<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-october-13-2013-karthik-subramanian-the-quest-for-genuine-clout-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-legal-validity-of-bans-on-internet-part-i"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a">
    <title>Thousands go online against 66A</title>
    <link>https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a</link>
    <description>
        &lt;b&gt;An online petition aimed at amending section 66A of the Information Technology (IT) Act and re-examining internet laws has garnered 3,000 signatures since it began on Tuesday — two days before Kapil Sibal, telecom and IT minister, chairs a meeting with the cyber regulation advisory committee.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Apoorva Dutt was &lt;a class="external-link" href="http://www.dnaindia.com/mumbai/report_thousands-go-online-against-66a_1771070"&gt;published in DNA on November 29, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;An online petition aimed at amending section 66A of the Information Technology (IT) Act and re-examining internet laws has garnered 3,000 signatures since it began on Tuesday — two days before Kapil Sibal, telecom and IT minister, chairs a meeting with the cyber regulation advisory committee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petition, anchored on Change.org, a platform for social initiatives, was started by Bangalore-based advocate Gautam John after two girls were arrested for their Facebook post on imposing a bandh in the city on the day Shiv Sena chief Bal Thackeray was cremated. Following their arrests, Shaheen Dhada has deleted her Facebook account while her friend Rini Srinivasan who merely liked the post has opened a new account on the social networking site. However, she has vowed to refrain from making political statements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;John is blunt about the legislative effect an online petition can have. l Turn to p8.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Honestly, I don’t believe that a petition can change laws, but it gives concerned citizens a platform for documenting their concern in such troubling scenarios. To some extent, this sort of petition can represent a civil society’s point of view. No more can a government authority say ‘only NGOs care about an issue’. Now they know – thousands of ordinary people care,” John said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at the Centre For Internet and Society in Bangalore, points out the flaws in section 66A that have been exploited in cases like the Palghar incident. “Section 66A is very broadly-worded and the punishment (three years imprisonment) is excessive,” he said. “The law was borrowed – that too badly – from a British law. There are many a things greatly flawed in this unconstitutional provision, from the disproportionality of the punishment to the non-existence of the crime. The 2008 amendment to the IT Act was one of eight laws passed in 15 minutes without any debate in the winter session of Parliament.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petition also aims to organise a meeting of the civil society stakeholders to look into these concerns. A similar meeting was scheduled to be held in August, but it did not take place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sudarshan Balachandran of Change.org is the lead campaigner and organiser of the petition. He hopes to hand over a copy of the petition to Sibal during the meeting on Thursday. “Sibal has gone on record to say that they will examine the law, and if they feel it doesn’t work, it will be junked. So I am hopeful,” said Balachandran.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a'&gt;https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-30T06:40:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india">
    <title>The year social media came of age in India</title>
    <link>https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india</link>
    <description>
        &lt;b&gt;Sambhavi Saxena, 19, was at Jantar Mantar on December 25 protesting against Nirbhaya's brutal rape when Delhi Police swooped down, rounded her up along with other agitators and took them to the Parliament Street police station. Sambhavi fired tweet after tweet even as she was bundled into a van.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer and Rukmini Shrinivasan was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/social-media/The-year-social-media-came-of-age-in-India/articleshow/17824856.cms"&gt;published in the Times of India&lt;/a&gt; on December 31, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;She went on broadcasting to the world all that was happening around her. "Illegally being held here at Parliament St Police Station Delhi w/ 15 other women. Terrified, pls RT," she tweeted. It worked. In a flash, more than 1,700 people retweeted her SOS. &lt;a href="http://timesofindia.indiatimes.com/topic/Social-media"&gt;Social media&lt;/a&gt; analytics firm Favstar later said the message reached over two lakh people.&lt;br /&gt; &lt;br /&gt; Police later contested many of Sambhavi's claims. Yet, there was no denying it was her voice that was heard. Her tweets triggered a social media frenzy. The media reacted swiftly. Lawyers volunteered, activists landed up at the police station. Celebrities condemned the action. The police stood no chance.&lt;br /&gt; &lt;br /&gt; For the government and keepers of law, it was a PR disaster. They had lost a battle they were accustomed to winning hands down. Now, there was a pesky entity — the public — seeking to change the rules of the game. A teenager armed with a smartphone had used the magic platform called social media to devastating effect, catching the agents of the state flatfooted.&lt;br /&gt; &lt;br /&gt; India might have tasted the power of the smartphone first in 2011 when Anna Hazare's stinging anti-corruption message rode the social media wave. But this year saw social media creating a new phenomenon — the rise of the virtually connected Indian youth — which is likely to redraw the terms of engagement between the state and its urban population.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;The networking tool that's now a weapon&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; Finance minister P Chidambaram recently tried to sum up the phenomenon by likening social media-driven snap protests to a flash-mob phenomenon. "Flash mob is a new phenomenon... sometimes they gather to dance and sing. But sometimes they gather to protest... I don't think we are fully prepared to deal with it." Going by the last fortnight, when the government fumbled in dealing with widespread protests over Nirbhaya, the minister's admission was an understatement. Let alone being "fully prepared", they didn't have a clue.&lt;br /&gt; &lt;br /&gt; The unbridling of the power of the social media was undoubtedly a top, if not no. 1, trend of 2012 in India. In many cases, it set the agenda of public discourse. As in Palghar, where young Shaheen Dhada's Facebook comment on the shutdown of Mumbai after Bal Thackeray's death kicked off a storm, the virtual world triggered several real-world controversies.&lt;br /&gt; &lt;br /&gt; In fits and starts, politicians and the government realized the folly of not joining the fast-unfolding revolution, the exceptions being the Twitter-savvy Shashi Tharoor and Omar Abdullah. The @PMOIndia &lt;a href="http://timesofindia.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; handle was born, and today 3.5 lakh people follow it. A host of politicians soon hopped on, realizing the freedom the platform offered for comment on issues, which TV studios didn't.&lt;br /&gt; &lt;br /&gt; For Bollywood celebs and cricketers, it became a great way to keep in touch with fans. But the real power of this irreverent and often insolent medium lay with the young aam admi who used social media fearlessly. They voiced their opinion and unsparingly ridiculed leaders with hashtags like #theekhai, making powerful headlines out of what otherwise would have been just whistling in the air.&lt;br /&gt; &lt;br /&gt; What's the USP of the social media? On this platform, free speech is unhindered. It's a virtual megaphone with a global reach, as the numbers show. Whether it's Twitter or Facebook, India is a huge presence. Facebook has more than 65 million active users here, putting the country among the top five worldwide in terms of users. Twitter, which has 200 million active users globally, doesn't provide country-specific numbers. But SemioCast, a Paris-based research firm, said in a report in July that India had around 18 million Twitter accounts, placing it sixth among the biggest Twitter nations.&lt;br /&gt; &lt;br /&gt; A lot of this social media boom happened in 2012. Research firm SocialBakers estimated in November that the number of Indian Facebook users swelled by 14 million in the past six months. While internet penetration in India is just 11% — three times lower than the global average — around 137million users make the country third biggest in terms of web-connected citizens. Most of these users are urban and young. A Comscore report says 75% of web users here are under-35.&lt;br /&gt; &lt;br /&gt; Unlike youngsters in many other countries, Indians are politically active on the web. A Pew Research study this December established that nearly 45% of Indian web users, most of them from urban areas, connect on social media to discuss politics. Only Arab countries scored higher than India on this account. The numbers are backed by GlobalWebIndex, which noted in a September report that India is the third most socially active country with around 78 points.&lt;br /&gt; &lt;br /&gt; But this unfettered, unfiltered flow of information and messages showed its ugly side as well. The mischievous rumour-mongering in the wake of the Assam riots was a case in point, as MMSs and incendiary text messages triggered an exodus of people belonging to the northeast from Bangalore, Pune, Chennai and Hyderabad.&lt;br /&gt; &lt;br /&gt; Facebook and Twitter started off as friendship and networking tools. But, they have evolved into potent weapons of social mobilization. In a way, India Against Corruption can be credited with starting it in mid-2010. "If you have a worthy cause, social media provides you an unbiased, unfiltered avenue," says Shivendra Chauhan, social media manager for the outfit. "Without it, we wouldn't have got the kind of overwhelming support we received from the youth."&lt;br /&gt; &lt;br /&gt; But Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, cautions against being overly technologically deterministic. "Technology doesn't have agency; human beings do. Transferring energy from social media on to the streets isn't something that'll happen every time. It depends on whether the message resonates," he says.&lt;br /&gt; &lt;br /&gt; While the anti-corruption movement ran on a sophisticated social media strategy and campaign, the ongoing anti-rape protests have no single organizer or banner, just a message that resonates, says Abraham. On the other hand, when Anonymous India called for boots on the ground at its protests against internet censorship, the turnout was poor, far lower than the number of hashtags on Twitter would have indicated, he adds.&lt;br /&gt; &lt;br /&gt; Abraham points out there are close linkages between internet, text messages, social media and mainstream media. "These channels leak into each other and the causal connection becomes unclear," he says. Madhuresh Kumar, national coordinator of the National Alliance of People's Movements (NAPM), an umbrella organization of grassroots movements of the marginalized, agrees. "We use social media, not so much to mobilize people to come to our protests, but to mobilize the mainstream media."&lt;br /&gt; &lt;br /&gt; The message determines the power of the medium. If it's something that connects viscerally, like the Nirbhaya protests, its power and reach can be beyond imagination. If it is a more niche message, like an SOS for a dwindling fish species, it will reach a smaller, targeted audience such as environmentalists. But it will reach — unhindered in the palm of your hand.&lt;br /&gt; &lt;br /&gt; Look at it any which way, it is here to stay. So, it's time for the state to learn to deal with the new power of the ordinary citizen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india'&gt;https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T03:33:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls">
    <title>The trouble with trolls</title>
    <link>https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls</link>
    <description>
