra" name="fna"&gt;a&lt;/a&gt;]. &lt;b&gt;Facebook Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/ZQDcn6"&gt;http://bit.ly/ZQDcn6&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frb" name="fnb"&gt;b&lt;/a&gt;]. &lt;b&gt;Apple Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/1akaBuN"&gt;http://bit.ly/1akaBuN&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frc" name="fnc"&gt;c&lt;/a&gt;]. &lt;b&gt;Microsoft Statement&lt;/b&gt;:&lt;a class="external-link" href="http://bit.ly/1bFIt31"&gt;http://bit.ly/1bFIt31&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#frd" name="fnd"&gt;d&lt;/a&gt;]. &lt;b&gt;Google Statement&lt;/b&gt;: &lt;a class="external-link" href="http://bit.ly/16QlaqB"&gt;http://bit.ly/16QlaqB&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T04:23:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography">
    <title>dna exclusive: Geeks have a solution to digital surveillance in India: Cryptography</title>
    <link>https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography</link>
    <description>
        &lt;b&gt;While you were thinking of what next to post on Twitter, the government has stealthily put an ambitious surveillance programme in place that tracks your every move in the digital world — through voice calls, SMS and MMS, GPRS, fax communications on landlines, video calls and emails.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Joanna Lobo was &lt;a class="external-link" href="http://www.dnaindia.com/scitech/1857945/report-dna-exclusive-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography"&gt;published in DNA&lt;/a&gt; on July 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The programme, conceived in 2011, has now been brought under one umbrella referred to as the centralised monitoring system (CMS). It is the death of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as concerned citizens argue for the need to formulate policies and laws to protect privacy, there's a simpler solution in sight for now: a CryptoParty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At this 'party', an informal gathering of people, non-geeks can learn how to legally encrypt their digital communications and how to store data without the fear of anyone snooping in. Encryption is a process of encoding messages so that it can only be read by authorised parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is it?&lt;/b&gt;&lt;br /&gt; "A CryptoParty educates people in the domain of cryptography. It's  usually about the basics: how to send encrypted email, how to protect  your hardware and how to use free and open source software," says  Satyakam Goswami, a free software consultant associated with the  Software Freedom Law Centre (SFLC), Delhi (remove this). Goswami was one  of the 72 participants at the CryptoParty organised on Saturday at  Institute of Informatics &amp;amp; Communication (IIC), Delhi University  South Campus  	On June 30, a CryptoParty organised at the Centre for Internet and  Society (CIS) in Bangalore had 30 people in attendance. "We were taught  about the what, how and who is watching us. We were also taught how to  encrypt emails, chat, video calls or instant messaging,” says Siddhart  Prakash Rao, a computer science graduate and a free software and open  source enthusiast who is about to pursue a Masters in Cryptography.&lt;br /&gt; &lt;br /&gt; The topics may be a mouthful for non-geeks but CryptoParty advocates  maintain that all this is taught in the simplest way possible. The  choice of subject depends on the composition of the group — if it is a  gathering of geeks, like at the Bangalore event, then the topics are  more technical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How can it help?&lt;/b&gt;&lt;br /&gt; CryptoParties started in August 2012 by an Australian woman (who goes  by the pseudonym Asher Wolf) after a conversation on Twitter about The  Australian Parliament's new cybercrime bill that allowed law enforcement  to ask Internet Service Providers to monitor and store data. &lt;br /&gt; Attending a CryptoParty is a good way to learn how to overcome government snooping legally.&lt;br /&gt; &lt;br /&gt; “Citizens should use encryption to safeguard their private  communications against both corporations and the government. Encryption  is one of the best ways to react to CMS along with increased civic  vigilance and democratic questioning of our government and  parliamentarians,” says Pranesh Prakash, policy director, CIS, and one  of the frontrunners in the fight to formulate a policy to safeguard  privacy in India.&lt;br /&gt; &lt;br /&gt; "In India, people tend to be rather ignorant. They are not aware of the  kind of surveillance they are subjected to once online. It's a lack of  understanding," says Sumandro Chattapadhyay, a researcher with Sarai, a  programme of the Centre for the Study of Developing Societies, Delhi.&lt;br /&gt; &lt;br /&gt; Bernadette Langle, who also works at CIS has been instrumental in  organising the handful of CryptoParties in the country. When dna spoke  to her, she was on her way to Delhi after participating in the Bangalore  event. Langle will also be part of a CryptoParty being planned for  October in Mumbai. "Ten years ago, you had to be a geek to be able to  encrypt and protect yourself online. Now, you need software and it's  much easier," she says.