<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/gender-health-surveillance-in-india-panel-discussion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/social-media-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rethinking-acquisition-of-digital-devices-by-law-enforcement-agencies"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it">
    <title>How Aadhaar compromises privacy? And how to fix it?</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it</link>
    <description>
        &lt;b&gt;Aadhaar is mass surveillance technology. Unlike targeted surveillance which is a good thing, and essential for national security and public order – mass surveillance undermines security. And while biometrics is appropriate for targeted surveillance by the state – it is wholly inappropriate for everyday transactions between the state and law abiding citizens. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was published in the &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/is-aadhaar-a-breach-of-privacy/article17745615.ece"&gt;Hindu&lt;/a&gt; on March 31, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When assessing a technology, don't ask - “what use is it being put to today?”. Instead, ask “what use can it be put to tomorrow and by whom?”. The original noble intentions of the Aadhaar project will not constrain those in the future that want to take full advantage of its technological possibilities.  However, rather than frame the surveillance potential of Aadhaar in a negative tone as three problem statements - I will propose three modifications to the project that will reduce but not eliminate its surveillance potential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Shift from biometrics to smart cards:&lt;/b&gt;&lt;span&gt; In January 2011, the Centre for Internet and Society had written to the parliamentary finance committee that was reviewing what was then called the “National Identification Authority of India Bill 2010”. We provided nine reasons for the government to stop using biometrics and instead use an open smart card standard. Biometrics allows for identification of citizens even when they don't want to be identified. Even unconscious and dead citizens can be identified using biometrics. Smart cards, on the other hand, require pins and thus citizens' conscious cooperation during the identification process. Once you flush your smart cards down the toilet nobody can use them to identify you. Consent is baked into the design of the technology. If the UIDAI adopts smart cards, we can destroy the centralized database of biometrics just like the UK government did in 2010 under Theresa May's tenure as Home Secretary. This would completely eliminate the risk of foreign governments, criminals and terrorists using the biometric database to remotely, covertly and non-consensually identify Indians.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Destroy the authentication transaction database:&lt;/b&gt;&lt;span&gt; The Aadhaar Authentication Regulations 2016 specifies that transaction data will be archived for five years after the date of the transaction. Even though the UIDAI claims that this is a zero knowledge database from the perspective of “reasons for authentication”, any big data expert will tell you that it is trivial to guess what is going on using the unique identifiers for the registered devices and time stamps that are used for authentication.  That is how they put Rajat Gupta and Raj Rajratnam in prison. There was nothing in the payload ie. voice recordings of the tapped telephone conversations – the conviction was based on meta-data. Smart cards based on open standards allow for decentralized authentication by multiple entities and therefore eliminate the need for a centralized transaction database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prohibit the use of Aadhaar number in other databases:&lt;/b&gt;&lt;span&gt; We must, as a nation, get over our obsession with Know Your Customer [KYC] requirements. For example, for SIM cards there is no KYC requirement is most developed countries. Our insistence on KYC has only resulted in retardation of Internet adoption, a black market for ID documents and unnecessary wastage of resources by telecom companies. It has not prevented criminals and terrorists from using phones. Where we must absolutely have KYC for the purposes of security, elimination of ghosts and regulatory compliance – we must use a token issued by UIDAI instead of the Aadhaar number itself. This would make it harder for unauthorized parties to combine databases while at the same time, enabling law enforcement agencies to combine databases using the appropriate authorizations and infrastructure like NATGRID. The NATGRID, unlike Aadhaar, is not a centralized database. It is a standard and platform for the express assembly of sub-sets of up to 20 databases which is then accessed by up to 12 law enforcement and intelligence agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To conclude, even as a surveillance project – Aadhaar is very poorly designed. The technology needs fixing today, the law can wait for tomorrow.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it'&gt;https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-01T07:00:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology">
    <title>Communication Rights in the Age of Digital Technology </title>
    <link>https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a conference to discuss the evolution of privacy and surveillance in India on Friday, October 30, 2015 at Deck Suite Hall, 5th Floor, Habitat Centre, Lodhi Road, Near Air Force Bal Bharti School, New Delhi - 110003, from 11 a.m. to 5 p.m.&lt;/b&gt;
        &lt;p&gt;The conference will be conducted in a round-table format. Topics to be discussed shall include, among others, the Human DNA Profiling Bill, 2012, the PIL questioning the data collection under the UID scheme, the draft National Encryption Policy and the Supreme Court judgement in Shreya Singhal v. Union of India, in the context of privacy and surveillance in India. The conference will be a forum for discussion, knowledge exchange and agenda building.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Background Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the Right to Privacy has been interpreted to mean an individuals’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. Since the 1960s, the Apex Court has been dealing with this issue, primarily with respect to privacy being recognised as a fundamental or common law right and the standards that need to be satisfied in order to impose any restrictions on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2012, the Planning Commission constituted a Group of Experts under the chairmanship of Justice AP Shah, Former Chief Justice of the Delhi High Court to recommend a &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;potential privacy framework&lt;/a&gt; for  privacy in India. Previously in 2011 the Department of Personnel and Training had prepared a &lt;a href="https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;draft Bill on Right to Privacy &lt;/a&gt;which has yet to materialize into a comprehensive legislation on privacy. In 2014, a version of the revised Right to Privacy Bill was &lt;a href="http://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;leaked&lt;/a&gt;. Amendments to the Bill  aim to protect individuals against misuse of their data by the government or private agencies, and is in the process of being &lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;finalized by the Indian Government&lt;/a&gt;&lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;. &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. For example, DeitY introduced a draft National Encryption Policy in September this year to prescribe methods for encryption. However, the policy would have posed significant restriction on the ability of citizens to encrypt online communication. Backlash from the citizens, industry, social media and privacy experts led the Government to withdraw  the policy as the measures included made the information system vulnerable in every sense.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the Apex Court gave a &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt;historical&lt;/a&gt;&lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; judgement&lt;/a&gt; by striking down section 66A of the IT (Amendment) Act 2008. The Court upheld section 69A and the Information Technology  (Procedure &amp;amp; Safeguards for Blocking for Access of Information by Public) Rules 2009 to be constitutionally valid, which accords the government with the authority to block transmission of information and websites when it deems it as necessary for reasons like sovereignty and integrity of India, public order, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another government initiative which has generated considerable controversy for its threat to privacy is the UID project which aims to issue a unique identification number to all citizens by the Unique Identification Authority of India, which can be authenticated and verified online. In August this year, the Supreme Court, &lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt;vide an interim order&lt;/a&gt;, restricted the use of Aadhaar by declaring it to be optional for availing government benefits and services. Though the Government contended the right to privacy as a fundamental right in India, the Court deferred this issue to a larger Constitutional Bench, and the Supreme Court upheld its decision yet again in the month of October.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the &lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;d&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;raft&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt; Human DNA &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;P&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;rofiling &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;B&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;ill 2015&lt;/a&gt; is being questioned on grounds of privacy invasion on  a massive scale as it aims to collect and store the DNA samples of criminals, suspects, volunteers, and victims and regulate DNA laboratories and DNA sampling for use by law enforcement agencies. The Bill also fails to include comprehensive privacy safeguards and provisions regarding collection of DNA samples with or without the consent of an individual, making individual privacy an important concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by these ongoing debates, one can say that Privacy as a right has primarily evolved by way of judicial interpretation and continues to evolve in light of several controversial Government policies, projects and schemes. However its development is often undermined by tension between several competing national interests which calls for clear guidelines to protect this inviolable right of the citizens.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf" class="internal-link"&gt; 
&lt;hr /&gt;
&lt;b&gt;Download the Invite&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology'&gt;https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-24T07:45:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon">
    <title>Counter Surveillance Panel: DiscoTech &amp; Hackathon</title>
    <link>https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon</link>
    <description>
        &lt;b&gt;We invite you to a Counter Surveillance DiscoTech and Hackathon at the Centre for Internet and Society in Bangalore on Saturday, March 1, 2014 (9.00 a.m. to 5.00 p.m.). The event is being co-organized by the Centre for Internet and Society in tandem with the MIT Centre for Civic Media Co-Design Lab, with support from members of Tactical Technology Collective, Hackteria.org and Srishti School of Art Design and Technology. Registrations begin at 9.00 a.m. The event shall close with a featured talk by renown information activist and maker lab innovator Smari McCarthy, titled "Privacy for Humanity" at 5.00 p.m.&lt;/b&gt;
        &lt;h2&gt;Overview&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Mirroring the call by MIT Civic Media Lab &lt;a href="http://codesign.mit.edu/discotechs/"&gt;Co-Design Studio&lt;/a&gt;, this event brings together  students, technologists, designers and citizens to explore counter-surveillance strategies. The event will be held simultaneously across various locations including Boston, Palestine, Lisbon and Buenos Aires. Click here for the definition of &lt;a href="http://codesign.mit.edu/discotechs/"&gt;DiscoTech&lt;/a&gt;.(Discovering Technology)&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;p class="Default" style="text-align: justify; "&gt;We shall begin with brief contextualized introductions catalyzed by researchers in the field of privacy &amp;amp; surveillance, followed by workshops and hackathons led by expert practitioners. Participants are welcome from diverse backgrounds looking to be involved in designing engaging and creative ways to counter surveillance. The event shall close with a featured talk by renown information activist and maker lab innovator &lt;a href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt;&lt;b&gt;Smari McCarthy&lt;/b&gt;&lt;/a&gt; , titled "&lt;b&gt;Privacy for Humanity&lt;/b&gt;" at 5.00 p.m.&lt;/p&gt;