        &lt;b&gt;Social networking sites give trolls the ability to hide their real identity and cause grief to others. Here is what you need to do if you face an online attack.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vishal Mathur was &lt;a class="external-link" href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html"&gt;published in Livemint&lt;/a&gt; on July 22, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social networking sites give trolls the ability       to hide their real identity and cause grief to others. Here is       what you need to do if you face an online attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though       social networks were not designed with the intention of letting       someone anonymously abuse another online, the reality is that       people utilize the ability to hide behind online identities to       threaten other users. These could be veiled attacks, direct abuse,       or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide.       Avoid conversation if you can       The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse.       Report to the social network       You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform.       “Most social networks have systems that allow you to report       abusive content and users. However, there is great variance in the       speed with which they respond across different platforms,       jurisdictions, etc.,” says Sunil Abraham, executive director at       the Bangalore-based non-profit research organization Centre for       Internet and Society. New Delhi-based Anja Kovacs, project       director, at civil society organization Internet Democracy       Project, adds: “Blocking and reporting an account can be two ways       to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.”       Ankhi Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some.       Raheel Khursheed, head of news, politics and government at Twitter       India, did not respond to our mail about how Twitter handles       trolls at the time of going to press.       On blogs and forums, it may be a bit easier to deal with trolling       and abuse. If it is your own blog, you can delete comments and       block users. If it is a forum, the administrator can do it for       you. But, with social networks having millions of users, it is not       possible to have one administrator managing it all. And it is not       just Facebook and Twitter, all social networks have a method by       which you can register your complaint. LinkedIn, for example,       automatically blocks a user who gets multiple “I don’t know”       responses to invitations to connect. There is a strong monitoring       policy where any reported content (recommendations or direct       messages) is examined and immediate warnings are sent out to       offending parties.       Keep a copy of the offensive posts       Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst.       Don’t ignore privacy settings       Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.”       Get help from the law       In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs.       The police may look for hints of threat to cause bodily harm or       worse still, to life. In such cases, they may recommend the case       to the Cyber Crime Cell of the Central Bureau of Investigation.       “Generally, while the substantive offences do exist under law, the       process for having them enforced is deficient. These are deeper       structural problems of delay, investigation and conviction which       are prevalent across criminal justice or civil litigation,”       clarifies Gupta. Officials at the Cyber Crime Cell say they take       up cases after reference from the local police, who file the       report first and do a preliminary level of investigation.       But it is important to realize that only the police and the       law-enforcement agencies have the right to demand further details       about the perpetrator from the social networks, starting with       profile       details and Internet Protocol (IP) addresses, which will help       track the person down. Das clarifies: “Facebook has a       point-of-contact system through which the law-enforcement agencies       tell us what the actual case is, depending on severity. The police       may ask us to take down particular content, or even ask for user       information like IP info, to prevent real crime.”       According to Facebook’s Government Requests Report for       July-December 2013, the network restricted access to 4,765 pieces       of content after requests from the Indian government and       law-enforcement agencies.&lt;/p&gt;
&lt;div style="text-align: left; "&gt;Read more at: &lt;a href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=ref_article"&gt;http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=copy&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Though social networks were not designed with       the intention of letting someone anonymously abuse another online,       the reality is that people utilize the ability to hide behind       online identities to threaten other users. These could be veiled       attacks, direct abuse, or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Avoid conversation if you can &lt;/b&gt;&lt;br /&gt; The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Report to the social network &lt;/b&gt;&lt;br /&gt; You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform. “Most social networks have systems that       allow you to report abusive content and users. However, there is       great variance in the speed with which they respond across       different platforms, jurisdictions, etc.,” says Sunil Abraham,       executive director at the Bangalore-based non-profit research       organization Centre for Internet and Society. New Delhi-based Anja       Kovacs, project director, at civil society organization Internet       Democracy Project, adds: “Blocking and reporting an account can be       two ways to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.” Ankhi       Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some. Raheel Khursheed, head of       news, politics and government at Twitter India, did not respond to       our mail about how Twitter handles trolls at the time of going to       press. On blogs and forums, it may be a bit easier to deal with       trolling and abuse. If it is your own blog, you can delete       comments and block users. If it is a forum, the administrator can       do it for you. But, with social networks having millions of users,       it is not possible to have one administrator managing it all. And       it is not just Facebook and Twitter, all social networks have a       method by which you can register your complaint. LinkedIn, for       example, automatically blocks a user who gets multiple “I don’t       know” responses to invitations to connect. There is a strong       monitoring policy where any reported content (recommendations or       direct messages) is examined and immediate warnings are sent out       to offending parties. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Keep a copy of the offensive posts &lt;/b&gt;&lt;br /&gt; Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Don’t ignore privacy settings &lt;/b&gt;&lt;br /&gt; Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.” &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Get help from the law &lt;/b&gt;&lt;br /&gt; In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs. The police may       look for hints of threat to cause bodily harm or worse still, to       life. In such cases, they may recommend the case to the Cyber       Crime Cell of the Central Bureau of Investigation. “Generally,       while the substantive offences do exist under law, the process for       having them enforced is deficient. These are deeper structural       problems of delay, investigation and conviction which are       prevalent across criminal justice or civil litigation,” clarifies       Gupta. Officials at the Cyber Crime Cell say they take up cases       after reference from the local police, who file the report first       and do a preliminary level of investigation. But it is important       to realize that only the police and the law-enforcement agencies       have the right to demand further details about the perpetrator       from the social networks, starting with profile details and       Internet Protocol (IP) addresses, which will help track the person       down. Das clarifies: “Facebook has a point-of-contact system       through which the law-enforcement agencies tell us what the actual       case is, depending on severity. The police may ask us to take down       particular content, or even ask for user information like IP info,       to prevent real crime.” According to Facebook’s Government       Requests Report for July-December 2013, the network restricted       access to 4,765 pieces of content after requests from the Indian       government and law-enforcement agencies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls'&gt;https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T05:42:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-october-13-2013-karthik-subramanian-the-quest-for-genuine-clout-on-the-internet">
    <title>The quest for genuine clout on the internet</title>
    <link>https://cis-india.org/news/the-hindu-october-13-2013-karthik-subramanian-the-quest-for-genuine-clout-on-the-internet</link>
    <description>
        &lt;b&gt;There is a lot of interest and speculation on the impact of social media on politics because of its amplification effects. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Karthik Subramanian was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/the-quest-for-genuine-clout-on-the-internet/article5229516.ece"&gt;published in the Hindu&lt;/a&gt; on October 13, 2013. T. Vishnu Vardhan is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;There is no denying that it has overtaken the traditional media in  certain facets of news - most notably when it comes to breaking news and  that it provides grounds for expressing one's ideas unbounded.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But the marketing and the advertising world are only just coming to  grips with the medium. (Twitter is set to launch its IPO soon and  Facebook is going to increasingly face the need to monetize its  services. The Web has a history of complaints where users have found it  tough to different between user-generated content and 'promoted'  content.)&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In effect, the question of the “influence” that social media and its  star patrons wield is still being assessed, especially in the loaded  context of whether its proactive use would translate to votes in the  upcoming Lok Sabha elections. Not only are the number of active social  media users negligible in the Indian context, there are doubts on  whether a 'cause and effect' scenario is possible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There are two predominant points of view, while talking about the  influence of social media campaigns on politics: One that closely reads  the Facebook ‘likes’ and Twitter trends as an important measure of  public pulse; and the other which dismisses any sort of influence that  social media has on real and grass root level politics.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;T. Vishnu Vardhan, a researcher at Bangalore-based Centre for Internet  and Society, prefers the middle ground. “It is important to not ignore  the growing popularity of social media in India with [telecom] service  providers providing Facebook access at Rs. 1 for an entire day. However,  I would refrain from seeing a direct correlation between a person's  participation on social media to real-time events in society including  politics.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Propaganda fallacy&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;“In India and especially in Tamil Nadu it has been proved that the  Propaganda Model is a fallacy. There is no simple formula, whether it be  cinema of 1970s or the Social Media of the 2010s. There are too many  factors and layers that influence real-time events.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Companies around the world are trying to make sense of this 'Big Data'  that people's digital lives are generating. And whilst individuals and  even some clever campaigns make snap pronouncements based on superficial  data and analysis, there are a few companies that are looking at it  through the prism of complex algorithms and technology-enabled web  crawling.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One such company Kochi-based startup Riafy Technologies is attempting to  make sense of the digital noise in a broad sweeping sense looking at  three domains: relational intelligence, predictive analysis and big  data.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One of the their applications 'Movie Tarot' predicts the outcome of  Friday releases at the movie box office, based on the digital traffic on  the days preceding the release. Not every instance of praise or every  denouncement is treated equally. Instead, they have an intelligent  algorithm that they apply to predict the box office collections and the  ultimate verdict. (They claim to have a fairly accurate track record  thus far.)&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The company's CEO John Mathew says there is a correlation between a  person's online presence and behaviour in the real world. “This  influence is significant in age groups of 18-34,” he says. “As for Lok  Sabha elections, the 'social media influenced' voter turnout would be  marginal when we look at the country as a whole, but this number would  be substantial in the 'swing constituencies'.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-october-13-2013-karthik-subramanian-the-quest-for-genuine-clout-on-the-internet'&gt;https://cis-india.org/news/the-hindu-october-13-2013-karthik-subramanian-the-quest-for-genuine-clout-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-10-29T07:08:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook">
    <title>The politics of Facebook</title>
    <link>https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook</link>
    <description>
        &lt;b&gt;With the social media becoming an important political battleground, is Facebook affecting friendships and trying to influence our political leanings? &lt;/b&gt;
        &lt;div class="p" id="U200345218720FvG" style="text-align: justify; "&gt;The article by Shweta Tiwari was &lt;a class="external-link" href="http://www.livemint.com/Leisure/vmYyeUOmMYJUqHoaYKMgnJ/The-politics-of-Facebook.html"&gt;published in Livemint&lt;/a&gt; on April 1, 2014. Dr. Nishant Shah is quoted.