&lt;br /&gt; &lt;br /&gt; The advantage is that the privacy tactics taught at such parties is  completely legal. All knowledge is in the public domain. “A government  will only deny its citizens basic communications privacy if it is  authoritarian,” says Pranesh. “So while it can try social engineering  and other means to gain access to what you've encrypted, it simply  cannot 'decode' it as long as you have chosen a strong pass phrase and  keep that protected, or they create quantum computers capable of  breaking your encryption.”&lt;br /&gt; &lt;br /&gt; The CIS is currently working on revisions of the Privacy (Protection)  Bill 2013 with the objective of contributing to privacy legislation in  India. Till that bill becomes an Act and till there's a better way to  overcome needless government surveillance, attending a CryptoParty could  possibly be the wisest solution for those concerned about privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(For more details on CryptoParties, visit www.cryptoparty.in)&lt;br /&gt; &lt;br /&gt; &lt;b&gt;How to encrypt:&lt;/b&gt;&lt;br /&gt; SMS: Make content secure by using software like TextSecure (Android) or  CryptoSMS (Symbian). However, SMS metadata (who you are sending the  message to and at what time) can still be tracked.&lt;br /&gt; &lt;br /&gt; Instead of Whatsapp, install Jabbir and add off the record encryption.&lt;br /&gt; &lt;br /&gt; For email, you can use OpenPGP in conjunction with Thunderbird to  encrypt mails you send from Gmail/Yahoo Mail/Live Mail accounts so that  even Google, Yahoo and Microsoft can't read them&lt;br /&gt; &lt;br /&gt; For web browsing, use a VPN (which will hide your traffic from your  ISP), or Tor (which will help anonymise your traffic, but will slow down  your connection slower).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography'&gt;https://cis-india.org/news/report-dna-july-7-2013-joanna-lobo-geeks-have-a-solution-to-digital-surveillance-in-india-cryptography&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T06:24:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis">
    <title>Biometrics or bust? India's Identity Crisis</title>
    <link>https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis</link>
    <description>
        &lt;b&gt;Malavika Jayaram is speaking at an event organized by the Oxford Internet Institute on July 2, 2013. The talk will be held at Oxford Internet Institute, University of Oxford, 1 St Giles Oxford OX1 3JS.&lt;/b&gt;
        &lt;hr /&gt;
&lt;div class="story" style="text-align: justify; "&gt;
&lt;p&gt;This info was &lt;a class="external-link" href="http://www.oii.ox.ac.uk/events/?id=602"&gt;published on the Oxford Internet Institute website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;India's mammoth biometric ID project, which has  registered around 270 million people and is yet to be fully realized, is  already the worldís largest such endeavor. It is marketed as a  potential game-changer both domestically (where it is touted as a silver  bullet to solve most problems) and internationally (where countries  wait and watch this experiment before importing it into their own  jurisdictions). Alongside all the hype about the scale of the scheme,  its potential for transforming the delivery of services and the scope  for private participation in traditionally state-controlled functions,  there are fears of function creep, of subversion to create new types of  fraud and corruption, of increased profiling and targeting, and of a  citizenry becoming transparent to its government in an unprecedented  way, all in the name of ambiguous benefits and the rhetoric of  inclusion.&lt;/p&gt;
&lt;p&gt;The government praises the ease and efficiency of  centralized databases, the promise of technology (including the myth of  biometrics uniquely and unambiguously identifying people in a foolproof  way) and the construction of the identified self. However, there is  growing awareness of the dangers of joined-up databases resulting in  exclusion rather than inclusion, and persecution rather than  democratization.&lt;/p&gt;
&lt;p&gt;The scheme is technically voluntary, but with the  provision of benefits, goods and services being increasingly linked to  the scheme, it will soon become impossible to function in India without a  biometric ID. If every facet of everyday life is linked to this single  number, it renders all claims of voluntariness meaningless. The lack of  information self-determination in a biometrically mediated universe has  important ramifications for anonymity, free speech and the maintenance  of an essential private sphere.&lt;/p&gt;
&lt;p&gt;In this talk, Malavika will  provide an overview of the scheme as well as the debate around privacy  and autonomy that it has triggered, framed against the backdrop of a  larger civil liberties crisis. She will also describe Indiaís efforts to  craft new privacy and data protection legislation.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis'&gt;https://cis-india.org/news/biometrics-or-bust-indias-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:49:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop">