&lt;h3 class="Default" style="text-align: justify; "&gt;Introductory Catalyst Sessions&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Malavika Jayaram&lt;/b&gt;: Fellow at &lt;a class="external-link" href="http://cyber.law.harvard.edu/people/mjayaram"&gt;Berkman Center for Internet and Society at Harvard University&lt;/a&gt; and the &lt;a class="external-link" href="http://www.cis-india.org/"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Laird Brown&lt;/b&gt;: DesiSec Project at the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt; and University of Toronto&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Kaustubh Srikant&lt;/b&gt;: Head of Technology, &lt;a class="external-link" href="https://tacticaltech.org/kaustubh-srikanth-head-technology"&gt;Tactical Technology Collective&lt;/a&gt; and &lt;b&gt;Maya Indira Ganesh&lt;/b&gt; (Program Director)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Abhay Raj Naik&lt;/b&gt;: Assistant Professor,&lt;a class="external-link" href="http://www.azimpremjiuniversity.edu.in/abhayraj-naik"&gt; Azim Premji University&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Design and Hackathon Lead Catalysts&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt;Yashas&lt;/b&gt;&lt;/a&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt; &lt;/b&gt;&lt;/a&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt;Shetty&lt;/b&gt;&lt;/a&gt;:Faculty@ &lt;a href="http://www.srishti.ac.in/"&gt;www.srishti.ac.in&lt;/a&gt; and Co-Founder &lt;a href="http://www.hackteria.org/"&gt;Hackteria.org&lt;/a&gt; (DNA Spoofing, Surveillance Camera:  Avoidance, Microscopic Re-Appropriation &amp;amp; Bacterial Discotheque)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Hari Dilip Kumar&lt;/b&gt;: Co, Founder, &lt;a class="external-link" href="http://www.fluxgentech.com/people"&gt;FluxGen&lt;/a&gt;: (Introducing data transmission protocols, Software Defined Radio (SDR) design and surveillance detection )&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Sharath Chandra Ram&lt;/b&gt;: Researcher @ CIS &lt;a class="external-link" href="http://dorkbot.org/dorkbotbangalore/"&gt;Open Lab&lt;/a&gt; and Faculty@&lt;a class="external-link" href="http://www.srishti.ac.in/"&gt;Srishti&lt;/a&gt; (Civic Media solutions using open citizen networks and the web, spectrum scanning, visual communication design strategies, finger print mash-up publishing) &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Featured Talk and Interactive Closing Session by &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt;Smari McCarthy&lt;/a&gt;&lt;b&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt; &lt;/a&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(Executive Director, International Modern Media Institute and Founder, Icelandic Pirate Party &amp;amp; Icelandic Digital Freedom Society)&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;b&gt;Title of Talk: PRIVACY for HUMANITY - 5.00 p.m.&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"&gt;Click to download the flyer invite&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Date: Saturday, March 1, 2014&lt;br /&gt;Time: 9.00 a.m. to 5.00 p.m. (Registration 9.00 a.m. sharp)&lt;br /&gt;Venue: Centre for Internet and Society, Bangalore&lt;br /&gt;Map : &lt;a href="http://bit.ly/1fcDDLG"&gt;http://&lt;/a&gt;&lt;a href="http://bit.ly/1fcDDLG"&gt;bit.ly&lt;/a&gt;&lt;a href="http://bit.ly/1fcDDLG"&gt;/1fcDDLG&lt;/a&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;a href="mailto:sharath@cis-india.org"&gt;&lt;br /&gt;&lt;/a&gt;&lt;i&gt;Please RSVP due to limited space and logistics for lunch and refreshments&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon'&gt;https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-28T05:36:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies">
    <title>Spreadsheet data on sample of 50 security companies</title>
    <link>https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies'&gt;https://cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-02-28T16:13:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet">
    <title>Are we Losing the Right to Privacy and Freedom of Speech on Indian Internet?</title>
    <link>https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet</link>
    <description>
        &lt;b&gt;The article was published in DNA on March 10, 2016.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Last month, it was reported that National Security Council Secretariat (NSCS) had proposed the &lt;a href="http://www.dnaindia.com/scitech/report-watch-what-you-post-soon-govt-to-install-media-cell-to-track-counter-negative-content-online-2181460"&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;setting up of a National Media Analytics Centre&lt;/span&gt;&lt;/strong&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/a&gt;(NMAC).  This centre’s mandate would be to monitor blogs, media channels, news  outlets and social media platforms. Sources were quoted as stating that  the centre would rely upon a tracking software built by Ponnurangam  Kumaraguru, an Assistant Professor at the Indraprastha Institute of  Information Technology in Delhi. The NMAC seems to mirror other similar  efforts in countries such as &lt;strong&gt;&lt;a rel="nofollow" href="https://www.govtrack.us/congress/bills/114/hr3654/text" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;US&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;, &lt;strong&gt;&lt;a rel="nofollow" href="https://www.thestar.com/news/canada/2013/11/29/social_media_to_be_monitored_by_federal_government.html" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Canada&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;, &lt;strong&gt;&lt;a rel="nofollow" href="http://www.smh.com.au/technology/technology-news/data-retention-and-the-end-of-australians-digital-privacy-20150827-gj96kq.html" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Australia&lt;/span&gt;&lt;/a&gt;&lt;a rel="nofollow" href="http://www.smh.com.au/technology/technology-news/data-retention-and-the-end-of-australians-digital-privacy-20150827-gj96kq.html" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;and &lt;strong&gt;&lt;a rel="nofollow" href="http://www.independent.co.uk/news/uk/politics/government-awards-contracts-to-monitor-social-media-and-give-whitehall-real-time-updates-on-public-10298255.html" target="_blank"&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;UK&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;,  to monitor online content for the reasons as varied as prevention of  terrorist activities, disaster relief and criminal investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NSCS, the parent body that this centre will fall under, is a part of the National Security Council, India’s highest agency looking to integrate policy-making and intelligence analysis, and advising the Prime Minister’s Office on strategic issues as well as domestic and international threats. The NSCS represents the Joint Intelligence Committee and its duties include the assessment of intelligence from the Intelligence Bureau, Research and Analysis Wing (R&amp;amp;AW) and Directorates of Military, Air and Naval Intelligence, and the coordination of the functioning of intelligence agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From limited reports available, it appears that the tracking software used by NMAC will generate tags to classify post and comments on social media into negative, positive and neutral categories, paying special attention to “belligerent” comments. The reports say that the software will also try to determine if the comments are factually correct or not. The idea of a government agency systematically tracking social media, blogs and news outlets and categorising content as desirable and undesirable is bound to create a chilling effect on free speech online. The most disturbing part of the report suggested that the past pattern of writers’ posts would be analysed to see how often her posts fell under the negative category, and whether she was attempting to create trouble or disturbance, and appropriate feedback would be sent to security agencies based on it. Viewed alongside the recent events where actors critical of the government and holding divergent views have expressed concerns about attempts to suppress dissenting opinions, this initiative sounds even more dangerous, putting at risk individuals categorised as “negative” or “belligerent”, for exercising their constitutionally protected right to free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_FB.jpg" alt="FB" class="image-inline" title="FB" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Getty Images&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been argued that the Internet is a public space, and should be treated as subject to monitoring by the government as any other space. Further, this kind of analysis does not concern itself with private communication between two or more parties but only with publicly available information. Why must we raise eyebrows if the government is accessing and analysing it for the purposes of legitimate state interests? There are two problems with this argument. First, any surveillance of communication must always be limited in scope, specific to individuals, necessary and proportionate, and subject to oversight. There are no laws passed by the Parliament in India which allow for mass surveillance measures. Such activities are being conducted through bodies like NSC which came into existence through an Executive Order and have no clear oversight mechanisms built into its functioning. A quick look at the history of intelligence and surveillance agencies in India will show that none of them have been created through a legislation. A host of surveillance agencies have come up in the last few years including the Central Monitoring System, which was set up to monitor telecommunications, and the absence of legislative pedigree translates into lack of appropriate controls and safeguards, and zero public accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second and the larger issue is that the scale and level of granularity of personal information available now is unprecedented. Earlier, our communications with friends and acquaintances, our movements, our association, political or otherwise, were not observable in the manner it is today. It would be remiss to underestimate the importance of personal information merely because it exists in the public domain. The ability to act without being subject to monitoring and surveillance is key to the right to free speech and expression. While we accept the importance of free speech and the value of an open internet and newer technologies to enable it, we do not give sufficient importance to how these technologies are affecting the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweets.jpg" alt="Tweets" class="image-inline" title="Tweets" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Getty Images&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last few years, the social media scene in India has been characterised by extreme polemic with epithets such as ‘bhakt’, ‘sanghi’, ‘sickular’ and ‘presstitutes’ thrown around liberally, turning political discussions into a mess of ugliness. It remains to be seen whether the NMAC intends to deal with the professional trolls who rely on a barrage of abuse to disrupt public conversations online. However, the appropriate response would not be greater surveillance, let alone a body like NMAC, with a sweeping mandate and little accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Link to the original &lt;a class="external-link" href="http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet'&gt;https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T14:44:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india">
    <title>Data Infrastructures and Inequities: Why Does Reproductive Health Surveillance in India Need Our Urgent Attention?</title>
    <link>https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india</link>
    <description>
        &lt;b&gt;In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article by Aayush Rathi and Ambika Tandon posits health monitoring as surveillance and not merely as a “data problem.” Casting a critical feminist lens, the historicity of surveillance practices unveils the gendered power differentials wedded into taken-for-granted “benign” monitoring processes. The unpacking of the Mother and Child Tracking System and the National Health Stack reveals the neo-liberal aspirations of the Indian state. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The article was first published by &lt;a href="https://www.epw.in/engage/article/data-infrastructures-inequities-why-does-reproductive-health-surveillance-india-need-urgent-attention" target="_blank"&gt;EPW Engage, Vol. 54, Issue No. 6&lt;/a&gt;, on 9 February 2019.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Framing Reproductive Health as a Surveillance Question&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The approach of the postcolonial Indian state to healthcare has been Malthusian, with the prioritisation of family planning and birth control (Hodges 2004). Supported by the notion of socio-economic development arising out of a “modernisation” paradigm, the target-based approach to achieving reduced fertility rates has shaped India’s reproductive and child health (RCH) programme (Simon-Kumar 2006).&lt;/p&gt;
&lt;p&gt;This is also the context in which India’s abortion law, the Medical Termination of Pregnancy (MTP) Act, was framed in 1971, placing the decisional privacy of women seeking abortions in the hands of registered medical practitioners. The framing of the MTP act invisibilises females seeking abortions for non-medical reasons within the legal framework. The exclusionary provisions only exacerbated existing gaps in health provisioning, as access to safe and legal abortions had already been curtailed by severe geographic inequalities in funding, infrastructure, and human resources. The state has concomitantly been unable to meet contraceptive needs of married couples or reduce maternal and infant mortality rates in large parts of the country, mediating access along the lines of class, social status, education, and age (Sanneving et al 2013).&lt;/p&gt;
&lt;p&gt;While the official narrative around the RCH programme transitioned to focus on universal access to healthcare in the 1990s, the target-based approach continues to shape the reality on the ground. The provision of reproductive healthcare has been deeply unequal and, in some cases, in hospitals. These targets have been known to be met through the practice of forced, and often unsafe, sterilisation, in conditions of absence of adequate provisions or trained professionals, pre-sterilisation counselling, or alternative forms of contraception (Sama and PLD 2018). Further, patients have regularly been provided cash incentives, foreclosing the notion of free consent, especially given that the target population of these camps has been women from marginalised economic classes in rural India.&lt;/p&gt;
&lt;p&gt;Placing surveillance studies within a feminist praxis allows us to frame the reproductive health landscape as more than just an ill-conceived, benign monitoring structure. The critical lens becomes useful for highlighting that taken-for-granted structures of monitoring are wedded with power differentials: genetic screening in fertility clinics, identification documents such as birth certificates, and full-body screeners are just some of the manifestations of this (Adrejevic 2015). Emerging conversations around feminist surveillance studies highlight that these data systems are neither benign nor free of gendered implications (Andrejevic 2015). In continual remaking of the social, corporeal body as a data actor in society, such practices render some bodies normative and obfuscate others, based on categorisations put in place by the surveiller.&lt;/p&gt;