&lt;hr /&gt;
&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;When  social activist Uthara Narayanan, 32, posted an innocuous article link  on the Gujarat riots on Facebook in January, she was in for a surprise.  An old friend from college fiercely defended Gujarat chief minister and  Bharatiya Janata Party (BJP) prime ministerial candidate &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt;&lt;/span&gt;,  getting abrasive and personal in the post. “I had known her for more  than 14 years and yet hadn’t seen this side to her,” says Narayanan. “I  didn’t realize when she had gone off and gotten such strong views on the  debate.”&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;From then on Narayanan decided to stay away from her friend though  they live in the same city. “It left a bad taste in my mouth and marred  our friendship for me, though I am still Facebook friends with her.”  Almost as if agreeing with her, Facebook’s wall automatically started  keeping her friend’s posts away from her wall—thanks to the EdgeRank  algorithm.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;h3 class="p" style="text-align: justify; "&gt;Like-like stick together&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;EdgeRank, the Facebook algorithm that decides which posts to show in your newsfeed, bases its decision on three factors: an affinity score between the user and the one who’s created the post, the type of post (comment, like, create or tag), and time lapsed since it was created. The first basically means that you will see posts from friends you have interacted with and like to interact with on the social network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January, Catherine Grevet, a PhD student at the Georgia Institute of Technology in the US, studied this algorithm in the light of politics and concluded that people tend to get attracted to circles of friends who affirm to their own political leanings, all because of Facebook’s algorithms. “People are mainly friends with those who share similar values and interests,” Grevet wrote in the study. “As a result, they aren’t exposed to opposing viewpoints.” Grevet presented the study at the 17th ACM Conference on Computer-Supported Cooperative Work and Social Computing in the US in February.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alok Sharma, a Mumbai-based creative writer who used to be a political cartoonist, says social media has led to Indians opening up. “We are taught to be a little politically correct, especially in face-to-face conversations. But when it comes to social networking sites, Indians express their views like fanatics,” he says. He blocked a couple of Facebook friends after a spate of personal comments on one of his posts. “My friends know me and get the crux of what I might be trying to say in a thread but there are others who are on my Friends list but don’t understand the context and take it all wrong.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The misunderstanding arises because many of us post on the network as we would speak among friends and not as we would say things in public. “Facebook is not a community, a clique or a group of friends,” says Nishant Shah, director of research at Bangalore-based non-profit The Centre for Internet and Society. “It is just a network,” he says. That means that not all people on your Facebook list are friends—you are just connected to them on the network. You might have a professional relationship with them, be teammates or acquaintances or colleagues, but you don’t know them personally. Given that the average Facebook user has 229 Facebook friends—according to the numbers from US think tank Pew Research Center’s Internet Project which tracks statistics about the social network—that’s just too many people to even know personally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The audience on the social network is much larger than the friend list, including Facebook itself, which, if it finds your comment problematic, will censor even before a complaint is produced,” says Shah. A post on Facebook or a comment or a like, can get you in trouble not just with other individuals or communities who take offence but even the law, as happened to a girl in 2012 who put up a post criticizing the shutdown of Mumbai after the death of Shiv Sena patriarch Bal Thackeray.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Though used like it, Facebook is not a conversation,” says Shah, “Because everything you write is archived and recorded. And can be used against you if need be.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A medium to shout in&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But would you shout at a stranger on the street as you do on Facebook? Basav Biradar, a programme manager based in Bangalore, actively posts on politics and comments on Facebook. He feels most people on Facebook give strong opinions that are not well-informed. “A lot of these opinions are dependent on propaganda and campaigns rather than facts. Why don’t people do some homework before forming an opinion?” With over 100 million Indians active on the social network, however, an uninformed opinion is hardly reason to stop anyone from posting, commenting, liking, offending and getting offended through posts on Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah calls this phenomenon cyber-bullying in politics. “Specific vocal and passionate groups and communities have emerged who silence any voice of dissent or critique by trolling the dissident,” says Shah. “They do not need anonymity. They don’t try to hide who they are. They feel so empowered by the backing of the politicos who are either hiring or supporting them, that they have risen in hordes and are stifling the space for dissent and questioning even more effectively than they have been able to do in real life.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s almost like standing in a rally and hearing a swarm of slogans. Sashi Kumar, chairman of the trust Media Development Foundation that runs the Asian College of Journalism, Chennai, gives a similar analogy. He believes that the language of communication on Facebook is not written but oral. “Writing implies a well thought through opinion, whereas speech is responsive and involved. Within the Internet, there’s a strange morphing of written form which is expressed in a way of oral communication. You speak to someone on Facebook, you respond, you hear, you react, you communicate, you talk.” He says that this morphing is leading society back to more oral forms of communication where written forms like newspapers will be a thing of the past.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Replacing traditional media&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/PoliticsofFB.png" alt="Politics of FB" class="image-inline" title="Politics of FB" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;With surprising events like the support for Jan Lokpal law, Pink Chaddi campaign and even the backlash against the December 2012 gang rape case in Delhi, social media seems to have somewhere, somehow made all of us more participative, more aware and more active in political and social spaces.&lt;/p&gt;
&lt;p&gt;Most politicians have active Twitter and Facebook accounts. Most  newspapers and even news channels quote their feed as statements when  summing up news. Social networks have become almost mainstream. So much  so that when earlier in March Modi attacked Bihar chief minister &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Nitish%20Kumar"&gt;Nitish Kumar&lt;/a&gt;&lt;/span&gt; at a political rally in Muzaffarpur, Bihar, Kumar’s response was detailed, and through a Facebook post.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;A joint study by the IRIS Knowledge Foundation, a public service initiative of business and financial information provider IRIS Business Services Pvt. Ltd, and the industry body Internet and Mobile Association of India, suggests that social media use is now sufficiently widespread to influence the outcome of the next general election and consequently government formation. The March research, which studied Facebook’s own data, claims that among the social media spaces, Facebook users have the maximum clout.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kumar agrees and feels that news now is more user-generated: “It’s the people who want to pursue their own news, know more about their own news, create news. In a way it democratizes journalism. People are talking more about issues, giving opinions and comparing notes. Politics has shifted from the streets to these social medias.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The future holds more participation, and a sense of being a stakeholder in the political process. An “enlarging of political participation”, as Kumar puts it. “Of course because everyone has a mike, a mouthpiece now, there will be lot of more trivial conversation and hairsplitting which might not add up to anything, but the important thing is that people are engaging themselves politically. We are on the streets. All because of technology.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook'&gt;https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-03T11:30:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over">
    <title>The net is taking over</title>
    <link>https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over</link>
    <description>
        &lt;b&gt;For many days to come, people will speculate what caused Sunanda Pushkar's death last week in a New Delhi hotel. Did Union minister Shashi Tharoor's wife die of poisoning or a drug overdose? Wasn't she unwell? Was it suicide? Or was it murder? No less a matter of speculation has been the social media's role in the whole affair.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Veenu Sandhu and Surabhi Agarwal &lt;a class="external-link" href="http://www.business-standard.com/article/beyond-business/the-net-is-taking-over-114012401193_1.html"&gt;published in the Business Standard&lt;/a&gt; on January 24, 2014 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Writer Suketu Mehta has called it "murder by &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter&lt;/a&gt;". Pushkar's very public spat with Mehr Tarar, a Pakistani journalist, on the micro-blogging site, many psychologists feel, may have multiplied her anguish. Apart from other things, Tarar had tweeted: "The blonde's &lt;i&gt;aqal&lt;/i&gt; is weaker thn (sic) her grammar &amp;amp; spellings." Still others believe Pushkar had the premonition that end was near, and it was there for all to see on social media. &lt;i&gt;"Hasta hua jayega,"&lt;/i&gt; (will go laughing), she had tweeted a few days before her death.&lt;br /&gt;&lt;br /&gt;Social media is no longer time-pass in the country, certainly not with over 90 million users. The line that divides online and offline lives has blurred. &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Networking+Sites" target="_blank"&gt;Networking sites&lt;/a&gt; have begun to impact human behaviour. Lives are being lived in the open: open to comment, analysis and abuse. Mahesh Murthy, the founder of digital brand management firm Pinstorm, calls it the "demise of the culture of secrecy". This is the age, he says, "of diversity, of coming out in the open with sexual preferences &lt;i&gt;et cetera&lt;/i&gt;. Social media will help slaughter sacred cows. It is a good thing to happen, except for the sacred cows." According to Murthy, the pitfalls of uncensored speech are for those "who think they can control their lives or are insecure".&lt;br /&gt;&lt;br /&gt;But pitfalls are showing up. Some time ago, a high-profile couple from Delhi approached marriage and family counsellor Nisha Khanna. Their problem was aggravated by the wife's obsession with &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook&lt;/a&gt;, to the extent that she would put out everything, including the ups and downs of her relationship with her husband, as status messages for the consumption of her social media friends and acquaintances. The husband was livid - he felt exposed. It took six months of rigorous counselling before the wife started controlling, though marginally, her social media behaviour. "We are seeing obsession, irrationality and an inability to spot the very &lt;i&gt;thick&lt;/i&gt; line that divides the private from the public," says Varkha Chulani, clinical psychologist, psychotherapist and consultant with Lilavati Hospital in Mumbai. People, she adds, are looking for Facebook 'like' buttons even in real life.&lt;br /&gt;&lt;br /&gt;Feelings of extreme happiness, depression, loneliness and even suicidal thoughts are being shared not with family and friends but with Facebook 'connections' and Twitter 'followers'. Tweets or status updates that point to suicidal tendencies, in particular, can be telling. Some of these key expressions are "depressed", "feeling abused", "it's over" or "empty inside". A study - Tracking Suicide Risk Factors through Twitter - conducted in the US last year found a strong correlation between the number of tweets that indicated suicidal intentions and the number of suicides committed.&lt;br /&gt;&lt;br /&gt;Having realised that the platform is also being used as a medium to vent and express personal trauma, Facebook has, for about a year, been sending reports on profiles of people with suicide risk to Mumbai-based suicide helpline Aasra. "In the last one year, we have received 350 such email intimations concerning Indians," says Aasra Director Johnson Thomas. Aasra then mails that person to subtly and sensitively convey that there is help at hand, in case it is needed. Facebook and Twitter did not offer any comment for this article.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Decoding Social Media Slang&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;I  am an aggregator who has left a cookie crumb trail (while writing   this) for a machine algorithm to follow. So, can it point out to my boss   the scoops and their origin? In all probability, yes. For an   all-devouring algorithm, no crumb, no target, is too small. Algorithms   (at their core, a step-by-step method for doing a job) can sound scary,   but social media analysts depend on these little-understood, obscure   mathematical creatures.&lt;br /&gt;&lt;br /&gt; So, information posted publicly on  blogs, Facebook, Twitter, and  other sites are fair game for these data  predators. Suppose you click  ‘like’ on Facebook, you’re giving away a  lot more than you might think.  Your ‘likes’ can be pieced together to  form an eerily true portrait of  yourself. A study of 58,000 volunteers  by Michal Kosinski and David  Stillwell (University of Cambridge) and  Thore Graepel (Microsoft  Research, Cambridge) charts the chances of an  accurate prediction: 67  per cent for single versus in a relationship,  73 per cent for cigarette  smoking, 70 per cent for alcohol drinking, 65  per cent for drug use, 88  per cent for male homosexuality, 75 per cent  for female homosexuality,  and 93 per cent for gender.&lt;br /&gt;&lt;br /&gt; Another  point is not all data out there are cold facts. Far from  that, most  are sentiments and slang: sweet, bitter and often intimate.  “Wazup  homie!! howz it going!!” is a profound example. “‘Yo, homie, I'll  be at  my house in case you want to come kick it later” is another. How  is a  number cruncher such as an algorithm expected to crunch slang and   emotions? But experts insist there’s a bull market in sentiments and   foul language. And an emerging field known as sentiment analysis is   taking shape. The simplest algorithms here work by scanning keywords to   categorise a statement as positive or negative, based on a simple  binary  analysis (‘love’ is good, ‘hate’ is bad). But a more reliable  analysis  requires decoding many linguistic shades of gray. For example,  to get at  the true intent of a statement like ‘dude, i'm  like......duuuude,’ the  software will have to activate several  different filters, including  polarity (is the statement positive or  negative?), intensity (what is  the degree of emotion being expressed?)  and subjectivity (how partial or  impartial is the source?)&lt;br /&gt;&lt;br /&gt; “People first thought that emotions expressed on social media were  just  cute and stupid,” says Sreeju Thankan who has done computer science   and engineering from the Indian Institute of Technology Roorkee and is   now working at Mango Solutions. “Now, they are recognising it as a rich   vein.” But translating slang into binary code can be much tougher.   “Sentiments are different from conventional facts,” says Thankan. “There   is a long way for slang patrol to go.” For casual web surfers, a   simpler sentiment-analysis tool, Tweetfeel, is available. It tells you   the numbers of positive and negative tweets on a given topic. It also   gives you their percentages. Its analysis is based not just on   emoticons, but also words and phrases.&lt;/p&gt;