    <title>Concerns over central snoop</title>
    <link>https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop</link>
    <description>
        &lt;b&gt;Eyebrows have been raised at the Centre’s single-window system to intercept phone calls and internet exchanges — the desi version of the US’s surveillance programme, PRISM — that is expected to roll out this year-end.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Concerns-over-central-snoop/Article1-1083658.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on June 28, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;span class="WebRupee"&gt; Rs. &lt;/span&gt;400-crore project — tentatively  called the Central Monitoring System (CMS) — will not only allow the  government to listen to a target’s phone conversation but also track  down a caller’s precise location, match his voice against known  suspects’ before the call is completed and see what people have been up  to on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then, it can also use analytics to discover possible links — between  suspected terrorists, criminals or just about anybody — from the  internet and phone data. All this will be done from one place without  keeping the internet or phone service provider in the loop — something  the telecom and home ministries insist will enhance citizens’ privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both ministries also insist that the CMS won’t change the rules of the  game. “The process to seek authorisation for interception will not be  diluted,” a home ministry official promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So is everything hunky dory?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hardly. But technology — in this case, the CMS — is a smaller part of the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger chunk is the process of approving “lawful interception” orders and the lack of transparency around it.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;It was in December 1996 that the Supreme Court held that the State could  spy on its citizens in extraordinary circumstances but, as an interim  measure, made it mandatory for the home secretary to approve each and  every such request.&lt;/p&gt;
&lt;p&gt;Telecom minister Kapil Sibal, who appeared in this case in the  mid-1990s, convinced the court that it didn’t have the powers to order  that a judge decide each phone-tapping case. Instead, Sibal suggested  that this power remain with the executive on lines of the law in the UK.&lt;/p&gt;
&lt;p&gt;A former home secretary, however, conceded that they hardly have the time to apply their mind before signing a wiretap order.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Interest.png/@@images/9beb69be-db6c-45d6-9f70-4888deef3295.png" alt="Interest of State" class="image-inline" title="Interest of State" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;That isn’t surprising. The home secretary approves around 7,500-9,000  interception orders every month. That means he or she has to sign an  average of 300 orders every day without a break.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If he were to spend just 30 seconds on each case, he would have to  keep aside four-and-a-half hours just approving interception orders  every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official said the ministry was considering a suggestion to pick up  a fixed number of cases at random for closer scrutiny before approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many believe this might not be enough. It is argued that the  government — which was trying to replicate surveillance technology from  the west — needs to adopt their safeguards and transparency norms too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Bangalore-based Centre for  Internet and Society, said he didn’t have a problem with CMS as long as  it didn’t go for blanket surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But there is no reason why the executive — and not a judge — should  have the powers to decide on phone-tapping requests,” he said. Or for  that matter, why shouldn’t there be an independent audit of  phone-tapping decisions, their implementation and outcome?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The aggregated data should be put in the public domain,” Abraham  said. The US has such provisions. So does Britain, which inspired Sibal  to argue for retaining interception powers with the executive in the  mid-1990s. It is time to follow-up on that model.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop'&gt;https://cis-india.org/news/hindustan-times-aloke-tikku-june-28-2013-concerns-over-central-snoop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T09:33:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/privacy-policy">
    <title>Privacy Policy</title>