&lt;p&gt;In fact, the history of surveillance can be traced back to the colonial state where it took the form of systematic sexual and gendered violence enacted upon indigenous populations in order to render them compliant (Rifkin 2011; Morgensen 2011). Surveillance, then, manifests as a “scientific” rationalisation of complex social hieroglyphs (such as reproductive health) into formats enabling administrative interventions by the modern state. Lyon (2001) has also emphasised how the body emerged as the site of surveillance in order for the disciplining of the “irrational, sensual body”—essential to the functioning of the modern nation-state—to effectively happen.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Questioning the Information and Communications Technology for Development (ICT4D) and Big Data for Development (BD4D) Rhetoric&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Information and Communications Technology (ICT) and data-driven approaches to the development of a robust health information system, and by extension, welfare, have been offered as solutions to these inequities and exclusions in access to maternal and reproductive healthcare in the country.&lt;/p&gt;
&lt;p&gt;The move towards data-driven development in the country commenced with the introduction of the Health Management Information System in Andhra Pradesh in 2008, and the Mother and Child Tracking System (MCTS) nationally in 2011. These are reproductive health information systems (HIS) that collect granular data about each pregnancy from the antenatal to the post-natal period, at the level of each sub-centre as well as primary and community health centre. The introduction of HIS comprised cross-sectoral digitisation measures that were a part of the larger national push towards e-governance; along with health, thirty other distinct areas of governance, from land records to banking to employment, were identified for this move towards the digitalised provisioning of services (MeitY 2015).&lt;/p&gt;
&lt;p&gt;The HIS have been seen as playing a critical role in the ecosystem of health service provision globally. HIS-based interventions in reproductive health programming have been envisioned as a means of: (i) improving access to services in the context of a healthcare system ridden with inequalities; (ii) improving the quality of services provided, and (iii) producing better quality data to facilitate the objectives of India’s RCH programme, including family planning and population control. Accordingly, starting 2018, the MCTS is being replaced by the RCH portal in a phased manner. The RCH portal, in areas where the ANMOL (ANM Online) application has been introduced, captures data real-time through tablets provided to health workers (MoHFW 2015).&lt;/p&gt;
&lt;p&gt;A proposal to mandatorily link the Aadhaar with data on pregnancies and abortions through the MCTS/RCH has been made by the union minister for Women and Child Development as a deterrent to gender-biased sex selection (Tembhekar 2016). The proposal stems from the prohibition of gender-biased sex selection provided under the Pre-Conception and Pre-Natal Diagnostics Techniques (PCPNDT) Act, 1994. The approach taken so far under the PCPNDT Act, 2014 has been to regulate the use of technologies involved in sex determination. However, the steady decline in the national sex ratio since the passage of the PCPNDT Act provides a clear indication that the regulation of such technology has been largely ineffective. A national policy linking Aadhaar with abortions would be aimed at discouraging gender-biased sex selection through state surveillance, in direct violation of a female’s right to decisional privacy with regards to their own body.&lt;/p&gt;
&lt;p&gt;Linking Aadhaar would also be used as a mechanism to enable direct benefit transfer (DBT) to the beneficiaries of the national maternal benefits scheme. Linking reproductive health services to the Aadhaar ecosystem has been critiqued because it is exclusionary towards women with legitimate claims towards abortions and other reproductive services and benefits, and it heightens the risk of data breaches in a cultural fabric that already stigmatises abortions. The bodies on which this stigma is disproportionately placed, unmarried or disabled females, for instance, experience the harms of visibility through centralised surveillance mechanisms more acutely than others by being penalised for their deviance from cultural expectations.&amp;nbsp; This is in accordance with the theory of "data extremes,” wherein marginalised communities are seen as&amp;nbsp; living on the extremes of&amp;nbsp; data capture, leading to a data regime that either refuses to recognise them as legitimate entities or subjects them to overpolicing in order to discipline deviance (Arora 2016). In both developed and developing contexts, the broader purpose of identity management has largely been to demarcate legitimate and illegitimate actors within a population, either within the framework of security or welfare.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Potential Harms of the Data Model of Reproductive Health Provisioning&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Informational privacy and decisional privacy are critically shaped by data flows and security within the MCTS/RCH. No standards for data sharing and storage, or anonymisation and encryption of data have been implemented despite role-based authentication (NHSRC and Taurus Glocal 2011). The risks of this architectural design are further amplified in the context of the RCH/ANMOL where data is captured real-time. In the absence of adequate safeguards against data leaks, real-time data capture risks the publicising of reproductive health choices in an already stigmatised environment. This opens up avenues for further dilution of autonomy in making future reproductive health choices.&lt;/p&gt;
&lt;p&gt;Several core principles of informational privacy, such as limitations regarding data collection and usage, or informed consent, also need to be reworked within this context.&lt;sup&gt;[1]&lt;/sup&gt; For instance, the centrality of the requirement of “free, informed consent” by an individual would need to be replaced by other models, especially in the context of reproductive health of&amp;nbsp; rape survivors who are vulnerable and therefore unable to exercise full agency. The ability to make a free and informed choice, already dismantled in the context of contemporary data regimes, gets further precluded in such contexts. The constraints on privacy in decisions regarding the body are then replicated in the domain of reproductive data collection.&lt;/p&gt;
&lt;p&gt;What is uniform across these digitisation initiatives is their treatment of maternal and reproductive health as solely a medical event, framed as a data scarcity problem. In doing so, they tend to amplify the understanding of reproductive health through measurable indicators that ignore social determinants of health. For instance, several studies conducted in the rural Indian context have shown that the degree of women’s autonomy influences the degree of usage of pregnancy care, and that the uptake of pregnancy care was associated with village-level indicators such as economic development, provisioning of basic infrastructure and social cohesion. These contextual factors get overridden in pervasive surveillance systems that treat reproductive healthcare as comprising only of measurable indicators and behaviours, that are dependent on individual behaviour of practitioners and women themselves, rather than structural gaps within the system.&lt;/p&gt;
&lt;p&gt;While traditionally associated with state governance, the contemporary surveillance regime is experienced as distinct from its earlier forms due to its reliance on a nexus between surveillance by the state and private institutions and actors, with both legal frameworks and material apparatuses for data collection and sharing (Shepherd 2017). As with historical forms of surveillance, the harms of contemporary data regimes accrue disproportionately among already marginalised and dissenting communities and individuals. Data-driven surveillance has been critiqued for its excesses in multiple contexts globally, including in the domains of predictive policing, health management, and targeted advertising (Mason 2015). In the attempts to achieve these objectives, surveillance systems have been criticised for their reliance on replicating past patterns, reifying proximity to a hetero-patriarchal norm (Haggerty and Ericson 2000). Under data-driven surveillance systems, this proximity informs the preexisting boxes of identity for which algorithmic representations of the individual are formed. The boxes are defined contingent on the distinct objectives of the particular surveillance project, collating disparate pieces of data flows and resulting in the recasting of the singular offline self into various 'data doubles' (Haggerty and Ericson 2000). Refractive, rather than reflective, the data doubles have implications for the physical, embodied life of individual with an increasing number of service provisioning relying on the data doubles (Lyon 2001). Consider, for instance, apps on menstruation, fertility, and health, and wearables such as fitness trackers and pacers, that support corporate agendas around what a woman’s healthy body should look, be or behave like (Lupton 2014). Once viewed through the lens of power relations, the fetishised, apolitical notion of the data “revolution” gives way to what we may better understand as “dataveillance.”&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Towards a Networked State and a Neo-liberal Citizen&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Following in this tradition of ICT being treated as the solution to problems plaguing India’s public health information system, a larger, all-pervasive healthcare ecosystem is now being proposed by the Indian state (NITI Aayog 2018). Termed the National Health Stack, it seeks to create a centralised electronic repository of health records of Indian citizens with the aim of capturing every instance of healthcare service usage. Among other functions, it also envisions a platform for the provisioning of health and wellness-based services that may be dispensed by public or private actors in an attempt to achieve universal health coverage. By allowing private parties to utilise the data collected through pullable open application program interfaces (APIs), it also fits within the larger framework of the National Health Policy 2017 that envisions the private sector playing a significant role in the provision of healthcare in India. It also then fits within the state–private sector nexus that characterises dataveillance. This, in turn, follows broader trends towards market-driven solutions and private financing of health sector reform measures that have already had profound consequences on the political economy of healthcare worldwide (Joe et al 2018).&lt;/p&gt;
&lt;p&gt;These initiatives are, in many ways, emblematic of the growing adoption of network governance reform by the Indian state (Newman 2001). This is a stark shift from its traditional posturing as the hegemonic sovereign nation state. This shift entails the delayering from large, hierarchical and unitary government systems to horizontally arranged, more flexible, relatively dispersed systems.&lt;sup&gt;[2]&lt;/sup&gt; The former govern through the power of rules and law, while the latter take the shape of self-regulating networks such as public–private contractual arrangements (Snellen 2005). ICTs have been posited as an effective tool in enabling the transition to network governance by enhancing local governance and interactive policymaking enabling the co-production of knowledge (Ferlie et al 2011). The development of these capabilities is also critical to addressing “wicked problems” such as healthcare (Rittel and Webber 1973).&lt;sup&gt;[3]&lt;/sup&gt; The application of the techno-deterministic, data-driven model to reproductive healthcare provision, then, resembles a fetishised approach to technological change. The NHSRC describes this as the collection of data without an objective, leading to a disproportional burden on data collection over use (NHSRC and Taurus Glocal 2011).&lt;/p&gt;
&lt;p&gt;The blurring of the functions of state and private actors is reflective of the neo-liberal ethic, which produces new practices of governmentality. Within the neo-liberal framework of reproductive healthcare, the citizen is constructed as an individual actor, with agency over and responsibility for their own health and well-being (Maturo et al 2016).&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;“Quantified Self” of the Neo-liberal Citizen&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Nowhere can the manifestation of this neo-liberal citizen can be seen as clearly as in the “quantified self” movement. The quantified self movement refers to the emergence of a whole range of apps that enable the user to track bodily functions and record data to achieve wellness and health goals, including menstruation, fertility, pregnancies, and health indicators in the mother and baby. Lupton (2015) labels this as the emergence of the “digitised reproductive citizen,” who is expected to be attentive to her fertility and sexual behaviour to achieve better reproductive health goals. The practice of collecting data around reproductive health is not new to the individual or the state, as has been demonstrated by the discussion above. What is new in this regime of datafication under the self-tracking movement is the monetisation of reproductive health data by private actors, the labour for which is performed by the user. Focusing on embodiment draws attention to different kinds of exploitation engendered by reproductive health apps. Not only is data about the body collected and sold, the unpaid labour for collection is extracted from the user. The reproductive body can then be understood as a cyborg, or a woman-machine hybrid, systematically digitising its bodily functions for profit-making within the capitalist (re)production machine (Fotoloulou 2016). Accordingly, all major reproductive health tracking apps have a business model that relies on selling information about users for direct marketing of products around reproductive health and well-being (Felizi and Varon nd).&lt;/p&gt;