&lt;p style="text-align: right; "&gt;Ashish Sharma&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Last October in Mumbai, a 17-year-old college student, Aishwarya Dahiwal, killed herself after her parents barred her from using Facebook. "Is Facebook so bad? I cannot stay in a home with such restrictions as I can't live without Facebook," her suicide note reportedly read. The parents were in utter shock. "Girls are more prone to putting personal and emotional messages on social networking sites," says Manju Chhabra, child counsellor who runs an organisation called Cactus Lily in Delhi. And they tend to get more affected by what people say and how they react. "And comments on this very impersonal medium which we are giving a very personal space can be very cruel."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seema Hingorrany, a Mumbai-based psychologist, says one of her recent patients is a girl studying in Class 9. Her friend from school had uploaded a photo of herself, which got 200 'likes'. That upset the patient terribly because it reinforced her belief that she was unattractive and she became extremely upset, to the extent that her parents felt she needed counselling. Constant use of Facebook can affect one's self-esteem, if it's already low. Another of Hingorrany's patient was a 30-year-old who took to social media after he lost his job. But seeing other people's photos and updates made him increasingly jealous, and he began posting nasty comments. The recipients of his ire began "unfriending" him, which only made him more withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Irrational behaviour can also be seen in the world of random video chat. Sites like Omegle and Chatroulette aim to bring together surfers together with the help of webcams. The promise is irresistible: an endless stream of visitors in your room. When Ashish Sharma (the author of the accompanying article) logged on, he met a gaggle of girls who giggled endlessly, a German painter who was looking for his muse and wanted him to pose in a state of undress, a Swede who danced around and asked him to sing in praise of his bottom, and a man with an iron mask. It was crude and shocking. The excessively sexual behaviour can be unsettling for an unsuspecting (and young) visitor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is another side to it. "Twitter posts," says an article posted on rediff.com, "have saved lives. A man lost on a ski slope in Switzerland got help when he tweeted his predicament. Another got bail from arrest as his friends discovered from a tweet that he was jailed in a foreign country." Human resource managers check out the profiles of job applicants on social media. "People might mask many judgmental things in an interview; there is a possibility that they might express it on social media," says Debdas Sen, leader of technology consulting, PricewaterhouseCoopers. "Inclusion and diversity are important for us." But job seekers have become wise to it. That's why many airbrush their social media profiles. All politically incorrect posts are removed. Friends are treated lavishly offline so that they write nice posts on Facebook pages. Some even hire professional photographers for as much as Rs 20,000 to paste good profile pictures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But those who hire have started to see through it. Says Murthy of Pinstrip, "One can easily figure out the truthfulness of your statements by seeing what your friends are saying." One human resource manager says he pays more attention to what people post after 10 pm because "it tends to be more truthful". A senior functionary of a Gurgaon-headquartered firm says that he had hired somebody after he had found nothing suspicious on his LinkedIn profile; it was only later he found out that this person had been involved in some financial misdemeanour in his earlier job. "His LinkedIn profile had no clues, he was not on Facebook. That should have struck me," he says. Of course, the person was asked to leave.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of Bangalore-based Centre for Internet and Society, says social media has made people forget the distinction between private, semi-private and public statements. "Speech used to be ephemeral, but Internet has given it the power it never had," he says. "Internet never forgets." The fact that traces of a communication may remain in cyberspace even after they have been deleted has prompted a legislation called the Right to Erasure by the European Union. Under the law, earlier called Right to be Forgotten, an individual can request all his data to be erased, including by third parties. India is also mulling a similar legislation under its Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those at the bottom of the social pyramid, who have little to lose, express themselves most freely on social media, while those with reputations to protect are cautious. The consequences can be serious, as the Mumbai girl who questioned the city's shutdown after Bal Thackeray's death in November 2012 on Facebook and her friend who "liked" realised: both were called in by the police. It's not surprising why even standup comedians, who can't resist taking potshots at one and all, turn extremely careful before they tweet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, is social media good or bad? "Social media can help," Amartya Sen said at the recent Jaipur Literature Festival, "But you must read more books".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over'&gt;https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-04T05:57:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii">
    <title>The Legal Validity of Internet Bans: Part II </title>
    <link>https://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii</link>
    <description>
        &lt;b&gt;In recent months, there has been a spree of bans on access to Internet services in Indian states, for different reasons. The State governments have relied on Section 144, Code of Criminal Procedure 1973 to institute such bans. Despite a legal challenge, the Gujarat High Court found no infirmity in this exercise of power in a recent order. We argue that it is Section 69A of the Information Technology Act 2000, and the Website Blocking Rules, which set out the legal provision and procedure empowering the State to block access to the Internet (if at all it is necessary), and not Section 144, CrPC.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;As we saw earlier, the Gujarat High Court held that Section 144, CrPC empowers the State apparatus to order blocking of access to data services. According to the Court, Section 69A, IT Act can be used to block certain websites, while under Section 144, CrPC, the District Magistrate can direct telecom companies like Vodafone and Airtel, who&lt;/span&gt;&lt;i&gt; &lt;/i&gt;&lt;span&gt;extend the facility of Internet access. In effect, the High Court agreed with the State government’s argument that the scope of Section 69A, IT Act covers only blocking of &lt;/span&gt;&lt;i&gt;certain &lt;/i&gt;&lt;span&gt;websites, while Section 144, CrPC grants a wider power.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is what the Court said (para 9 of the &lt;a href="http://indiankanoon.org/doc/29352399/"&gt;order&lt;/a&gt;):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;If the comparison of both the sections in the field of operations is made, barring certain minor overlapping more particularly for public order &lt;/i&gt;[sic]&lt;i&gt;, one can say that the area of operation of Section 69A is not the same as that of Section 144 of the Code. &lt;span&gt;Section 69A may in a given case also be exercised for blocking certain websites&lt;/span&gt;, whereas under &lt;span&gt;Section 144 of the Code, directions may be issued to certain persons who may be the source for extending the facility of internet access&lt;/span&gt;. Under the circumstances, we do not find that the contention raised on behalf of the petitioner that the resort to only Section 69A was available and exercise of power under Section 144 of the Code was unavailable, can be accepted.&lt;/i&gt;” (emphases ours)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We submit that the High Court’s reasoning failed to examine the scope of Section 69A, IT Act thoroughly. Section 69A does, in fact, empower the government to order blocking of access to data services, and it is a special law. Importantly, it sets forth a procedure that State governments, union territories and the Central Governments must follow to order blocks on websites or data services.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;I. Special Law Prevails Over General Law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The IT Act, 2000 is a special law dealing with matters relating to the Internet, including offences and security measures. The CrPC is a general law of criminal procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a special law and a general law cover the same subject, then the special law supersedes the general law. This is a settled legal principle. Several decisions of the Supreme Court attest to this fact. To take an example, in &lt;a href="http://www.asianlii.org/in/cases/cen/INSC/2010/526.html"&gt;&lt;i&gt;Maya Mathew &lt;/i&gt;v. &lt;i&gt;State of Kerala&lt;/i&gt;&lt;/a&gt;, (2010) 3 SCR 16 (18 February 2010), when there was a contention between the Special Rules for Kerala State Homoeopathy Services and the general Rules governing state and subordinate services. The Supreme Court held that when a special law and a general law both govern a matter, the Court should try to interpret them harmoniously as far as possible. But if the intention of the legislature is that one law should prevail over another, and this intention is made clear expressly or impliedly, then the Court should give effect to this intention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the basis of this principle, let’s take a look at the IT Act, 2000. &lt;a href="http://cybercrime.planetindia.net/ch13_2008.htm"&gt;Section 81, IT Act&lt;/a&gt; expressly states that the provisions of the IT Act shall have overriding effect, notwithstanding anything inconsistent with any other law in force. Moreover, in the &lt;a href="http://cybercrime.planetindia.net/statement-objects-foritaa-2006.htm"&gt;Statement of Objects and Reasons&lt;/a&gt; of the IT (Amendment) Bill, 2006, the legislature clearly notes that amendments inserting offences and security measures into the IT Act are necessary given the proliferation of the Internet and e-transactions, and the rising number of offences. These indicate expressly the legislature’s intention for the IT Act to prevail over general laws like the CrPC in matters relating to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, we will examine whether the IT Act empowers the Central and State governments to carry out complete blocks on access to the Internet or data services, in the event of emergencies. If the IT Act does cover such a situation, then the CrPC should not be used to block data services. Instead, the IT Act and its Rules should be invoked.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;II. Section 69A, IT Act Allows Blocks on Internet Access&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 69A(1), IT Act says:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Where the Central Government or any of its officer specially authorised by it in this behalf is satisfied that it is necessary or expedient so to do, in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above, it may subject to the provisions of sub-section (2) for reasons to be recorded in writing, by order, direct any agency of the Government or intermediary to block for &lt;span&gt;access&lt;/span&gt; by the public or cause to be blocked for access by the public any&lt;span&gt; information &lt;/span&gt;generated, transmitted, received, stored or hosted in any &lt;span&gt;computer resource&lt;/span&gt;.” (&lt;i&gt;emphasis ours&lt;/i&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Essentially, Section 69A says that the government can block (or cause to be blocked) for access by the public, any information&lt;i&gt; &lt;/i&gt;generated, transmitted, etc. in any computer resource, if the government is satisfied that such a measure is in the interests of public order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Does this section allow the government to institute bans on Internet access in Gujarat? To determine this, we will examine each underlined term from above.&lt;/span&gt;&lt;/p&gt;
&lt;p style="padding-left: 90px; text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;Access&lt;/i&gt;&lt;/strong&gt;: &lt;a href="http://indiankanoon.org/doc/1890726/"&gt;Section 2(1)(a)&lt;/a&gt;, IT Act defines access as “...&lt;i&gt;&lt;span&gt;gaining entry into&lt;/span&gt;&lt;/i&gt;, instructing or communicating with… resources of a &lt;i&gt;&lt;span&gt;computer&lt;/span&gt;&lt;/i&gt;, &lt;i&gt;&lt;span&gt;computer system&lt;/span&gt;&lt;/i&gt; or &lt;i&gt;&lt;span&gt;computer network&lt;/span&gt;&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="padding-left: 90px; text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;Computer resource&lt;/i&gt;&lt;/strong&gt;: &lt;a href="http://indiankanoon.org/doc/1768009/"&gt;Section 2(1)(k)&lt;/a&gt;, IT Act defines computer resource as “computer, computer system, computer network...”&lt;/p&gt;
&lt;p style="padding-left: 90px; text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;Information&lt;/i&gt;&lt;/strong&gt;: &lt;a href="http://indiankanoon.org/doc/146402352/"&gt;Section 2(1)(v)&lt;/a&gt;, IT Act defines information as “includes… data, message, text, images, sound, voice...”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So ‘blocking for access’ under Section 69A includes preventing gaining entry or communicating with the resources of a computer, computer system or computer network, and it includes blocking communication of data, message, text, images, sound, etc. Now two questions arise:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Do 2G and 3G services, broadband and Wifi fall within the definition of ‘computer network’?&lt;/p&gt;