    <link>https://cis-india.org/about/policies/privacy-policy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;This Privacy Policy ("Policy") states the internal policy of the Centre for Internet &amp;amp; Society ("CIS") with regard to the collection, storage, security, processing and disclosure of personal data.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This Policy constitutes compliance with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on 11 April 2011.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Collection of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will not collect any personal data that is not necessary for the achievement of a purpose that is connected to a stated CIS function.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS will not collect any personal data without obtaining the prior consent of the person to whom it pertains. CIS may obtain such consent in any manner, and through any medium, but will not employ threats, duress or coercion to obtain such consent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Personal data collected in respect of a grant of consent by the person to whom it pertains will, if that consent is subsequently withdrawn for any reason, be destroyed or anonymised.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Storage of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will not store any personal data for a period longer than is necessary to achieve the purpose for which it was collected, or, if that purpose is achieved or ceases to exist for any reason, for any period following such achievement or cessation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any personal data collected in relation to the achievement of a purpose will, if that purpose is achieved or ceases to exist for any reason, be destroyed or anonymised.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS may store personal data for a period longer than is necessary to achieve the purpose for which it was collected, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation, if – &lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;the person to whom it pertains grants consent to such storage;&lt;/li&gt;
&lt;li&gt;it is required to be stored under the provisions of applicable law; or&lt;/li&gt;
&lt;li&gt;it is the subject of a pending legal proceeding.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Processing of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not process any personal data that is not necessary for the achievement of the purpose for which it was collected unless the person to whom it pertains grants consent to such processing.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Security of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not collect, store or process any personal data in the absence of measures, including, but not restricted to, technological, physical and administrative measures, adequate to secure the confidentiality, secrecy, sanctity and safety of the personal data, including from theft, loss, damage or destruction.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;Any person who collects, stores or processes any personal data on behalf of CIS will be subject to a duty of confidentiality and secrecy in respect of it.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will, if the confidentiality, secrecy, sanctity or safety of any personal data collected, stored or processed by CIS is violated by theft, loss, damage or destruction, or as a result of any disclosure contrary to the provisions of this Policy, notify, to the extent possible, the person to whom the personal data pertains.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Disclosure of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS will not disclose to any person to whom any personal data does not pertain, or otherwise cause any such a person to receive, the content or nature of that personal data, including any other details in respect thereof, unless the person to whom it pertains grants consent to such disclosure. CIS may obtain such consent in any manner, and through any medium, but will not employ threats, duress or coercion to obtain such consent.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;CIS may disclose personal data with a person to whom it does not pertain, whether located in India or otherwise, for the purpose only of processing it to achieve the purpose for which it was collected, if such a disclosure is pursuant to an agreement that binds the person receiving it to same or stronger measures in respect of its storage, processing and disclosure as are contained in this Policy.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;If the disclosure of any personal data is necessary to –&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;prevent a reasonable threat to national security, defence or public order; or&lt;/li&gt;
&lt;li&gt;prevent, investigate or prosecute a cognisable offence;&lt;/li&gt;
&lt;/ul&gt;