&lt;p&gt;As has been pointed out in the case of big data more broadly, reproductive health applications (apps) facilitate the visibility of the female reproductive body in the public domain. Supplying anonymised data sets to medical researchers and universities fills some of the historical gaps in research around the female body and reproductive health. Reproductive and sexual health tracking apps globally provide their users a platform to engage with biomedical information around sexual and reproductive health. Through group chats on the platform, they are also able to engage with experiential knowledge of sexual and reproductive health. This could also help form transnational networks of solidarity around the body and health&amp;nbsp; (Fotopoulou 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This radical potential of network-building around reproductive and sexual health is, however, tempered to a large extent by the reconfiguration of gendered stereotypes through these apps. In a study on reproductive health apps on Google Play Store, Lupton (2014) finds that products targeted towards female users are marketed through the discourse of risk and vulnerability, while those targeted towards male users are framed within that of virility. Apart from reiterating gendered stereotypes around the male and female body, such a discourse assumes that the entire labour of family planning is performed by females. This same is the case with the MCTS/RCH.&lt;/p&gt;
&lt;p&gt;Technological interventions such as reproductive health apps as well as HIS are based on the assumption that females have perfect control over decisions regarding their own bodies and reproductive health, despite this being disproved in India. The Guttmacher Institute (2014) has found that 60% of women in India report not having control over decisions regarding their own healthcare. The failure to account for the husband or the family as stakeholder in decision-making around reproductive health has been a historical failure of the family planning programme in India, and is now being replicated in other modalities. This notion of an autonomous citizen who is able to take responsibility of their own reproductive health and well-being does not hold true in the Indian context. It can even be seen as marginalising females who have already been excluded from the reproductive health system, as they are held responsible for their own inability to access healthcare.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Concluding Remarks&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The interplay that emerges between reproductive health surveillance and data infrastructures is a complex one. It requires the careful positioning of the political nature of data collection and processing as well as its hetero-patriarchal and colonial legacies, within the need for effective utilisation of data for achieving developmental goals. Assessing this discourse through a feminist lens identifies the web of power relations in data regimes. This problematises narratives of technological solutions for welfare provision.&lt;/p&gt;
&lt;p&gt;The reproductive healthcare framework in India then offers up a useful case study to assess these concerns. The growing adoption of ICT-based surveillance tools to equalise access to healthcare needs to be understood in the socio-economic, legal, and cultural context where these tools are being implemented. Increased surveillance has historically been associated with causing the structural gendered violence that it is now being offered as a solution to. This is a function of normative standards being constructed for reproductive behaviour that necessarily leave out broader definitions of reproductive health and welfare when viewed through a feminist lens. Within the larger context of health policymaking in India, moves towards privatisation then demonstrate the peculiarity of dataveillance as it functions through an unaccountable and pervasive overlapping of state and private surveillance practises. It remains to be seen how these trends in ICT-driven health policies affect access to reproductive rights and decisional privacy for millions of females in India and other parts of the global South.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india'&gt;https://cis-india.org/internet-governance/blog/data-infrastructures-inequities-reproductive-health-surveillance-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-30T16:44:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice">
    <title>Unpacking video-based surveillance in New Delhi</title>
    <link>https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice</link>
    <description>
        &lt;b&gt;Aayush Rathi and Ambika Tandon presented at an international workshop on 'Urban Data, Inequality and Justice in the Global South', on 14 June 2019, at the University of Manchester. The agenda for the workshop and the slides from the presentation by Aayush and Ambika are available below.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Agenda of the workshop: &lt;a href="https://github.com/cis-india/website/raw/master/docs/UDJWorkshop2019_Timetable.docx"&gt;Download&lt;/a&gt; (DOCX)&lt;/h4&gt;
&lt;h4&gt;Slides from the presentation: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_AayushAmbika_UDJWorkshop2019_Slides.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;The aim of the workshop was to present findings from case studies on urban data justice commissioned by the Sustainable Consumption Institute and Centre for Development Informatics at the University of Manchester, on aspects of justice in data systems in cities across the world. Aayush and Ambika presented their study on video-based surveillance in New Delhi, which was conducted across a period of 3 months earlier this year. The study aimed to assess the extent to which CCTV surveillance systems in Delhi support the needs of women in the city, including lower class women and those from informal settlements. The study will be published as a working paper by the University of Manchester in the coming months.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice'&gt;https://cis-india.org/raw/unpacking-video-based-surveillance-in-new-delhi-urban-data-justice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Justice</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Urban Data Justice</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2019-06-20T05:13:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india">
    <title>Paper-thin Safeguards and Mass Surveillance in India</title>
    <link>https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india</link>
    <description>
        &lt;b&gt;The Indian government's new mass surveillance systems present new threats to the right to privacy. Mass interception of communication, keyword searches and easy access to particular users' data suggest that state is moving  towards unfettered large-scale monitoring of communication. This is particularly ominous given that our privacy safeguards remain inadequate even for targeted surveillance and its more familiar pitfalls.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This need for better safeguards was made apparent when the Gujarat government illegally placed a young  woman  under surveillance  for obviously illegitimate purposes, demonstrating that the current system is prone to egregious misuse.  While the lack of proper safeguards is problematic even in the context of targeted surveillance, it threatens the health of our democracy in the context of mass surveillance. The proliferation of mass surveillance means that vast amounts of data are collected easily using information technology, and lie relatively unprotected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper examines the right to privacy and surveillance in India, in an effort to highlight more clearly the problems that are likely to emerge with mass surveillance of communication by the Indian Government. It does this by teasing out Indian privacy rights jurisprudence and the concerns underpinning it, by considering its utility in the context of mass surveillance and then explaining the kind of harm that might result if mass surveillance continues unchecked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first part of this paper threads together the evolution of Indian constitutional principles on privacy in the context of communication surveillance as well as search and seizure. It covers discussions of privacy in the context of our fundamental rights by the draftspersons of our constitution, and then moves on to the ways in which the Supreme Court of India has been reading the right to privacy into the constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second part of this paper discusses the difference between mass surveillance and targeted surveillance, and international human rights principles that attempt to mitigate the ill effects of mass surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concluding part of the paper discusses mass surveillance in India, and makes a case for expanding our existing privacy safeguards to protect the right to privacy in a meaningful manner in face of state surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf" class="external-link"&gt;Download the paper here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india'&gt;https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-06-20T10:17:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/gender-health-surveillance-in-india-panel-discussion">
    <title>Gender, Health, &amp; Surveillance in India - A Panel Discussion</title>
    <link>https://cis-india.org/raw/gender-health-surveillance-in-india-panel-discussion</link>
    <description>
        &lt;b&gt;Women and LGBTHIAQ-identifying persons face intensive and varied forms of surveillance as they access reproductive health systems. Increasingly, these systems are also undergoing rapid digitisation. The panel was set-up to discuss the discursive, experiential and policy implications of these data-intensive developments on access to public health and welfare systems by women and LGBTHIAQ-identifying persons in India. The panelists presented studies undertaken as part of two projects at CIS, one of which is supported by Privacy International, UK, and the other by Big Data for Development network established by International Development Research Centre, Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Event note and agenda: &lt;a href="https://cis-india.org/raw/files/gender-health-surveillance-in-india-panel-agenda" target="_blank"&gt;Read&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Recording of the discussion: &lt;a href="https://www.youtube.com/watch?v=QgYxcD3NUuo" target="_blank"&gt;Watch&lt;/a&gt; (YouTube)&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://www.youtube-nocookie.com/embed/QgYxcD3NUuo" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/gender-health-surveillance-in-india-panel-discussion'&gt;https://cis-india.org/raw/gender-health-surveillance-in-india-panel-discussion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>RAW Events</dc:subject>
    
    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Reproductive and Child Health</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2020-12-23T14:03:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/social-media-monitoring">
    <title>Social Media Monitoring</title>
    <link>https://cis-india.org/internet-governance/blog/social-media-monitoring</link>
    <description>
        &lt;b&gt;We see a trend of social media and communication monitoring and surveillance initiatives in India which have the potential to create a chilling effect on free speech online and raises question about the privacy of individuals. In this paper, Amber Sinha looks at social media monitoring as a tool for surveillance, the current state of social media surveillance in India, and evaluate how the existing regulatory framework in India may deal with such practices in future.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Social Media Monitoring: &lt;a href="http://cis-india.org/internet-governance/files/social-media-monitoring/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;In 2014, the Government of India launched the much lauded and popular citizen outreach website called MyGov.in. A press release by the government announced that they had roped in global consulting firm PwC to assist in the data mining exercise to process and filter key points emerging from debates on Mygov.in. While this was a welcome move, the release also mentioned that the government intended to monitor social media sites in order to gauge popular opinion. Further, earlier this year, the government set up National Media Analytics Centre (NMAC) to monitor blogs, media channels, news outlets and social media platforms. The tracking software used by NMAC will generate tags to classify post and comments on social media into negative, positive and neutral categories, paying special attention to “belligerent” comments, and also look at the past patterns of posts. A project called NETRA has already been reported in the media a few years back which would intercept and analyse internet traffic using pre-defined filters. Alongside, we see other initiatives which intend to use social media data for predictive policing purposes such as CCTNS and Social Media Labs.&lt;/p&gt;
&lt;p&gt;Thus, we see a trend of social media and communication monitoring and surveillance initiatives announced by the government which have the potential to create a chilling effect on free speech online and raises question about the
privacy of individuals. Various commentators have raised concerns about the legal validity of such programmes and whether they were in violation of the fundamental rights to privacy and free expression, and the existing surveillance laws in India. The lack of legislation governing these programmes often translates into an absence of transparency and due procedure. Further, a lot of personal communication now exists in the public domain which
renders traditional principles which govern interception and monitoring of personal communications futile. In the last few years, the blogosphere and social media websites in India have also changed and become platforms for more dissemination of political content, often also accompanied by significant vitriol, ‘trolling’ and abuse. Thus, we see greater policing of public or semi-public spaces online. In this paper, we look at social media monitoring as a
tool for surveillance, the current state of social media surveillance in India and evaluate how the existing regulatory framework in India may deal with such practices in future.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/social-media-monitoring'&gt;https://cis-india.org/internet-governance/blog/social-media-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-01-16T14:23:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes">
    <title>The Design &amp; Technology behind India’s Surveillance Programmes</title>