&lt;p style="padding-left: 90px; text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;Computer network&lt;/i&gt;&lt;/strong&gt;: &lt;a href="http://indiankanoon.org/doc/29924/"&gt;Section 2(1)(j)&lt;/a&gt;, IT Act defines computer network as “inter-connection of one or more computers or computer systems &lt;i&gt;&lt;span&gt;or communication device&lt;/span&gt;&lt;/i&gt;…” by “...use of satellite, microwave, &lt;i&gt;&lt;span&gt;terrestrial line, wire, wireless or other communication media&lt;/span&gt;&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Do mobile phones that can connect to the Internet (we say smartphones for simplicity) qualify as fall within the definition of ‘computer resource’?&lt;/p&gt;
&lt;p style="padding-left: 90px; text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;Communication device&lt;/i&gt;&lt;/strong&gt;&lt;span&gt;: &lt;/span&gt;&lt;a href="http://indiankanoon.org/doc/59759075/"&gt;Section 2(1)(ha)&lt;/a&gt;&lt;span&gt;, IT Act defines communication device as “&lt;/span&gt;&lt;i&gt;cell phones&lt;/i&gt;&lt;span&gt;, personal digital assistance or combination of both or any other device &lt;/span&gt;&lt;i&gt;used to communicate, send or transmit any text, video, audio or image&lt;/i&gt;&lt;span&gt;”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So a cell phone is a communication device. A computer network is an inter-connection of communication devices by wire or wireless connections. A computer network is a computer resource also. Blocking of access under Section 69A, IT Act includes, therefore, gaining entry into or communicating with the resources of a computer network, which is an interconnection of communication devices, including smartphones. Add to this, the fact that &lt;i&gt;any information&lt;/i&gt; (data, message, text, images, sound, voice) can be blocked, and the conclusion seems clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The power to block access to Internet services (including data services) can be found within Section 69A, IT Act itself, the special law enacted to cover matters relating to the Internet. Not only this, the IT Act envisages emergency situations when blocking powers may need to be invoked.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;III. Section 69A Permits Blocking in Emergency Situations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 69A, IT Act doesn’t act in isolation. The Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009 (“&lt;strong&gt;Blocking Rules&lt;/strong&gt;”) operate together with Section 69A(1).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 9 of the Blocking Rules deals with blocking of information in cases of emergency. It says that in cases of emergency, when “&lt;i&gt;no delay is acceptable&lt;/i&gt;”, the Designated Officer (DO) shall examine the request for blocking. If it is within the scope of Section 69A(1) (i.e., within the grounds of public order, etc.), then the DO can submit the request to the Secretary, Department of Electronics and Information Technology (DeitY). If the Secretary is satisfied of the need to block during the emergency, then he may issue a reasoned order for blocking, in writing as an interim measure. The intermediaries do not need to be heard in such a situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a blocking order is issued during an urgent situation, the DO must bring the blocking request to the Committee for Examination of Request constituted under Rule 7, Blocking Rules. There is also a review process, by a Review Committee that meets every two months to evaluate whether blocking directions are in compliance with Section 69A(1) [Rule 14].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We submit, therefore, that the Gujarat High Court erred in holding that Section 144, CrPC is the correct legal provision to enable Internet bans. Not only does Section 69A, IT Act cover blocking of access to Internet services, but it also envisages blocking in emergency situations. As a special law for matters surrounding the Internet, Section 69A should prevail over the general law provision of Section 144, CrPC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Acknowledgements&lt;/strong&gt;&lt;span style="text-align: justify; "&gt;: We would like to thank Pranesh Prakash, Japreet Grewal, Sahana Manjesh and Sindhu Manjesh for their invaluable inputs in clarifying arguments and niggling details for these two posts.&lt;/span&gt;&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;Geetha Hariharan is a Programme Officer with Centre for Internet &amp;amp; Society. Padmini Baruah is in her final year of law at the National Law School of India University, Bangalore (NLSIU) and is an intern at CIS.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii'&gt;https://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geetha Hariharan and Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>69A</dc:subject>
    
    
        <dc:subject>Section 144</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-10-08T11:17:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-legal-validity-of-bans-on-internet-part-i">
    <title>The Legal Validity of Internet Bans: Part I</title>
    <link>https://cis-india.org/internet-governance/blog/the-legal-validity-of-bans-on-internet-part-i</link>
    <description>
        &lt;b&gt;In recent months, there has been a spree of bans on access to Internet services in Indian states, for different reasons. The State governments have relied on Section 144, Code of Criminal Procedure 1973 to institute such bans. Despite a legal challenge, the Gujarat High Court found no infirmity in this exercise of power in a recent order. We argue that it is Section 69A of the Information Technology Act 2000, and the Website Blocking Rules, which set out the legal provision and procedure empowering the State to block access to the Internet (if at all it is necessary), and not Section 144, CrPC.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In recent months, there has been a spree of bans on access to Internet services in India states, for different reasons. In Gujarat, the State government banned access to mobile Internet (data services) citing breach of peace during the &lt;/span&gt;&lt;a href="http://www.ibtimes.co.in/gujarat-rioting-reported-several-parts-ahmedabad-patel-rally-event-turns-violent-644192"&gt;Hardik Patel agitation&lt;/a&gt;&lt;span&gt;. In Godhra in Gujarat, mobile Internet was banned as a precautionary measure &lt;/span&gt;&lt;a href="http://indianexpress.com/article/india/gujarat/gujarat-internet-services-in-godhra-suspended-for-24-hours/"&gt;during Ganesh &lt;i&gt;visarjan&lt;/i&gt;&lt;/a&gt;&lt;span&gt;. In Kashmir, mobile Internet was banned for three days or more because the government feared that people would share pictures of &lt;/span&gt;&lt;a href="http://indianexpress.com/article/india/india-news-india/jk-govt-plans-three-day-mobile-internet-ban-in-valley/"&gt;slaughter of animals during Eid&lt;/a&gt;&lt;span&gt; on social media, which would spark unrest across the state.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can State or Central governments impose a ban on Internet access? If the State or its officials anticipate disorder or a disturbance of ‘public tranquility’, can Internet access through mobiles be banned? According to a &lt;a href="http://indiankanoon.org/doc/29352399/"&gt;recent order of the Gujarat High Court&lt;/a&gt;: Yes; &lt;a href="http://indiankanoon.org/doc/930621/"&gt;Section 144 of the Code of Criminal Procedure, 1973&lt;/a&gt; (&lt;strong&gt;“CrPC”&lt;/strong&gt;) empowers the State government machinery to impose a temporary ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the Gujarat High Court’s order neglects the scope of Section 69A, IT Act, and wrongly finds that the State government can exercise blocking powers under Section 144, CrPC. In this post and the next, we argue that it is &lt;a href="http://indiankanoon.org/doc/10190353/"&gt;Section 69A of the Information Technology Act, 2000&lt;/a&gt; (“&lt;strong&gt;IT Act&lt;/strong&gt;”) which is the legal provision empowering the State to block access to the Internet (including data services), and not Section 144, CrPC. Section 69A covers blocks to Internet access, and since it is a special law dealing with the Internet, it prevails over the general Code of Criminal Procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, the blocking powers must stay within constitutional boundaries prescribed in, &lt;i&gt;inter alia&lt;/i&gt;, Article 19 of the Constitution. Blocking powers are, therefore, subject to the widely-accepted tests of legality (foresight and non-arbitrariness), legitimacy of the grounds for restriction of fundamental rights and proportionality, calling for narrowly tailored restrictions causing minimum disruptions and/or damage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In &lt;/span&gt;&lt;strong&gt;Section I &lt;/strong&gt;&lt;span&gt;of this post, we set out a brief record of the events that preceded the blocking of access to data services (mobile Internet) in several parts of Gujarat. Then in &lt;/span&gt;&lt;strong&gt;Section II&lt;/strong&gt;&lt;span&gt;, we summarise the order of the Gujarat High Court, dismissing the petition challenging the State government’s Internet-blocking notification under Section 144, CrPC. In the next post, &lt;/span&gt;&lt;span&gt;we examine the scope of Section 69A, IT Act to determine whether it empowers the State and Central government agencies to carry out blocks on Internet access through mobile phones (i.e., data services such as 2G, 3G and 4G) under certain circumstances. We submit that Section 69A does, and that Section 144, CrPC cannot be invoked for this purpose. &lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;I. The Patidar Agitation in Gujarat:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This question arose in the wake of agitation in Gujarat in the Patel community. The Patels or Patidars are &lt;a href="http://indianexpress.com/article/explained/simply-put-who-are-gujarats-patidars-and-why-are-they-angry/"&gt;politically and economically influential&lt;/a&gt; in Gujarat, with several members of the community holding top political, bureaucratic and industrial positions. In the last couple of months, the Patidars have been agitating, demanding to be granted status as Other Backward Classes (OBC). OBC status would make the community eligible for reservations and quotas in educational institutions and for government jobs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards this demand, the Patidars organised &lt;a href="http://indianexpress.com/article/cities/ahmedabad/demand-for-obc-status-patidars-stir-spreads-to-saurashtra/"&gt;multiple rallies&lt;/a&gt; across Gujarat in August 2015. The largest rally, called the &lt;i&gt;Kranti Rally&lt;/i&gt;, &lt;a href="http://m.ibnlive.com/news/politics/turmoil-brewing-in-gujarat-as-patel-community-demands-obc-status-hardik-patel-begins-indefinite-hunger-strike-1051104.html"&gt;was held&lt;/a&gt; in Ahmedabad, Gujarat’s capital city, on August 25, 2015. Hardik Patel, a leader of the agitation, reportedly went on hunger strike seeking that the Patidars’ demands be met by the government, and was arrested as he did not have permission to stay on the rally grounds after the rally. While media reports vary, it is certain that &lt;a href="http://www.ibtimes.co.in/gujarat-rioting-reported-several-parts-ahmedabad-patel-rally-event-turns-violent-644192"&gt;violence and agitation broke out&lt;/a&gt; after the rally. &lt;a href="http://timesofindia.indiatimes.com/india/Patidar-agitation-Uneasy-calm-in-violence-hit-Gujarat-death-toll-rises-to-10/articleshow/48699151.cms"&gt;Many were injured&lt;/a&gt;, some lost their lives, property was destroyed, businesses suffered; the army was deployed and curfew imposed for a few days across the State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to other security measures, the State government also imposed a ban on mobile Internet services across different parts of Gujarat. Reportedly, Hardik Patel had called for a state-wide &lt;i&gt;bandh &lt;/i&gt;over Whatsapp. &lt;a href="http://www.ndtv.com/india-news/after-clashes-over-hardik-patels-detention-no-whatsapp-in-gujarat-1211058?pfrom=home-lateststories"&gt;The police cited&lt;/a&gt; “&lt;i&gt;concerns of rumour-mongering and crowd mobilisation through Whatsapp&lt;/i&gt;” as a reason for the ban, which was instituted under &lt;a href="http://indiankanoon.org/doc/930621/"&gt;Section 144, Code of Criminal Procedure, 1973&lt;/a&gt; (&lt;strong&gt;“CrPC”&lt;/strong&gt;). In most of Gujarat, the ban lasted six days, from August 25 to 31, 2015, &lt;a href="http://www.ibtimes.co.in/gujarat-patel-agitation-ban-mobile-internet-whatsapp-lifted-ahmedabad-644924"&gt;while it continued&lt;/a&gt; in Ahmedabad and Surat for longer.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;II. The Public Interest Litigation:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A public interest petition was filed before the Gujarat High Court, challenging the mobile Internet ban. Though the petition was dismissed at the preliminary stage by Acting Chief Justice Jayant Patel and Justice Anjaria by an &lt;a href="http://indiankanoon.org/doc/29352399/"&gt;oral order&lt;/a&gt; delivered on September 15, 2015, the legal issues surrounding the ban are important and the order calls for some reflection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the PIL, the petitioner prayed that the Gujarat High Court declare that the notification under Section 144, CrPC, which blocked access to mobile Internet, is “void &lt;i&gt;ab initio&lt;/i&gt;, &lt;i&gt;ultra vires &lt;/i&gt;and unconstitutional” (para 1 of the &lt;a href="http://indiankanoon.org/doc/29352399/"&gt;order&lt;/a&gt;). The ban, argued the petitioner, violated Articles 14, 19 and 21 of the Constitution by being arbitrary and excessive, violating citizens’ right to free speech and causing businesses to suffer extensive economic damage. In any event, the power to block websites was specifically granted by Section 69A, IT Act, and so the government’s use of Section 144, CrPC to institute the mobile Internet block was legally impermissible. Not only this, but the government’s ban was excessive in that mobile Internet services were &lt;i&gt;completely blocked&lt;/i&gt;; had the government’s concerns been about social media websites like Whatsapp or Facebook, the government could have suspended only those websites using Section 69A, IT Act. And so, the petitioner prayed that the Gujarat High Court issue a writ “&lt;i&gt;permanently restraining the State government from imposing a complete or partial ban on access to mobile Internet/broadband services&lt;/i&gt;” in Gujarat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The State Government saw things differently, of course. At the outset, the government argued that there was “&lt;i&gt;sufficient valid ground for exercise of power&lt;/i&gt;” under Section 144, CrPC, to institute a mobile Internet block (para 4 of the &lt;a href="http://indiankanoon.org/doc/29352399/"&gt;order&lt;/a&gt;). Had the blocking notification not been issued, “&lt;i&gt;peace could not have been restored with the other efforts made by the State for the maintenance of law and order&lt;/i&gt;”. The government stressed that Section 144, CrPC notifications were generally issued as a “last resort”, and in any case, the Internet had not been shut down in Gujarat; broadband and WiFi services continued to be active throughout. Since the government was the competent authority to evaluate law-and-order situations and appropriate actions, the Court ought to dismiss the petition, the State prayed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court agreed with the State government, and dismissed the petition without issuing notice (para 9 of the &lt;a href="http://indiankanoon.org/doc/29352399/"&gt;order&lt;/a&gt;). The Court examined two issues in its order (very briefly):&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The scope and distinction between Section 144, CrPC and      Section 69A, IT Act, and whether the invocation of Section 144, CrPC to      block mobile Internet services constituted an arbitrary exercise of power;&lt;/li&gt;