CIS may, upon receiving an order in writing from a judicial authority or law enforcement officer, disclose the personal data that is the subject of the order without seeking the consent of the person to whom it pertains.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS may, to the extent possible, notify the person to whom any personal data pertains of its disclosure and the identity of the person it was disclosed to, and any other details in respect thereof.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Accuracy of Personal Data&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;CIS will reasonably afford any person whose personal data is collected, stored or processed by CIS the opportunity to review it and, where necessary, rectify anything that is inaccurate or not up to date.&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/privacy-policy'&gt;https://cis-india.org/about/policies/privacy-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-01T06:25:37Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/policies/ethical-research-guidelines">
    <title>Ethical Research Guidelines</title>
    <link>https://cis-india.org/about/policies/ethical-research-guidelines</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society will endeavour to protect the physical, social and psychological well-being of those who participate in their research. The guidelines below state the necessary steps to follow while doing research.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The ethical research guideline requires CIS staff and consultants to consider and take the following steps while engaging in research.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Providing notice to the individual of the: Aims, methods, his/her right to abstain from participation in the research and his/her right to terminate at any time his/her participation; the confidential nature of his/her replies and any limits on such confidentiality.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Providing informants and other participants the right to remain anonymous.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Taking informed consent from the individual that he/she agrees to participate. If children are involved in the research, informed consent will be taken from the parents. Informed consent will entail communicating :&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Purpose(s) of the study, and the anticipated consequences of the research;&lt;/li&gt;
&lt;li&gt;Identity of funders and sponsors&lt;/li&gt;
&lt;li&gt;Anticipated uses of the data&lt;/li&gt;
&lt;li&gt;The degree of anonymity and confidentiality which may be afforded to informants and subjects.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ensuring that when audio/visual-recorders and photographic records are being used, participants that are being recorded will be made aware of the use of the devices, and have the option to request that they not be used.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Ensuring that the identity and identifying information of the participant (if not already in the public domain) is destroyed at the end of project, unless the individual has consented to otherwise.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;At public events organized by CIS, it will be announced and publicly posted that the event is being recorded. Individuals will be given the choice object to being recorded or their name and organization shared in conference reports, blogs, articles etc. If the individual does not object, it will be considered that they have given their consent.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Centre for Internet and Society strictly follows a policy of &lt;strong&gt;No Plagiarism&lt;/strong&gt;.&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/policies/ethical-research-guidelines'&gt;https://cis-india.org/about/policies/ethical-research-guidelines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-13T12:21:48Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback">
    <title>Privacy Protection Bill, 2013 (With Amendments based on Public Feedback)</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback</link>
    <description>
        &lt;b&gt;In 2013 CIS drafted the Privacy Protection Bill as a citizens' version of a privacy legislation for India. Since April 2013, CIS has been holding Privacy Roundtables in collaboration with FICCI and DSCI, with the objective of gaining public feedback to the Privacy Protection Bill and other possible frameworks for privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;As a part of this  process, CIS has been amending the Privacy Protection Bill based on  public feedback. Below is the text of the Bill as amended according to  feedback gained from the New Delhi, Bangalore, and Chennai Roundtables.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-amendments.pdf" class="internal-link"&gt;Click to download the Privacy Protection Bill, 2013 with latest amendments&lt;/a&gt;&lt;/b&gt; (PDF, 196 Kb).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T10:50:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar">
    <title>In India, Prism-like Surveillance Slips Under the Radar</title>
    <link>https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar</link>
    <description>
        &lt;b&gt;Prism, the contentious U.S. data-collection surveillance program, has captured the world’s attention ever since whistle-blower Edward Snowden leaked details of global spying to the Guardian and Washington Post.