    <link>https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes</link>
    <description>
        &lt;b&gt;There has been an exponential growth in the pervasive presence of technology in the daily lives of an average Indian citizen over the past few years. While leading to manifold increase in convenience and connectivity, these technologies also allow for far greater potential for surveillance by state actors.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While the legal and policy avenues of  state surveillance in India have been analysed by various organisations, there is very little available information about the technology and infrastructure used to carry out this surveillance. This appears to be   largely, according to the government, due to reasons of national security and sovereignty.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; This blog post will attempt to paint a picture of the technological infrastructure being used to carry out state surveillance in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Background&lt;/b&gt;&lt;br /&gt; The revelations by Edward Snowden about mass surveillance in mid-2013 led to an explosion of journalistic interest in surveillance and user privacy in India.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; The reports and coverage from this period, leading up to early 2015, serve as the main authority for the information presented in this blog post. The lack of information from official government sources as well as decreasing public spotlight on surveillance since that point of time generally have both led to little or no new information turning up about India’s surveillance regime since this period. However, given the long term nature of these programmes and the vast amounts of time it takes to set them up, it is fairly certain that the programmes detailed below are still the primary bedrock of state surveillance in the country, albeit having become operational and inter-connected only in the past 2 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The technology being used to carry out surveillance in India over the past 5 years is largely an upgraded, centralised and substantially more powerful version of the  surveillance techniques followed in India since the advent of telegraph and telephone lines: the tapping &amp;amp; recording of information in transit.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; The fact that all the modern surveillance programmes detailed below have not required any new legislation, law, amendment or policy that was not already in force prior to 2008 is the most telling example of this fact. The legal and policy implication of the programmes illustrated below have been covered in previous articles by the Centre for Internet &amp;amp; Society which can be found here,&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; here&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; and here.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; Therefore, this post will solely concentrate on the  technological design and infrastructure being used to carry out surveillance along with any new developments in this field that the three source mentioned would not have covered from a technological perspective.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Technology Infrastructure behind State Surveillance in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The programmes of the Indian Government (in public knowledge) that are being used to carry out state surveillance are broadly eight in number. These exclude specific surveillance technology being used by independent arms of the government, which will be covered in the next section of this post.  Many of the programmes listed below have overlapping jurisdictions and in some instances are cross-linked with each other to provide greater coverage:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Central Monitoring System (CMS)&lt;/li&gt;
&lt;li&gt;National Intelligence Grid (NAT-GRID)&lt;/li&gt;
&lt;li&gt;Lawful Intercept And Monitoring Project (LIM)&lt;/li&gt;
&lt;li&gt;Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS)&lt;/li&gt;
&lt;li&gt;Network Traffic Analysis System (NETRA)&lt;/li&gt;
&lt;li&gt;New Media Wing (Bureau of New and Concurrent Media)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The post will look at the technological underpinning of each of these programmes and their operational capabilities, both in theory and practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System (CMS)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System (CMS) is the premier mass surveillance programme of the Indian Government, which has been in the planning stages since 2008&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt; Its primary goal is to replace the current on-demand availability of analog and digital data from service providers with a “central and direct” access which involves no third party between the captured information and the government authorities.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; While the system is currently operated by the Centre for Development of Telematics, the unreleased three-stage plan envisages a centralised location (physically and legally) to govern the programme. The CMS is primarily operated by Telecom Enforcement and Resource Monitoring Cell (TERM) within the Department of Telecom, which also has a larger mandate of ensuring radiation safety and spectrum compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The technological infrastructure behind the CMS largely consists of Telecom Service Providers (TSPs) and Internet Service Providers (ISPs) in India being mandated to integrate Interception Store &amp;amp; Forward (ISF) servers with their Lawful Interception Systems required by their licences. Once these ISF servers are installed they are then connected to the Regional Monitoring Centres (RMC) of the CMS, setup according to geographical locations and population. Finally, Regional Monitoring Centre (RMC) in India is connected to the Central Monitoring System (CMS) itself, essentially allowing the collection, storage, access and analysis of data collected from all across the country in a centralised manner. The data collected by the CMS includes voice calls, SMS, MMS, fax communications on landlines, CDMA, video calls, GSM and even general, unencrypted  data travelling across the internet using the standard IP/TCP Protocol.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to the analysis of this data,  Call Details Records (CDR) analysis, data mining, machine learning and predictive algorithms have been allegedly implemented in various degrees across this network.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt; This allows state actors to pre-emptively gather and collect a vast amount of information from across the country, perform analysis on this data and then possibly even take action on the basis of this information by directly approaching the entity (currently the TERM under C-DOT) operating the system. &lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/a&gt; The system has reached full functionality in mid 2016, with over 22 Regional Monitoring Centres functional and the system itself being ‘switched on’ post trials in gradual phases.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Intelligence Grid (NATGRID)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Intelligence Grid (NATGRID) is a semi-functional&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/a&gt; integrated intelligence grid that links the stored records and databases of several government entities in order to collect data, decipher trends and provide real time (sometimes even predictive) analysis of  data gathered across law enforcement, espionage and military agencies. The programme intends to provide 11 security agencies real-time access to 21 citizen data sources to track terror activities across the country.  The citizen data sources include bank account details, telephone records, passport data and vehicle registration details, the National Population Register (NPR), the Immigration, Visa, Foreigners Registration and Tracking System (IVFRT), among other types of data, all of which are already present within various government records across the country.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data mining and analytics are used to process the huge volumes of data generated from the 21 data sources so as to analyse events, match patterns and track suspects, with big data analytics&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/a&gt; being the primary tool to effectively utilise the project, which was founded to prevent another instance of the September, 2011 terrorist attacks in Mumbai. The list of agencies that will have access to this data collection and analytics platform are the Central Board of Direct Taxes (CBDT), Central Bureau of Investigation (CBI), Defense Intelligence Agency (DIA), Directorate of Revenue Intelligence (DRI), Enforcement Directorate (ED), Intelligence Bureau (IB), Narcotics Control Bureau (NCB), National Investigation Agency (NIA), Research and Analysis Wing (RAW), the Military Intelligence of Assam , Jammu and Kashmir regions and finally the Home Ministry itself.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of late 2015, the project has remained stuck because of bureaucratic red tape, with even the first phase of the four stage project not complete. The primary reason for this is the change of governments in 2014, along with apprehensions about breach of security and misuse of information from agencies such as the IB, R&amp;amp;AW, CBI, and CBDT, etc.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/a&gt; However, the office of the NATGRID is now under construction in South Delhi and while the agency claims an exemption under the RTI Act as a Schedule II Organisation, its scope and operational reach have only increased with each passing year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lawful Intercept And Monitoring Project&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawful Intercept and Monitoring (LIM), is a secret mass electronic surveillance program operated by the Government of India for monitoring Internet traffic, communications, web-browsing and all other forms of Internet data. It is primarily run by the Centre for Development of Telematics (C-DoT) in the Ministry of Telecom since 2011.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The LIM Programme consists of installing interception, monitoring and storage programmes at international gateways, internet exchange hubs as well as ISP nodes across the country. This is done independent of ISPs, with the entire hardware and software apparatus being operated by the government. The hardware is installed between the Internet Edge Router (PE) and the core network, allowing for direct access to all traffic flowing through the ISP.  It is the primary programme for internet traffic surveillance in India, allowing indiscriminate monitoring of all traffic passing through the ISP for as long as the government desires, without any oversight of courts and sometimes without the knowledge of ISPs.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/a&gt; One of the most potent capabilities of the LIM Project are live, automated keyword searches which allow the government to track all the information passing through the internet pipe being surveilled for certain key phrases in both in text as well in audio. Once these key phrases are successfully matched to the data travelling through the pipe using advanced search algorithms developed uniquely for the project, the system has various automatic routines which range from targeted surveillance on the source of the data to raising an alarm with the appropriate authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;LIM systems are often also operated by the ISPs themselves, on behalf of the government. They operate the device, including hardware upkeep, only to provide direct access to government agencies upon requests. Reports have stated that the legal procedures laid down in law (including nodal officers and formal requests for information) are rarely followed&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/a&gt; in both these cases, allowing unfettered access to petabytes of user data on a daily basis through these programmes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Crime and Criminal Tracking Network &amp;amp; System (CCTNS) is a planned network that allows for the digital collection, storage, retrieval, analysis, transfer and sharing of information relating to crimes and criminals across India.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/a&gt; It is supposed to primarily operate at two levels, one between police stations and the second being between the various governance structures around crime detection and solving around the country, with access also being provided to intelligence and national security agencies.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CCTNS aims to integrate all the necessary data and records surrounding a crime (including past records) into a Core Application Software (CAS) that has been developed by Wipro.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/a&gt; The software includes the ability to digitise FIR registration, investigation and charge sheets along with the ability to set up a centralised citizen portal to interact with relevant information. This project aims to use this CAS interface across 15, 000 police stations in the country, with up to 5, 000 additional deployments. The project has been planned since 2009, with the first complete statewide implementation going live only in August 2016 in Maharashtra. &lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While seemingly harmless at face value, the project’s true power lies in two main possible uses. The first being its ability to profile individuals using their past conduct, which now can include all stages of an investigation and not just a conviction by a court of law, which has massive privacy concerns. The second harm is the notion that the CCTNS database will not be an isolated one but will be connected to the NATGRID and other such databases operated by organisations such as the National Crime Records Bureau, which will allow the information present in the CCTNS to be leveraged into carrying out more invasive surveillance of the public at large.