&lt;li&gt;The proportionality of the      blocking notification (though the Court doesn’t use the term      ‘proportionality’).&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;We will examine the Court’s reading of Section 69A, IT Act and Section 144, CrPC, to see whether their fields of operation are in fact different.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong style="text-align: justify; "&gt;Acknowledgements&lt;/strong&gt;&lt;span style="text-align: justify; "&gt;: We would like to thank Pranesh Prakash, Japreet Grewal, Sahana Manjesh and Sindhu Manjesh for their invaluable inputs in clarifying arguments and niggling details for these two posts.&lt;/span&gt;&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Geetha Hariharan is a Programme Officer with Centre for Internet &amp;amp; Society. Padmini Baruah is in her final year of law at the National Law School of India University, Bangalore (NLSIU) and is an intern at CIS.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-legal-validity-of-bans-on-internet-part-i'&gt;https://cis-india.org/internet-governance/blog/the-legal-validity-of-bans-on-internet-part-i&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geetha Hariharan and Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>69A</dc:subject>
    
    
        <dc:subject>Section 144</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-10-08T11:18:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong">
    <title>The Dangers Of Birdsong </title>
    <link>https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong</link>
    <description>
        &lt;b&gt;Instant gratification? Social media can quickly turn the game into checkmate if you don’t keep your emotions in check. &lt;/b&gt;
        &lt;p&gt;Namrata Joshi's article was &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?289264"&gt;published in Outlook&lt;/a&gt; on January 25, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Woke up from a dream in which I had just learned that I was going to keep wickets for India. In my dream, I thought, let me share this news on Twitter. I didn’t, fearing I would be made a laughing stock.” These are few of a series of stream of consciousness tweets about a dream posted this Monday by author-academician Amitava Kumar. Tweets that don’t just have to do with dreaming of a personal achievement, but also about tweeting it. “Twitter has invaded even our sleeping life,” says Amitava on an e-mail but also admits that he didn’t think for a moment that he was sharing something private in a public place while tweeting his reverie. “Instead, perhaps, I was seeking a private connection with a lot of readers.” Which he did rustle up in good measure. He followed it up by tweeting a picture of his son with him, taken by his 10-year-old daughter Ila, as a homage to a similar photostream by author- photographer-art historian Teju Cole.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amitava’s unfussy and creative candidness about tweeting things personal, which he prefers to see as “grappling with a form of writing” came in the wake of a weekend of vigorous debate on how social media platforms were bringing the private under unblinking public scrutiny—the immediate hook being the sudden, tragic death of Sunanda Pushkar after her no-holds-barred Twitter war with Pakistani journalist Mehr Tarar (over the latter’s alleged liaison with her husband Shashi Tharoor, which was consumed with much amusement by their vicarious, at times vicious, followers). The Tharoor incident is not a stand-alone case. Be it a confidentiality clause or diplomatic tact, a professional decision or personal affair or even a death of someone close to you, social media has become a stage to play out the classified and the confidential (see infographic) by the celebrit­ies and the aam aadmi alike. The pay­­back? Spats, comebacks, brea­k­do­wns, meltdowns, resignations, embarrassments, humiliations, ker­fuffles....&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And it’s not something confined to India alone. “US Congressman Anthony Weiner’s tweet of his, let’s call it, torso, to a young woman in Seattle is perhaps the most egregious example of a US politic­ian behaving badly online,” says Amit­ava. No surprise then that Weiner bec­ame a butt of late-night comedy shows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the larger question here is why. Why this urge and urgency to share it all? What is it about a platform like Twitter or Facebook that makes people bare and dare? Is it that the immediacy, speed and reach allows them the easiest way to extend the boundaries of their secluded, lonely lives, get instant attention and fan the curiosity of someone out there who they don’t even know? And why is propriety and moderation getting thrown out of the window in the world of virtual exchanges? Adman-columnist Santosh Desai calls Twitter a “broadcast system to the universe”. The tweets are often “thought bubbles”, “something you mutter” without a full sense of what public means. “The spur of the moment opinion or feeling acquires public currency,” he says. “The unraveling of the human being, the opening up of the closed box then becomes a new source of stimulation and pleasure,” he says. “I sometimes wonder how we shared before Twitter. We talk about what we like, don’t like at the drop of a hat. At times you are vulnerable and vent things out without an agenda and without knowing the repercussions. We creative bunch are like that,” says popular actress Divya Dutta.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ShashiTharoor1.png" alt="Shashi" class="image-inline" title="Shashi" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/ShashiTharoor2.png" alt="Shashi Tharoor 2" class="image-inline" title="Shashi Tharoor 2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;According to Sunil Abraham, executive director of the Centre for Internet and Society, Bangalore, private information is a currency in the global attention eco­nomy. “One of the many ways of climbing the attention economy is to div­ulge private information. Those in public life like filmstars and socialites understand this completely and exploit all traditional broadcast channels and contemporary multicast channels like social media to amass public attention,” he says. Look closely and the online space is no different from the real. There are as many exceptions as there are rules. So for every exhibitionist handle that exploits our latent voyeurism, there is a Natasha Bad­h­war, one of the most life-affirming pre­sences on Twitter. For her, like Ami­tava, sharing is a mode of expression. “Sharing gives us agency. We take back the power to tell our story, express our views, share our version in our own words,” she says. According to her, “honest” sharing fuels empathy. “It is contagious, it makes the reader want to share too,” she says. And from that sharing could emerge a new pool of acquaintances, friends and well-wishers. It may not be a virtual escape from the real but a journey and connect back to the actual, an expansion of the human circle than a depletion of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all our friends and followers need necessarily be sympathetic. Often they are also brutally savage. “The anonymity allows people to say exactly what they want without considering the implications. They don’t realise that it’s not just a handle but a human being they are talking to,” says Nikhil Pahwa, founder of medianama.com. Amitava compares it to drone warfare. “The technology of remote destruction has introduced a new experience of war, and a new logic of killing. You can kill with greater abandon; you can strike in unexpected places; you are confronted with few consequences of your fatal mistakes. Similarly, Twitter allows a mode of social exchange with less culpability. There are very few consequences for trolls, but disastrous ones for their victims,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But surely that doesn’t mean that you blur all the lines between the private and the public? How to exercise caution? How much to open up (or not) and how much of your core to keep to yourself? Life, after all, is too complex and fragile for blame games and finger-pointing at social media alone. It’s those using it who need to own up. “People need to take responsibility for what they say. It’s like someone telling me how he was abused for 15 minutes on the phone when he could have easily cut the call,” says Nikhil Pahwa. “It’s a modern form of communication which you have to embrace but there’s a line you must draw. For instance, my wife and I never interact on FB or Twitter. I keep the family to myself. Jokes are fine but I don’t abuse or use swear words,” says actor Ashwin Mushran. “There has to be a sense of decorum. I won’t put out what I gossip about with my friends. I have no strategy but am guarded by my own belief system,” says actor Rajat Kapoor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s normal human nature to express. Be it anger or frustration, as a counsellor I tell people to not suppress emotions but some moderation and etiquette need to apply in cyber space,” says Mukta Pun­tambekar deputy director of Pune-based Muktangan Rehabilitation Centre. “You have to accept that your followers and friends will have access to details about you. You have to exercise discretion in saving something of yourself for yourself. There are areas that need not be opened up for all,” says actor-comedian Vir Das, who recently posted an open letter on FB—‘Twitter Bad? Facebook Evil? or We Stupid?’—on the pointlessness of blaming social media for the Tharoor family tragedy. To extend the argument further, and add another layer to it, aren’t we also living in times when privacy itself is evolving, asks Raj­esh Lalwani, CEO of blogworks and a self-confessed people-watcher. “My gra­n­dmother would not even eat in public. But we eat in restaurants, on the streets,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is also becoming an ambiguous, vague and complex entity. Getting tagged in a friend’s photo compromises your privacy without your involvement or participation. “The line between private and public has mostly dissolved because of the temporal persistence of digital traces in cyberspace, the global nature of the network and the ubiquitous and pervasive surveillance state,” says Abraham. “On Twitter and FB, things get circulated...what we put up, whether it’s a tweet, an update or a picture, is permanent unlike memory,” says Desai. The digital trail stays online. “We are leaving our digital footprints behind. What we post might be easy but the implications of it are complicated,” says writer, filmmaker and media observer Amit Khanna.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to him, there is a gap bet­ween the progression of technology and society. “There are newer windows but our minds are not growing apace to handle the connected world in a mature way,” he says. So one needs to be additionally circumspect about what we do online, how much of us we put out there. The ‘creative minds’ don’t see it as cut and dried. Natasha thinks that sharing can make people vulnerable to ridicule. “Confronting and embracing that vulnerability is the only way forward. These are not real fears to cling to, these are fears to shed as we grow and realise the extent of our individual power.” Amitava says he has seen seve­ral careers destroyed because of a single tweet. But he’d hate to back down and be cautious. As he puts it, “You’ve got to push the envelope and experiment with expression. I hope that when my wrong moment comes, peo­ple will be forgiving.” Amen to that.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong'&gt;https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-12T10:29:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse">
    <title>The Curious Case of Poor Security in the Indian Twitterverse</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse</link>
    <description>
        &lt;b&gt;What are the technical, legal and jurisdictional issues around the recent Twitter and email hacks claimed by the ‘Legion Crew’, and what can targeted entities do to better protect themselves?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://thewire.in/86946/legion-crew-hack-twitter/"&gt;published in the Wire&lt;/a&gt; on December 15, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The term legion, an oft-referred identity in popular culture, has begun to attain recent notoriety in Indian cyberspace due to the spate of hacks being carried out by a group of hackers calling themselves ‘Legion Crew’. The group has compromised four Twitter and/or email accounts in the past two weeks, with confirmed hacks of Rahul Gandhi, Vijay Mallya, Barkha Dutt and Ravish Kumar. Lalit Modi, Apollo Hospitals and the parliament (sansad) have been singled out as future targets, with dire warnings of catastrophic data leaks if the group were to be investigated by the authorities. The ethical impression of the hacks have been divided, with some segments of the public supporting the supposedly hacktivist outlook of the group while others condemning their actions as reckless and invasive. In the meantime, no individuals or entities have been accused of the hacks by the police, with most reports claiming the foreign origin of the hacks being the biggest impediment to the investigations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A technical and legal perspective&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The hacks first began against the politician Gandhi, whose Twitter account was hacked almost two weeks ago, with various demeaning tweets being posted for a few hours before access to the account was restored to the rightful owner. The same hacks were then carried out on business tycoon Mallya’s Twitter account last Friday but this time around, his bank details (apparently obtained from his compromised email accounts) were also leaked to the public via Twitter. Similar hacks targeting both the Twitter and email accounts of Dutt and Kumar were also carried out the past weekend. Sensitive details and data dumps (around 1.5 GB in size) of the journalists were released to the public, along with escalating warnings about future attacks. The data dumps released by the hackers seemed to be indicative that the hackers obtained far more information than they had disclosed via the Twitter hacks and were willing to leverage this data as ransom. Twitter, via both their Indian policy representatives and their international office, has denied any compromise to their systems and has claimed that all accounts were legitimately accessed with valid credentials at the time of the hacks. This leads to three main questions: How were the Twitter and email accounts hacked? What is the recourse, especially in terms of investigation, available to the afflicted parties and the authorities? What can potential targets do to secure their online presence from such attacks?