&lt;/b&gt;
        &lt;p&gt;The article by Anjan Trivedi was &lt;a class="external-link" href="http://world.time.com/2013/06/30/in-india-prism-like-surveillance-slips-under-the-radar/#ixzz2XoCbrn00"&gt;published in Time World &lt;/a&gt;on June 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However, it turns out &lt;a href="http://topics.time.com/india/"&gt;India&lt;/a&gt;,  the world’s largest democracy, is building its own version to monitor  internal communications in the name of national security. Yet India’s  Central Monitoring System, or CMS, was not shrouded in secrecy — New  Delhi &lt;a href="http://www.dot.gov.in/sites/default/files/AR%20Englsih%2011-12_0.pdf"&gt;announced&lt;/a&gt; its intentions to watch over its citizens, however mutedly, in &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=70747"&gt;2011&lt;/a&gt;, and rollout is slated for August. And while reports that the American system collected 6.3 billion &lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;intelligence reports&lt;/a&gt; in India led to a &lt;a href="http://m.indianexpress.com/news/supreme-court-agrees-to-hear-pil-on-us-surveillance-of-internet-data/1131011/"&gt;lawsuit&lt;/a&gt; at the nation’s &lt;a href="http://topics.time.com/supreme-court/"&gt;Supreme Court&lt;/a&gt;, comparable indignation has been conspicuously lacking with the domestic equivalent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CMS is an ambitious surveillance system that monitors text messages,  social-media engagement and phone calls on landlines and cell phones,  among other communications. That means 900 million landline and  cell-phone users and 125 million Internet users. The project, which is  being implemented by the government’s &lt;a href="http://www.cdot.in/about_us/berif_history.htm"&gt;Centre for Development of Telematics&lt;/a&gt; (&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=78145"&gt;C-DOT&lt;/a&gt;),  is meant to help national law-enforcement agencies save time and avoid  manual intervention, according to the Department of Telecommunications’ &lt;a href="http://www.dot.gov.in/sites/default/files/Telecom%20Annual%20Report-2012-13%20%28English%29%20_For%20web%20%281%29.pdf"&gt;annual report&lt;/a&gt;.  This has been in the works since 2008, when C-DOT started working on a  proof-of-concept, according to an older report. The government &lt;a href="http://planningcommission.nic.in/aboutus/committee/wrkgrp12/cit/wgrep_telecom.pdf"&gt;set aside&lt;/a&gt; approximately $150 million for the system as part of its 12th five-year  plan, although the Cabinet ultimately approved a higher amount.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the internal-security ministry though, the surveillance system  remains a relatively “hush-hush” topic, a project official unauthorized  to speak to the press tells TIME. In April 2011, the Police  Modernisation Division of the Home Affairs Ministry put out a 90-page  tender to solicit bidders for communication-interception systems in  every state and union territory of India. The system requirements  included “live listening, recording, storage, playback, analysis,  postprocessing” and voice recognition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil-liberties groups concede that states often need to undertake  targeted-monitoring operations. However, the move toward extensive  “surveillance capabilities enabled by digital communications,” suggests  that governments are now “casting the net wide, enabling intrusions into  private lives,” according to Meenakshi Ganguly, South Asia director for  Human Rights Watch. This extensive communications surveillance through  the likes of Prism and CMS are “out of the realm of judicial  authorization and allow unregulated, secret surveillance, eliminating  any transparency or accountability on the part of the state,” a recent  U.N. &lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf"&gt;report&lt;/a&gt; stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is no stranger to censorship and monitoring — tweets, blogs,  books or songs are frequently blocked and banned. India ranked second  only to the U.S. on Google’s list of user-data requests with 4,750  queries, up &lt;a href="http://www.google.com/transparencyreport/userdatarequests/IN/"&gt;52% from two years back&lt;/a&gt;, and removal requests from the government &lt;a href="http://www.google.com/transparencyreport/removals/government/IN/?metric=items&amp;amp;p=2012-12"&gt;increased by 90%&lt;/a&gt; over the previous reporting period. While these were largely made  through police or court orders, the new system will not require such a  legal process. In recent times, India’s democratically elected  government has barred access to certain websites and Twitter handles,  restricted the number of outgoing text messages to five per person per  day and arrested citizens for liking Facebook posts and tweeting.  Historically too, censorship has been India’s preferred means of  policing social unrest. “Freedom of expression, while broadly available  in theory,” Ganguly tells TIME, “is endangered by abuse of various India  laws.