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Network Traffic Analysis System (NETRA)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NETRA (NEtwork TRaffic Analysis) is a real time surveillance software developed by the Centre for Artificial Intelligence and Robotics (CAIR) at the Defence Research and Development Organisation. (DRDO) The software has apparently been fully functional since early 2014 and is primarily used by Indian Spy agencies, the Intelligence Bureau (IB) and the Research and Analysis Wing (RAW) with some capacity being reserved for domestic agencies under the Home Ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The software is meant to monitor Internet traffic on a real time basis using both voice and textual forms of data communication, especially social media, communication services and web browsing. Each agency was initially allocated 1000 nodes running NETRA, with each node having a capacity to analyse 300GB of information per second, giving each agency a capacity of around 300 TB of information processing per second.&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/a&gt; This capacity is largely available only to agencies dealing with External threats, with domestic agencies being allocated far lower capacities, depending on demand. The software itself is mobile and in the presence of sufficient hardware capacity, nothing prevents the software from being used in the CMS, the NATGRID or LIM operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There has been a sharp and sudden absence of public domain information regarding the software since 2014, making any statements about its current form or evolution mere conjecture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analysis of the Collective Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent of the capacity of such programmes, their real world operations work in a largely similar manner to mass surveillance programmes in the rest of the world, with a majority of the capacity being focused on decryption and storage of data with basic rudimentary data analytics.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt; Keyword searches for hot words like 'attack', 'bomb', 'blast' or 'kill' in the various communication stream in real time are the only real capabilities of the system that have been discussed in the public domain,&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/a&gt; which along with the limited capacity of such programmes&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/a&gt; (300 TB) is indicative of basic level of analysis that is carried  on captured data. Any additional details about the technical details about how India’s surveillance programmes use their captured data is absent from the public domain but they can presumed, at best, to operate with similar standards as global practices.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Capacitative Global Comparison &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As can be seen from the post so far, India’s surveillance programmes have remarkably little information about them in the public domain, from a technical operation or infrastructure perspective. In fact, post late 2014, there is a stark lack of information about any developments in the mass surveillance field. All of the information that is available about the technical capabilities of the CMS, NATGRID or LIM is either antiquated (pre 2014) or is about (comparatively) mundane details like headquarter construction clearances.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/a&gt; Whether this is a result of the general reduction in the attention towards mass surveillance by the public and the media&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/a&gt; or is the result of actions taken by the government under the “national security” grounds under as the Official Secrets Act, 1923&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/a&gt; can only be conjecture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, given the information available (mentioned previously in this article) a comparative points to the rather lopsided position in comparison to international mass surveillance performance. While the legal provisions in India regarding surveillance programmes  are among the most wide ranging, discretionary and opaque in the world&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/a&gt; their technical capabilities seem to be anarchic in comparison to modern standards. The only real comparative that can be used is public reporting surrounding the DRDO NETRA project around 2012 and 2013.  The government held a competition between the DRDO’s internally developed software “Netra” and NTRO’s “Vishwarupal” which was developed in collaboration with Paladion Networks.&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/a&gt; The winning software, NETRA, was said to have a capacity of 300 GB per node, with a total of 1000 sanctioned nodes.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/a&gt; This capacity of 300 TB for the entire system, while seemingly powerful, is a miniscule fragment of 83 Petabytes traffic that is predicted to generated in India per day.&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/a&gt; In comparison, the PRISM programme run by the National Security Agency in 2013 (the same time that the NETRA was tested) has a capacity of over 5 trillion gigabytes of storage&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/a&gt;, many magnitudes greater than the capacity of the DRDO software. Similar statistics can be seen from the various other programmes of NSA and the Five Eyes alliance,&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/a&gt; all of which operated at far greater capacities&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/a&gt; and were held to be minimally effective.&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/a&gt; The questions this poses of the effectiveness, reliance and  proportionality of the Indian surveillance programme can never truly be answered due to the lack of information surrounding capacity and technology of the Indian surveillance programmes, as highlighted in the article. With regard to criminal databases used in surveillance, such as the NATGRID, equivalent systems both domestically (especially in the USA) and internationally (such as the one run by the Interpol)&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/a&gt; are impossible due to the NATGRID not even being fully operational yet.&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if we were to ignore the issues in principle with mass surveillance, the pervasive, largely unregulated and mass scale surveillance being carried in India using the tools and technologies detailed above have various technical and policy failings. It is imperative that transparency, accountability and legal scrutiny be made an integral part of the security apparatus in India. The risks of security breaches, politically motivated actions and foreign state hacking only increase with the absence of public accountability mechanisms. Further, opening up the technologies used for these operations to regular security audits will also improve their resilience to such attacks.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt;http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/"&gt;http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.privacyinternational.org/node/818"&gt;https://www.privacyinternational.org/node/818&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf"&gt;http://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf"&gt;http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf"&gt;http://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=54679"&gt;http://pib.nic.in/newsite/PrintRelease.aspx?relid=54679&lt;/a&gt; &amp;amp; &lt;a href="http://www.dot.gov.in/sites/default/files/English%20annual%20report%202007-08_0.pdf"&gt;http://www.dot.gov.in/sites/default/files/English%20annual%20report%202007-08_0.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://ijlt.in/wp-content/uploads/2015/08/IJLT-Volume-10.41-62.pdf"&gt;http://ijlt.in/wp-content/uploads/2015/08/IJLT-Volume-10.41-62.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindu.com/scitech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;http://www.thehindu.com/scitech/technology/in-the-dark-about-indias-prism/article4817903.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/india-centralmonitoring-system-something-to-worry-about"&gt;http://cis-india.org/internet-governance/blog/india-centralmonitoring-system-something-to-worry-about&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.justice.gov/sites/default/files/pages/attachments/2016/07/08/ind195494.e.pdf"&gt;https://www.justice.gov/sites/default/files/pages/attachments/2016/07/08/ind195494.e.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.datacenterdynamics.com/content-tracks/security-risk/indian-lawful-interception-data-centers-are-complete/94053.fullarticle"&gt;http://www.datacenterdynamics.com/content-tracks/security-risk/indian-lawful-interception-data-centers-are-complete/94053.fullarticle&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://natgrid.attendance.gov.in/"&gt;http://natgrid.attendance.gov.in/&lt;/a&gt; [Attendace records at the NATGRID Office!]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-nationalintelligence-grid-databases"&gt;http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-nationalintelligence-grid-databases&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.business-standard.com/article/current-affairs/natgrid-to-use-big-data-analytics-to-track-suspects-1"&gt;http://www.business-standard.com/article/current-affairs/natgrid-to-use-big-data-analytics-to-track-suspects-1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf"&gt;http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://indiatoday.intoday.in/story/natgrid-gets-green-nod-but-hurdles-remain/1/543087.html"&gt;http://indiatoday.intoday.in/story/natgrid-gets-green-nod-but-hurdles-remain/1/543087.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehoot.org/story_popup/no-escaping-the-surveillance-state-8742"&gt;http://www.thehoot.org/story_popup/no-escaping-the-surveillance-state-8742&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://ncrb.gov.in/BureauDivisions/CCTNS/cctns.htm"&gt;http://ncrb.gov.in/BureauDivisions/CCTNS/cctns.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://economictimes.indiatimes.com/news/politics-and-nation/ncrb-to-connect-police-stations-and-crime-data-across-country-in-6-months/articleshow/45029398.cms"&gt;http://economictimes.indiatimes.com/news/politics-and-nation/ncrb-to-connect-police-stations-and-crime-data-across-country-in-6-months/articleshow/45029398.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://indiatoday.intoday.in/education/story/crime-criminal-tracking-network-system/1/744164.html"&gt;http://indiatoday.intoday.in/education/story/crime-criminal-tracking-network-system/1/744164.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.dailypioneer.com/nation/govt-cctns-to-be-operational-by-2017.html"&gt;http://www.dailypioneer.com/nation/govt-cctns-to-be-operational-by-2017.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data"&gt;http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt; Surveillance, Snowden, and Big Data: Capacities, consequences, critique: &lt;a href="http://journals.sagepub.com/doi/pdf/10.1177/2053951714541861"&gt;http://journals.sagepub.com/doi/pdf/10.1177/2053951714541861&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2978636.ece"&gt;http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2978636.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/a&gt; See previous section in the article “NTRO”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/a&gt; Van Dijck, José. "Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology." &lt;i&gt;Surveillance &amp;amp; Society&lt;/i&gt; 12.2 (2014): 197.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.dailymail.co.uk/indiahome/indianews/article-3353230/Nat-Grid-knots-India-s-delayed-counter-terror-programme-gets-approval-green-body-red-tape-stall-further.html"&gt;http://www.dailymail.co.uk/indiahome/indianews/article-3353230/Nat-Grid-knots-India-s-delayed-counter-terror-programme-gets-approval-green-body-red-tape-stall-further.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cacm.acm.org/magazines/2015/5/186025-privacy-behaviors-after-snowden/fulltext"&gt;http://cacm.acm.org/magazines/2015/5/186025-privacy-behaviors-after-snowden/fulltext&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://freedomhouse.org/report/freedom-press/2015/india"&gt;https://freedomhouse.org/report/freedom-press/2015/india&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://blogs.wsj.com/indiarealtime/2014/06/05/indias-snooping-and-snowden/"&gt;http://blogs.wsj.com/indiarealtime/2014/06/05/indias-snooping-and-snowden/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data"&gt;http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://economictimes.indiatimes.com/tech/internet/government-to-launch-netra-for-internet-surveillance/articleshow/27438893.cms"&gt;http://economictimes.indiatimes.com/tech/internet/government-to-launch-netra-for-internet-surveillance/articleshow/27438893.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://trak.in/internet/indian-internet-traffic-8tbps-2017/"&gt;http://trak.in/internet/indian-internet-traffic-8tbps-2017/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.economist.com/news/briefing/21579473-americas-national-security-agency-collects-more-information-most-people-thought-will"&gt;http://www.economist.com/news/briefing/21579473-americas-national-security-agency-collects-more-information-most-people-thought-will&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.washingtonsblog.com/2013/07/the-fact-that-mass-surveillance-doesnt-keep-us-safe-goes-mainstream.html"&gt;http://www.washingtonsblog.com/2013/07/the-fact-that-mass-surveillance-doesnt-keep-us-safe-goes-mainstream.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/"&gt;http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra Note 35&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.papillonfoundation.org/information/global-crime-database/"&gt;http://www.papillonfoundation.org/information/global-crime-database/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindu.com/opinion/editorial/Revive-NATGRID-with-safeguards/article13975243.ece"&gt;http://www.thehindu.com/opinion/editorial/Revive-NATGRID-with-safeguards/article13975243.ece&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes'&gt;https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>udbhav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-20T15:56:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice">
    <title>Surveillance in India: Policy and Practice</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice</link>
    <description>