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding their technical nature, all of these hacks were sustained compromises that lasted for a few hours each (a long time in cyberspace) and seemed to be reflective of only a fragment of the power the hackers held over the individual’s online presence. Considering Twitter’s denial that the attacks were due to a security flaw on their end as well as the fact that legitimate login details were used to gain access to the accounts, a rather simple investigation can show that the most likely attack vector used by the Legion Crew for these hacks was a DNS Hijacking attack in combination with a Man in the Middle (MITM) attack. These methods abuse the rather simple and (by default) insecure DNS system that is responsible for directing the world’s Internet traffic including email. While the use of DNS to map websites to the IP address of the systems where they are physically hosted (for instance, www.thewire.in maps to 52.76.81.135 at the time of writing this article) is fairly well known, the DNS system also directs most of the world’s email. Similar to DNS A and AAA name records regarding websites, DNS MX records direct email sent to domain names to the correct email servers where they are processed for storage or forwarding, as required. If these MX records are compromised, then hackers can easily redirect emails sent to legitimate email address of the domain name (for instance, xyz@thewire.in) to whatever system they want, including other compromised email addresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The original operator of the email account is unaware of any email that is redirected in such a way and has no way of knowing the account has been hacked until they notice they are not consistently receiving emails sent to them, which in well planned hacks can be as for many weeks or even months. These attacks can also be further augmented if the hackers also decide to implement an MITM. In an MITM attack, hackers can redirect all traffic attempting to reach an email account via the MX records to a system they operate by changing the MX records on the domain name server to a malicious system. They can access and store all these emails (along with attachments) via the malicious system and also manipulate the information contained in these emails. Then, either in bulk or selectively, they can re-send the emails to the original email accounts they were intended for from their own servers. The owner will then receive the emails in their inboxes with the apparent impression they are private and being received for the first time. This entire MITM process can be setup in a manner that the emails are rerouted to compromised servers by MX records changes, stored for future analysis and then forwarded to the original recipient account in a matter of seconds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the reliance placed by most websites on email IDs being a primary form of identity authentication, compromising an email ID can give access to most of the social networking, entertainment and even banking websites’ login details of the owner to any individual who has the login details of the account. This is because of the password reset or forgotten password feature available in most services that use only email IDs by default as a form of authenticating account ownership and allowing the user to reset their passwords by setting a reset email to their registered email accounts. Once they gain access to the compromised accounts, hackers can perform these resets with impunity, granting them unrestricted access to the online presence of the owner. In fact, hackers can use these attacks to perform password resets on the email accounts themselves, allowing them unlimited access to past conversation, records and login details that may be stored in the email accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Keeping this background in mind, the most likely methodology behind the hacks is quite simple to explain. The Legion Crew most likely first compromised the email systems of these celebrities by changing the DNS MX records of the email IDs which were registered with Twitter as login IDs for these accounts. This allowed them to redirect emails sent to these email IDs to an alternative system of their choosing. They then used the password reset feature of Twitter, which is similar to those provided by most social networking services, to reset the password of these accounts. However, due to the compromise of the MX records of the domain names used by these celebrities, instead of reaching the inboxes of the entities operating the accounts, the password reset emails were sent to the alternative systems set up by the hackers solely for receiving such emails. After receiving this email, it was a simple matter of resetting the account credentials by clicking on the password reset link on the email and changing the passwords of these accounts to unique passwords only known to the hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hackers then would (and did) have complete control of the account until the service provider itself intervened and provided an emergency reset along with recommending rectifying the MX records from the malicious one’s inserted by the hackers. The only question left to be answered in the methodology followed by the hackers is how they gained access to the MX records, as DNS records can only be changed using the dashboard of the domain name provider, which in turn is protected by a login password. Allegations have arisen that most (if not all) of the compromised accounts used ‘Net4india’ as their domain name provider. Therefore, it is very possible either that it is a vulnerability on the Net4india systems, an internal compromise of the personnel Net4india and so on leading to access detail to domain name accounts from being compromised. Such security and personnel breaches could have been responsible for providing access to the domain name management dashboard of the hacked celebrities email IDs, after which the attack would have followed the methodology described above by changing the MX records to a malicious system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jurisdictional issues&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The legal avenues available to the affected parties are fairly clear within the Information Technology Act, 2000 and the Indian Penal Code, 1862. Section 66 and Section 66C of the IT Act, which govern hacking and misuse of passwords respectively, would apply along with possible application of the provisions concerning mischief (Section 425), cheating (Section 420) and extortion (Section 383) of the IPC. However, recent investigations have already begun to show that the various jurisdictional symptoms that plague cybercrimes investigations are also hindering investigations for these hacks. The global nature of the internet ensures that the operating servers, attackers, compromised users and unwitting intermediaries are more often than not all located in different jurisdictions, each with their own set of protections, vulnerabilities and laws. For example, investigations by the Delhi police into IP addresses that accessed Gandhi’s Twitter account during the hack have shown that in the period of few hours the account was accessed from the US, Sweden, Canada, Thailand and Romania. Of course, given the pervasive availability of IP spoofing tools, none of these countries is indicative of the actual location of the hacker. Gaining information from these different servers, in order to trace a route of the hacker’s digital geographical journey, is a bureaucratic and legal nightmare with long delays, unanswered Mutual Legal Assistance Treaty requests and unresponsive service providers being the norm. Like in most cybercrime investigation, if the hackers take certain basic steps to mask their identities and geographical location, their odds being caught by traditional law enforcement are negligible. Investigations that have successfully managed to catch such hacker groups, such as the Project Safe Childhood by the FBI against child pornography on the Tor web, take millions of dollars, months of efforts and a high level of skill. Whether these Twitter hacks will generate the sustained, multijurisdictional effort across law enforcement agencies in India required to catch such crimes remains to be seen. Until then, the questions of attribution, liability and justice will remain unanswered like in a majority of large scale cyber hacks.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Possible measures&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given that various other targets have already been singled out by the hacker group, the need for vigilance and improved security is greater than ever. One basic measure, easily available within Twitter and most other services, that should be carried out is enabling two factor authentication (2FA) on both email and social media accounts.  2FA ensures that the user has to input a One Time Password (OTP) generated on a separate device (such as a mobile phone) at the time of logging in or resetting the password for the account. This would mean that even if the hackers obtain the password or compromise the emails being sent to an account, they will be unable to login into an account without also being in physical possession of the device with the OTP generation application. If this option, which is already available within Twitter, was enabled for the four accounts that were hacked, for example, they would have remained protected despite the email account compromise. Further, domain name service providers should also implement Domain Name System Security Extensions and Domain Keys Identified Mail to prevent DNS and email hijacking, as was carried out on Net4India servers in these Twitter attacks. Using HTTPS on all pages on websites will also go a long way in preventing spoofing and securing user information in transit. Finally, nothing can replace customer education and awareness as the most effective tool to combat the growing cyber threats faced by the average netizen. The weakest link in a digital system is often the end user. A core set of security measures that can be percolated into common practice will serve as the first and best line of defence against such attacks in the future, for both the common man and celebrities alike.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse'&gt;https://cis-india.org/internet-governance/blog/the-wire-udbhav-tiwari-december-15-2016-curious-case-of-poor-security-in-indian-twitterverse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>udbhav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-17T00:28:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame">
    <title>The Age of Shame</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame</link>
    <description>
        &lt;b&gt;The ability to capture private images is breeding a dangerous form of digital shaming. Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's column was &lt;a class="external-link" href="http://indianexpress.com/article/opinion/columns/the-age-of-shame/99/"&gt;published in the Indian Express&lt;/a&gt; on March 30, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One suggestion, and probably the most persuasive one, drawing from the Broadway musical Avenue Q, is that the internet was made for porn. Positing a competing argument is a clowder of cat lovers, who insist that the internet was made for cats. Or, at least, it is definitely made of cats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the first internet memes like LOL Cats (and then subsequently Grumpy Cat, Ceiling Cat and Hipster Kitty), which had pictures of cats used for strong social, cultural and political commentary, to Caturday — a practice where users on the Web’s largest unmoderated discussion board, 4Chan, post pictures of cats every Saturday — cats are everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to add to this list and suggest that the internet was meant for “shame”. With the explosion of the interactive Web, more people getting access to mobile computing devices, and more websites inviting users to write reviews, leak pictures, expose videos and reveal more personal and private information online, there seems to be no doubt that we live in the age of digital shaming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aesthetic, also embedded in peer-to-peer platforms like chatroulete, or snapchat, where people often engage in sexting, is also becoming common in popular media. The ability to spy, to capture private images and videos, and expose the people who violate some imagined moral code has dangerous implications for the future of the Web and our own private lives. And as more of it goes unpunished and gets naturalised in our everyday digital practices, it is time to realise that the titillation it offers through scandal is far outweighed by the growing stress and grief it causes to victims. While there are some values to public shaming that ask for more transparency and accountability, we need to reflect on how it is creating societies of shame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It sometimes emerges as an attempt to shame governments, private institutions, places of consumption, for compromise of the rights of the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anything, from denial of service and corruption in government offices to bad food and substandard goods in restaurants and malls, is now reported in an attempt to shame the people responsible for it. This kind of “citizen journalism” allows for individual voices and experiences to be heard and documented, and the people in question are forced to be accountable for their jobs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From fascinating websites like IPaidABribe.com to restaurant review sites like Zomato, we have seen an interesting phenomenon of “naming and shaming” that gives voice to individual discontent and anger. And so commonplace has this become, that most managers of different services and goods track, respond and mitigate the situation, often offering apologies and freebies to make up for that one bad experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most big organisations have Twitter handles that function in a similar way, addressing grievances of users in real time, and helping to deliver better services and products. It is a new era of granular accountability that ensures that individual acts of discrimination, neglect or just disservice get reported and have direct impact on those responsible for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other end of the spectrum of this call for transparent and accountable structures, is the phenomenon of shaming and cyber bullying that is also increasing, especially with digital natives who spend more time online. On social networking sites, it has become almost passé, for personal and sensitive information to be leaked in order to shame and expose a person’s weaknesses and vulnerabilities. Especially for young teens who might be in a disadvantaged position — for reasons of sexual orientation, location, practices or interests — the shaming through exposing their private information often creates extremely traumatic conditions, even leading people to take their lives.&lt;br /&gt;Shaming takes up particularly dire forms on websites and platforms that are designed to leak this kind of information. Hunter Moore, who has recently earned the title of being the most hated man on the internet, was the founder of a revenge-porn website, which invited male users to reveal sexual and embarrassing pictures of their former girlfriends and even spouses, to reveal them in compromising positions and shame them for being “sluts”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moore’s website has been shut down now and he is facing multiple charges of felony in the US, but that one site was just the tip of the iceberg. Slut shaming and trying to humiliate women has become a strong underground practice on the dark web. Hidden by anonymity and the security that the Web can sometimes offer, people betray the trust of their friends and lovers and expose them to be punished by voyeuristic audiences.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame'&gt;https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T04:05:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet">