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a growing discrepancy and power imbalance between citizens  and the state, says Anja Kovacs of the Internet Democracy Project. And,  in an environment like India where “no checks and balances [are] in  place,” that is troubling. The potential for misuse and  misunderstanding, Kovacs believes, is increasing enormously. Currently,  India’s laws relevant to interception “disempower citizens by relying  heavily on the executive to safeguard individuals’ constitutional  rights,” a recent &lt;a href="http://www.indianexpress.com/news/way-to-watch/1133737/0"&gt;editorial&lt;/a&gt; noted. The power imbalance is often noticeable at public protests, as  in the case of the New Delhi gang-rape incident in December, when the  government shut down public transport near protest grounds and  unlawfully detained demonstrators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With an already sizeable and growing population of Internet users,  the government’s worries too are on the rise. Netizens in India are set  to triple to 330 million by 2016, &lt;a href="http://startupcatalyst.in/wp-content/uploads/2013/05/From_Buzz_to_Bucks_Apr_2013_tcm80-132875.pdf"&gt;according to a recent report&lt;/a&gt;.  “As [governments] around the world grapple with the power of social  media that can enable spontaneous street protests, there appears to be  increasing surveillance,” Ganguly explains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s junior minister for telecommunications attempted to explain the benefits of this system during a &lt;a href="http://www.youtube.com/watch?v=rwTsek5WUfE"&gt;recent Google+ Hangout&lt;/a&gt; session. He acknowledged that CMS is something that “most people may  not be aware of” because it’s “slightly technical.” A participant noted  that the idea of such an intrusive system was worrying and he did not  feel safe. The minister, though, insisted that it would “safeguard your  privacy” and national security. Given the high-tech nature of CMS, he  noted that telecom companies would no longer be part of the government’s  surveillance process. India currently does &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;not&lt;/a&gt; have formal privacy legislation to prohibit arbitrary monitoring. The new system comes under the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=71791"&gt;jurisdiction&lt;/a&gt; of the Indian Telegraph Act of 1885, which allows for monitoring communication in the “interest of public safety.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance system is not only an “abuse of privacy rights and  security-agency overreach,” critics say, but also counterproductive in  terms of security. In the process of collecting data to monitor criminal  activity, the data itself may become a target for terrorists and  criminals — a “honeypot,” according to Sunil Abraham, executive director  of India’s Centre for Internet and Society. Additionally, the  wide-ranging tapping undermines financial markets, Abraham says, by  compromising confidentiality, trade secrets and intellectual property.  What’s more, vulnerabilities will have to be built into the existing  cyberinfrastructure to make way for such a system. Whether the nation’s  patchy infrastructure will be able to handle a complex web of  surveillance and networks, no one can say. That, Abraham contends, is  what attackers will target.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;National security has widely been cited as the reason for this  system, but no one can say whether it will actually help avert terrorist  activity. India’s own 9/11 is a case in point: the Indian government  was handed intelligence by foreign agencies about the possibility of the  2008 Mumbai terrorist attacks, but did not act. This is a “clear  indication that having access to massive amounts of data is not  necessarily going to make people safer,” Kovacs tells TIME. However,  officers familiar with the new system say it will not increase  surveillance or enhance intrusion beyond current levels; it will only  strengthen the policy framework of privacy and increase &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=80829"&gt;operational efficiency&lt;/a&gt;.  Spokespersons and officials in the internal-security and telecom  departments did not respond to requests or declined to comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been cagey about details on implementation and &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=70791"&gt;extent&lt;/a&gt;.  This ability to act however the authorities deems fit “just makes it  really easy to slide into authoritarianism, and that is not acceptable  for any democratic country,” Kovacs says. Indeed, India has seen that  before — almost four decades ago, Indira Gandhi declared a state of  emergency for 19 months, which suspended all civil liberties. Indians  complaining about Prism may want to look a little closer to home.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar'&gt;https://cis-india.org/news/time-world-anjan-trivedi-june-30-2013-in-india-prison-like-surveillance-slips-under-the-radar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-03T09:31:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