        &lt;b&gt;The National Institute of Public Finance and Policy organized a brainstorming session on net neutrality on February 8, 2017 and a public seminar on surveillance in India the following day on February 9, 2017 in New Delhi. Pranesh Prakash gave a talk. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh presented a narrative of the current state of surveillance law, our knowledge of current surveillance practices (including noting where programmes like Natgrid, CMS, etc. fit in), and charted a rough map of reforms needed and outstanding policy research questions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pranesh Prakash&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash is a Policy Director at - and was part of the founding team of - the Centre for Internet and Society, a non-profit organisation that engages in research and policy advocacy. He is also the Legal Lead at Creative Commons India and an Affiliated Fellow at the Yale Law School's Information Society Project, and has been on the Executive Committee of the NCUC at ICANN. In 2014, he was selected by Forbes India for its inaugural "30 under 30"​ list of young achievers, and in 2012 he was recognized as an Internet Freedom Fellow by the U.S. government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His research interests converge at the intersections of technology, culture, economics, law, and justice. His current work focuses on interrogating, promoting, and engaging with policymakers on the areas of access to knowledge (primarily copyright reform), 'openness' (including open government data, open standards, free/libre/open source software, and open access), freedom of expression, privacy, digital security, and Internet governance. He is a prominent voice on these issues, with the newspaper Mint calling him “one of the clearest thinkers in this area”, and his research having been quoted in the Indian parliament. He regularly speaks at national and international conferences on these topics. He has a degree in arts and law from the National Law School in Bangalore, and while there he helped found the Indian Journal of Law and Technology, and was part of its editorial board for two years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/workshop-on-net-neutrality"&gt;Click here&lt;/a&gt; to see the agenda for the brainstorming session on net neutrality.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video &lt;br /&gt; &lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/6KfyQ7y6TNE" width="560"&gt;&lt;/iframe&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice'&gt;https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-03-15T01:05:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016">
    <title>Workshop Report - UIDAI and Welfare Services: Exclusion and Countermeasures</title>
    <link>https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016</link>
    <description>
        &lt;b&gt;This report presents summarised notes from a workshop organised by the Centre for Internet and Society (CIS) on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society  organised a workshop on "UIDAI and Welfare Services: Exclusion and Countermeasures" at the Institution of Agricultural on  Technologists on August 27 in Bangalore to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services &lt;strong&gt;[1]&lt;/strong&gt;. This was a follow-up to the workshop held in Delhi on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26th and 27th 2016 &lt;strong&gt;[2]&lt;/strong&gt;. In this report we summarise the key concerns raised and the case studies presented by the participants at the workshop held on August 27, 2016.&lt;/p&gt;
&lt;h2&gt;Implementation of the UID Project&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Question of Consent:&lt;/strong&gt; The Aadhaar Act &lt;strong&gt;[3]&lt;/strong&gt; states that the consent of the individual must be taken at the time of enrollment and authentication  and it must be informed to him/her the purpose for which the data would be used. However, the Act does not provide for an opt-out mechanism  and  an individual is compelled to give consent to continue with the enrollment process or to complete an authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Adherence to Court Orders:&lt;/strong&gt; Despite of several orders by Supreme Court stating that use of Aadhaar cannot be made mandatory for the purpose of availing benefits and services, multiple state governments and departments have made it mandatory for a wide range of purposes like booking railway tickets &lt;strong&gt;[4]&lt;/strong&gt;, linking below the poverty line ration cards with Aadhaar &lt;strong&gt;[5]&lt;/strong&gt;, school examinations &lt;strong&gt;[6]&lt;/strong&gt;, food security, pension and scholarship &lt;strong&gt;[7]&lt;/strong&gt;, to name a few.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Misleading Advertisements:&lt;/strong&gt; A concern was raised that individuals are being mislead in the necessity and purpose for enrollment into the project.  For example, people have been asked to enrol by telling them that they might get excluded from the system and cannot get services like passports,  banks, NREGA, salaries for government employees, denial of vaccinations, etc. Furthermore,  the Supreme Court has ordered Aadhaar not be mandatory, yet people are being told that documentation or record keeping cannot be done without UID number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Hybrid Governance:&lt;/strong&gt; The participants pointed out that with the Aadhaar (Targeted delivery of financial and other subsidies, benefits and services) Act, 2016 (hereinafter referred to as Aadhaar Act, 2016 ) being partially enforced,  multiple examples of exclusion as reported in the news are demonstrating  how the Aadhaar project is creating a case of hybrid governance i.e private corporations playing a significant role in Governance. This can be seen in case of Aadhaar where we see many entities from private sector being involved in its implementation, as well as many software and hardware companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Transparency around Sharing of Biometric Data:&lt;/strong&gt; The fact how and why the Government is relying on biometrics for welfare schemes is unclear and not known. Also, there is no information on how biometric data that is collected through the project is being used and its ability as an authenticating device. Along with that, there is very little information on companies that have been enlisted to hold and manage data and perform authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Possibility of Surveillance:&lt;/strong&gt; Multiple petitions and ongoing cases have raised concerns regarding  the possibility of surveillance, tracking, profiling, convergence of data, and the opaque involvement of private companies involved in the project.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Denial of Information:&lt;/strong&gt; In an RTI filed by one of the participant requesting to share the key contract for the project, it was refused on the grounds under section 8(1) (d) of the RTI Act, 2005. However, it was claimed that the provision would not be applicable since the contract was already awarded and any information disclosed to the Parliament should be disclosed to the citizens. The Central Information Commission issued a letter stating that the contractual obligation is over and a copy of the said agreement can be duly shared. However, it was discovered by the said participant that certain pages of the same were missing , which contained confidential information. When this issue went before appeal before the Information Commissioner, the IC gave an order to the IC in Delhi to comply with the previous order. However, it was communicated that limited financial information may be given, but not missing pages. Also, it was revealed that the UIDAI was supposed to share biometric data with NPR (by way of a MoU), but it has refused to give information since the intention was to discontinue NPR and wanted  only UIDAI to collect data.&lt;/p&gt;
&lt;h2&gt;Concerns Arising from the Report of the Comptroller and Auditor General of India (CAG) on Implementation of PAHAL (DBTL) Scheme&lt;/h2&gt;
&lt;p&gt;A presentation on the CAG compliance audit report of PAHAL on LPG &lt;strong&gt;[8]&lt;/strong&gt; revealed how the society was made to believe that UID will help deal with the issue of duplication and collection as well as use of biometric data will help. The report also revealed that multiple LPG connections have the same Aadhaar number or same bank account number in the consumer database maintained by the OMCs, the bank account number of consumers were also not accurately recorded,  scrutiny of the database revealed improper capture of Aadhaar numbers, and there was incorrect seeding of IFSC codes in consumer database. The participants felt that this was an example of how  schemes that are being introduced for social welfare  do not necessarily benefit the society, and on the contrary, has led to exclusion by design. For example, in the year 2011, by was of the The Liquefied Petroleum Gas (Regulation of Supply and Distribution) Amendment Order, 2011 &lt;strong&gt;[9]&lt;/strong&gt;, the Ministry of Petroleum and Natural Gas made the Unique Identification Number (UID) under the Aadhaar project a must for availing LPG refills. This received a lot of public pushback, which led to non-implementation of the order. In October 2012, despite the UIDAI stating that the number was voluntary, a number of services began requiring the provision of an Aadhaar number for accessing benefits. In September 2013, when the first order on Aadhaar was passed by court &lt;strong&gt;[10]&lt;/strong&gt;, oil marketing companies and UIDAI  approached the Supreme Court to change the same and allow them to make it mandatory, which was refused by the Court. Later in the year 2014, use of Aadhaar for subsidies was made mandatory.  The participants further criticised the  CAG report for revealing the manner in which linking Aadhaar with welfare schemes has allowed duplication and led to ghost beneficiaries where there is no information about who these people are who are receiving the benefits of the subsidies. For example, in Rajasthan, people are being denied their pension as they are being declared dead due to absence of information from the Aadhaar database.&lt;/p&gt;
&lt;p&gt;It was said that the statistics of duplication  mentioned in the report show how UIDAI (as it claims to ensure de-duplication of beneficiaries) is not required for this purpose and can be done without Aadhaar as well. Also, due to incorrect seeding of Aadhaar number many are being denied subsidy where there is no information regarding the number of people who have been denied the subsidy because of this.  Considering these important facts from the audit report, the discussants concluded how the statistics reflect inflated claims by UIDAI and how the problems which are said to be addressed by using Aadhaar can be dealt without it. In this context, it is important to understand how the data in the aadhaar database maybe wrong and in case of e-governance the citizens suffer. Also, the fact that loss of subsidy-not in cash, but in use of LPG cylinder - only for cooking, is ignored. In addition to that, there is no data or way to check if the cylinder is being used for commercial purposes or not as RTI from oil companies says that no ghost identities have been detected.&lt;/p&gt;
&lt;h2&gt;UID-linked Welfare Delivery in Rajasthan&lt;/h2&gt;
&lt;p&gt;One speaker presented findings on people's experiences with UID-linked welfare services in Rajasthan, collected through a 100 days trip organised to speak to people across the state on problems related to welfare governance. This visit revealed that people who need the benefits and access to subsidies most are often excluded from actual services. It was highlighted that the paperless system is proving to be highly dangerous. Some of the cases discussed included that of a disabled labourer, who was asked to get an aadhaar card, but during enrollment asked the person standing next to him to put all his  5 fingers for biometric data collection.  Due to this incorrect data, he is devoid of all subsidies since the authentication fails every time he goes to avail it. He stopped receiving his entitlements.  Though problems were anticipated, the misery of the people revealed the extent of the problems arising from the project. In another case, an  elderly woman living alone, since she could not go for Aadhaar authentication, had not been receiving the ration she is entitled to receive for the past 8 months. When the ration shop was approached to represent her case, the dealers said that they cannot provide her ration since they would require her thumb print for authentication. Later, they found out that on persuading the dealer to provide her with ration since Aadhaar is not mandatory, they found out that in their records they had actually mentioned that she was being given the ration, which was not the case. So the lack of awareness and the fact that people are entitled to receive the benefits irrespective of Aadhaar is something that is being misused by dealers. This shows how this system has become a barrier for the people, where they are also unaware about the grievance redressal mechanism.&lt;/p&gt;
&lt;h2&gt;Aadhaar and e-KYC&lt;/h2&gt;
&lt;p&gt;In this session, the use of Aadhaar for e-KYC verification was discussed The UID strategy document describes how the idea is to link UIDAI with money enabled Direct Benefit Transfer (DBT) to the beneficiaries without any reason or justification for the same. It was highlighted by one of the participants how the Reserve Bank of India (RBI) believed that making Aadhaar compulsory for e-KYC and several other banking services was a violation of the Money Laundering Act as well as its own rules and standards, however, later relaxed the rules to link Aadhaar with bank accounts and accepted its for e-KyC with great reluctance as the Department of Revenue thought otherwise. It was mentioned how allowing opening of bank accounts remotely using Aadhaar, without physically being present, was touted as a dangerous idea. However, the restrictions placed by RBI were suddenly done away with and opening bank accounts remotely was enabled via e-KYC.&lt;/p&gt;