    <title>Terror recruiters target Indians on internet</title>
    <link>https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet</link>
    <description>
        &lt;b&gt;What's in a name? If it indicates your religious identity, then you could get trolled by strangers wanting to draw you in with videos on the importance of archaic customs and doctored accounts of world history.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sandhya Soman was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Terror-recruiters-target-Indians-on-internet/articleshow/38565102.cms"&gt;published in the Times of India&lt;/a&gt; on July 18, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;City-based lawyer Shakeel Ahmed recently took one such bait on the Holocaust from a stranger on WhatsApp just to know what kind of propaganda is in circulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I can laugh at such videos and false images but they might confuse youngsters," says Ahmed. Online baiting to lure sympathizers and recruits by seasoned extremists has been on the police radar. If the four youngsters from Thane and Kalyan are indeed now in Iraq fighting for the Islamic militia ISIS, then a good part of their indoctrination could have happened online, say experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISIS is known to have an aggressive social media policy, including an Arabic-language Twitter app, to spread their message and recruit supporters even after the Iraqi government curtailed internet in areas captured by the group recently. "There are many websites, including jihadi ones, favoured by people with extremist leanings," says Anti-Terrorism Squad (ATS) chief Himanshu Roy. Often, the initial contact is made on social networking sites and messenger services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The organizations spot youngsters and befriend them before inviting the trusted select to closed chat rooms," says K P Raghuvanshi, senior police official and former ATS head.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion ranges from arranging finance to direct involvement, says Roy. "We have reason to believe that these four boys, who are all educated and come from reasonably well-off families, would have visited such sites and exchanged views with others," he says, refusing to elaborate. The youngsters are supposed to have been in touch with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those without a wide social network are easy targets, says Sunil Abraham, executive director of Centre for Internet and Society, a research organization. "If, as a young Muslim, you are in touch with only your friends and family, you might believe the false information that enters your circle of trust," he says. Contrary to belief, you don't meet a variety of people on social media. "Unless you have a critical understanding of internet, the medium with its interactivity and multi-media potential could aid propaganda," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was terrorist group Al-Qaeda that started using technology effectively since 2001. Its supporters came together to upload good quality videos of beheadings and suicide bombings to grab attention. Now, there is a variety of 'jihadist' software to prevent detection, whether it is a plug-in for instant messaging service, encryption for text messages or a stealth online network, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, terrorists took to technology in a big way from 2008 onwards when Indian groups like Indian Mujahideen recruited educated people, says an official. "Even a man who didn't know English, learnt to type Hindi using English alphabets and send and receive attachments," says the officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While officials say that it is difficult to monitor all the online activity, Roy says that ATS will tackle it. "This is the first instance of youngsters from Maharashtra going out to fight some other war," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet'&gt;https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-18T06:57:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information">
    <title>Tech companies like Gmail, WhatsApp may be asked to store user information</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information</link>
    <description>
        &lt;b&gt;The government is moving to formulate rules that will require technology ‘intermediaries’— including email services like Gmail, chat apps such as WhatsApp and Snapchat or even ecommerce firms like Amazon — to retain user information, a development that is expected to be met with determined opposition.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://economictimes.indiatimes.com/tech/ites/tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information/articleshow/54839888.cms"&gt;published in Economic Times&lt;/a&gt; on October 14, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;What the government is looking to do now is draft rules for Section 67C of the Information Technology Act, and this will be done by a committee that has been set up for the purpose. The rules — whose drafting has been waiting since 2008 — will spell out what type of data has to be stored, in which format, and for how long, according to three members of the newly-formed committee. All this so that law-enforcement agencies can access the information if they need it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sharing of information between foreign firms and the Indian government has been a contentious issue, and experts said the mandate may be impossible to implement for firms such as WhatsApp that promise end-to-end encryption. Or for Snapchat – a chat app where messages disappear within seconds and are not even stored on the company’s servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firms may also oppose the diktat, especially since most of them are not governed by Indian laws and also due to the high cost of data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="gwt-Image" src="http://img.etimg.com/photo/54839953/.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee is headed by additional secretary in the ministry of electronics and IT (MEITY), Ajay Kumar, and has one representative each from the ministry of home affairs, department of telecom, department of personnel and training, Nasscom, Internet Service Provider Association of India (ISPAI), along with an advocate specialising in cyber law and a few officers from MEITY. The first meeting of the committee took place in the last week of September.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is a fairly complex issue, compounded by the general lack of understanding of mobile apps and over the top service providers,” said a person on the committee who did not wish to be identified. This person said that most technology players are based in the United States and they have always been at loggerheads about sharing of information with the government. “Even if it is for national security reasons, how much are these companies answerable to the Indian security establishment? And we do know how Apple refused to unlock the phone even for FBI."&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Google and Facebook did not respond to requests for comment.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div&gt;&lt;b&gt;‘Huge balancing act’&lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court lawyer and cyber law expert Pavan Duggal said the section has been drafted in very “broad” terms and the move may be driven by the realisation that these companies are huge data repositories – some of which might be relevant to law enforcement investigations. “It will have to be a huge balancing act and will be interesting to see what this committee decides,” added Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Section 67C refers to the obligation of the service providers to retain information, the nature of the data to be retained and the time period is not specified. Companies which do not comply with the law can be levied fine and its officers sent to jail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another member on the committee said the ambit of this task is huge. “In the last meeting we argued that the rules should be the same for everybody and there should be no differential treatment for foreign companies such as Google or Microsoft,” he said. This person said that ambiguity is rampant as various government arms have different sets of rules for data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the Department of Telecommunications (DoT) asks for data to be stored for six months, while the Registrar of Companies mandates some information to be retained for one year while the income-tax rules mandate data storage for six-seven years. “There has only been one meeting so far. It is a long procedure and will require several rounds of consultation,” said a third person on the committee.&lt;/p&gt;
&lt;p&gt;Privacy  activists like Pranesh Prakash of the Centre for Internet and Society  said that one of the principles that’s frequently cited while discussing  international practices on surveillance is that data retention should  not be required of service providers.&lt;/p&gt;
&lt;p&gt;And internationally too, there is no standard on this issue. “There were norms at the European Union-level regarding data retention, but they were struck down in 2014 by the European Court of Justice as being violative of human rights,” he said.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information'&gt;https://cis-india.org/internet-governance/news/economic-times-october-14-2016-surabhi-agarwal-tech-companies-like-gmail-whatsapp-may-be-asked-to-store-user-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-14T01:12:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case">
    <title>Tamil Nadu likely to hold Facebook accountable for suicide case</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case</link>
    <description>
        &lt;b&gt;The recent suicide of a 21-year-old woman from Salem district in Tamil Nadu over her morphed pictures being uploaded on Facebook could turn into a flash-point between the state police and the world's most-popular social networking site.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by V. Prem Shanker was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case/articleshow/53182832.cms"&gt;published in the Economic Times&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"We are exploring the possibility of holding Facebook accountable for the delay in responding to our requests since that was one of the factors which led to the young lady committing suicide," Salem superintendent of police Amit Kumar Singh told ET in an exclusive interaction. On June 23, the Salem police had received a complaint from the father of the 21-year-old stating that someone had uploaded her morphed nude pictures on Facebook. The father had requested the police to get the photographs removed from the site and also find and warn the perpetrator.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The police recorded the complaint the same evening and later sent what is called a 'Law Enforcement Online Request' to Facebook asking for details of the IP address from which the morphed photographs were uploaded on the website. Officials also requested Facebook to take down the objectionable photographs of the young woman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five days after the request was sent, Facebook responded with the IP address on June 28 and within 12 hours after that the police cracked the case and nabbed the suspect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all this was a bit too late because the previous day, on June 27, the young woman had ended her life. Her morphed nude photographs were taken down only on the day of her death, according to the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Apart from addressing Facebook, we also investigated the case from other angles but couldn't make headway. Thus, there was nothing we could do about the pictures still being online apart from waiting for Facebook to act," Singh said, adding "enforcement of compliance is a matter of grave concern."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials are considering charging Facebook with abetment to suicide and including Facebook in the chargesheet if the site is found culpable after investigations. However, the state police is said to be discussing with legal experts on how this can be done as there is no precedent for a website having been charged in a crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook did not reply to an email seeking comment. Earlier in a communique, responding to criticisms of police inaction in this case, Singh had pointed out that "Only Facebook can block a page and it exercises this discretion as per its Facebook Community Standards and not the law of the land it is being viewed in. Facebook does not provide the police with any special powers to take down a page even if the police receive a cognizable complaint of identity theft and uploading of obscene content. There is no tool available, at least as of now, with the police to coerce or goad Facebook to act expeditiously even if the matter is very urgent and there is a flagrant violation of Indian law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts point out that the disparity with which Facebook treats child abuse laws and copyright infringements as opposed to violation of women's rights is stark.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Look at the war against child pornography. In the United Kingdom there is an independent foundation that has immunity under UK child pornography law. They generate a database and circulate it across all platforms and ensure that it is kept absolutely squeaky clean," points out Sunil Abraham, executive director of Bengaluru based research organisation, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There definitely needs to be a law to ensure that such platforms do not violate the law of the land, especially when it comes to women's rights. But in interim, the government can create an information escrow or a platform where the victims can place on record their problems and it is there for these sites to see and take action," Abraham added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case'&gt;https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T13:44:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents">
    <title>Talking Point: Futile Battle Against Torrents</title>
    <link>https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to Deccan Herald to clear the air about rumours surrounding a jail threat for those logging on to Torrent sites. &lt;/b&gt;
        &lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/kdFsAXkbOxE" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This was originally published by Deccan Herald on August 30, 2016&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents'&gt;https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-01T14:36:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