&lt;p&gt;A speaker emphasised that with emerging FinTech services in India being tied with Aadhaar via India Stack, the following concerns are becoming critical:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;With RBI enabling creation of bank accounts remotely, it becomes difficult to to track who did e-KYC and which bank did it and hold the same accountable.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Aadhaar Act 2016 states that UIDAI will not track the queries made and will only keep a record of Yes/No for authentication. For example, the e-KYC to open a bank account can now be done with the help of an Aadhaar number and biometric authentication. However, this request does not get recorded and at the time of authentication, an individual is simply told whether the request has been matched or not by way of a Yes/No &lt;strong&gt;[11]&lt;/strong&gt;. Though UIDAI will maintain the authentication record, this may act as an obstacle since in case the information from the aadhaar database does not match, the person would not be able to open a bank account and would only receive a yes/no as a response to the request.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Further, there is a concern that the Aadhaar Enabled Payment System being implemented by the National Payment Corporation of India (NCPI) would allow effectively hiding of source and destination of money flow, leading to money laundering and cases of bribery. This possible as NCPI maintains a mapper where each bank account is linked (only the latest one). However, Aadhaar number can be linked with multiple bank accounts of an individual. So when a transaction is made, the mapper records the transaction only from that 1 account. But if another transaction takes place with another bank account, that record is not maintained by the mapper at NCPI since it records only transactions of the latest account seeded in that. This makes money laundering easy as the money moves from aadhaar number to aadhaar number now rather than bank account to bank account.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"&gt;http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"&gt;http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf"&gt;https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets"&gt;http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece"&gt;http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms"&gt;http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html"&gt;http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf"&gt;http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf"&gt;http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 8(4) of the Aadhaar Act, 2016 states that "The Authority shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information excluding any core biometric information."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016'&gt;https://cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    

   <dc:date>2019-03-16T04:34:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016">
    <title>Right to Food Campaign, Ranchi Convention, 2016</title>
    <link>https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016</link>
    <description>
        &lt;b&gt;The Right to Food Campaign held its 2016 Convention in Ranchi during September 23-25, 2016. While three years have elapsed since the passage of the National Food Security Act, despite improvements in the Public Distribution System (PDS), large implementation gaps remain. This is what the Convention focused on, and gathered researchers and campaigners from across the country to share experiences and case studies on effectiveness and exclusions from the PDS. Sumandro Chattapadhyay took part in a session of the Convention to discuss how UID-linked welfare delivery is being rolled out across key programmes like provision of pension and rationed distribution of essential commodities, and their impact on people's right to welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="http://www.righttofoodcampaign.in/"&gt;Website&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="https://docs.google.com/viewer?a=v&amp;amp;pid=sites&amp;amp;srcid=ZGVmYXVsdGRvbWFpbnxoYXFyb3ppcm90aXxneDo3MmQ3MTMyZjU2N2FjOGU"&gt;Cash Transfers and UID: Our Main Demands&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Ranchi Convention, 2016: &lt;a href="https://docs.google.com/document/d/110_asJ1t14IWALbhWN1RjDiOV8WE-fIK2xJC5Yltyc4/edit"&gt;Programme&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016'&gt;https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:40:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rethinking-acquisition-of-digital-devices-by-law-enforcement-agencies">
    <title>Rethinking Acquisition of Digital Devices by Law Enforcement Agencies</title>
    <link>https://cis-india.org/internet-governance/blog/rethinking-acquisition-of-digital-devices-by-law-enforcement-agencies</link>
    <description>
        &lt;b&gt;This article has been selected as a part of The Right to Privacy and the Legality of Surveillance series organized in collaboration with the RGNUL Student Research Review (RSRR) Journal.&lt;/b&gt;
        
&lt;p&gt;Read the article originally published in &lt;a class="external-link" href="https://rsrr.in/blog/"&gt;RGNUL Student Research Review (RSRR) Journal &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Criminal Procedure Code was created in the 1970s when the concept of the right to privacy was highly unacknowledged. Following the &lt;em&gt;Puttuswamy&lt;/em&gt; &lt;em&gt;I &lt;/em&gt;(2017) judgement of the Supreme Court affirming the right to privacy, these antiquated codes must be re-evaluated. Today, the police can acquire digital devices through summons and gain direct access to a person’s life, despite the summons mechanism having been intended for targeted, narrow enquiries. Once in possession of a device, the police attempt to circumvent the right against self-incrimination by demanding biometric passwords, arguing that the right does not cover biometric information . However, due to the extent of information available on digital devices, courts ought to be cautious and strive to limit the power of the police to compel such disclosures, taking into consideration the &lt;em&gt;right to privacy&lt;/em&gt; judgement.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Keywords: &lt;/strong&gt;Privacy, Criminal Procedural Law, CrPc, Constitutional Law&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Introduction&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;New challenges confront the Indian criminal investigation framework, particularly in the context of law enforcement agencies (LEAs) acquiring digital devices and their passwords. Criminal procedure codes delimiting police authority and procedures were created before the widespread use of digital devices and are no longer pertinent to the modern age due to the magnitude of information available on a single device. A single device could provide more information to LEAs than a complete search of a person’s home; yet, the acquisition of a digital device is not treated with the severity and caution it deserves. Following the affirmation of the right to privacy in &lt;em&gt;Puttuswamy I &lt;/em&gt;(2017), criminal procedure codes must be revamped, taking into consideration that the acquisition of a person’s digital device constitutes a major infringement on their right to privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Acquisition of digital devices by LEAs through summons&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="https://www.indiacode.nic.in/bitstream/123456789/15272/1/the_code_of_criminal_procedure%2C_1973.pdf"&gt;Section 91 of the Criminal Procedure Code&lt;/a&gt; (CrPc) grants powers to a court or police officer in charge of a police station to compel a person to produce any form of document or ‘thing’ necessary and desirable to a criminal investigation. In &lt;a href="https://indiankanoon.org/doc/1395576/"&gt;&lt;em&gt;Rama Krishna v State&lt;/em&gt;&lt;/a&gt;,&lt;em&gt; &lt;/em&gt;‘necessary’ and ‘desirable’ have been interpreted as any piece of evidence relevant to the investigation or a link in the chain of evidence. &lt;a href="https://deliverypdf.ssrn.com/delivery.php?ID=040088020003014069081068085012117023096031065012091090091115088031084097097081123000002033027047006112028087095120074083084003037094022080065067076089116106115025106025062083007085091067067124080091064096069093075026018100087109120024076084123086119022&amp;amp;EXT=pdf&amp;amp;INDEX=TRUE"&gt;Abhinav Sekhri&lt;/a&gt;, a criminal law litigator and writer, has argued that the wide wording of this section allows summons to be directed towards the retrieval of specific digital devices.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As summons are target-specific, the section has minimal safeguards. However, several issues arise in the context of summons regarding digital devices. In the current day, access to a user’s personal device can provide comprehensive insight into their life and personality due to the vast amounts of private and personal information stored on it. In &lt;a href="https://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf"&gt;&lt;em&gt;Riley v California&lt;/em&gt;&lt;/a&gt;, the Supreme Court of the United States (SCOTUS) observed that due to the nature of the content present on digital devices, summons for them are equivalent to a roving search, i.e., demanding the simultaneous production of all contents of the home, bank records, call records, and lockers. The &lt;em&gt;Riley&lt;/em&gt; decision correctly highlights the need for courts to recognise that digital devices ought to be treated distinctly compared to other forms of physical evidence due to the repository of information stored on digital devices.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The burden the state must surpass in order to issue summons is low as the relevancy requirement is easily provable. As noted in &lt;a href="https://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf"&gt;&lt;em&gt;Riley&lt;/em&gt;&lt;/a&gt;, police must identify which evidence on a device is relevant. Due to the sheer amount of data on phones, it is very easy for police to claim that there will surely be some form of connection between the content on the device and the case. Due to the wide range of offences available for Indian LEAs to cite, it is easy for them to argue that the content on the device is relevant to any number of possible offences. LEAs rarely face consequences for slamming the accused with a huge roster of charges – even if many of them are baseless – leading to the system being prone to abuse. The Indian Supreme Court in its judgement in &lt;a href="https://indiankanoon.org/doc/1068532/"&gt;&lt;em&gt;Canara Bank&lt;/em&gt;&lt;/a&gt; noted that the burden of proof must be higher for LEAs when investigations violate the right to privacy. &lt;a href="https://www.ijlt.in/_files/ugd/066049_03e4a2b28a5e49f6a59b861aa4554ede.pdf"&gt;Tarun Krishnakumar&lt;/a&gt; notes that the trickle-down effect of &lt;em&gt;Puttuswamy I&lt;/em&gt; will lead to new privacy challenges with regards to a summons to appear in court. &lt;em&gt;Puttuswamy I&lt;/em&gt;, will provide the bedrock and constitutional framework, within which future challenges to the criminal process will be undertaken. It is important for the court to recognise the transformative potential within the &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;&lt;em&gt;Puttuswamy&lt;/em&gt;&lt;/a&gt; judgement to help ensure that the right to privacy of citizens is safeguarded. The colonial logic of policing – wherein criminal procedure law was merely a tool to maximise the interest of the state at the cost of the people – must be abandoned. Courts ought to devise a framework under Section 91 to ensure that summons are narrowly framed to target specific information or content within digital devices. Additionally, the digital device must be collected following a judicial authority issuing the summons and not a police authority. Prior judicial warrants will require LEAs to demonstrate their requirement for the digital device; on estimating the impact on privacy, the authority can issue a suitable summons. Currently, the only consideration is if the item will furnish evidence relevant to the investigation; however, judges ought to balance the need for the digital device in the LEA’s investigation with the users’ right to privacy, dignity, and autonomy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;&lt;em&gt;Puttuswamy I&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;provides a triple test encompassing legality, necessity, and proportionality to test privacy claims. Legality requires that the measure be prescribed by law, necessity analyses if it is the least restrictive means being adopted by the state, and proportionality checks if the objective pursued by the measure is proportional to the degree of infringement of the right. The relevance standard, as mentioned before, is inadequate as it does not provide enough safeguards against abuse. The police can issue summons based on the slightest of suspicions and thus get access to a digital device, following which they can conduct a roving enquiry of the device to find evidence of any other offence, unrelated to the original cause of suspicion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Unilateral police summons of digital devices cannot pass the triple test as it is grossly disproportionate and lacks any form of safeguard against the police. The current system has no mechanism for overseeing the LEAs; as long as LEAs themselves are of the view that they require the device, they can acquire it. In &lt;a href="https://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf"&gt;&lt;em&gt;Riley&lt;/em&gt;&lt;/a&gt;, SCOTUS has already held that warrantless seizure of digital devices constitutes a violation of the right to privacy. India ought to also adopt a requirement of a prior judicial warrant for the procurement of devices by LEAs. A re-imagined criminal process would have to abide by the triple test in particular proportionality wherein the benefit claimed by the state ought not to be disproportionate to the impact on the fundamental right to privacy; and further, a framework must be proposed to provide safeguards against abuse.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Compelling the production of passwords of devices&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In police investigations, gaining possession of a physical device is merely the first step in acquiring the data on the device, as the LEAs still require the passcodes needed to unlock the device. LEAs compelling the production of passcodes to gain access to potentially incriminating data raises obvious questions regarding the right against self-incrimination; however, in the context of digital devices, several privacy issues may crop up as well.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In &lt;a href="https://main.sci.gov.in/judgment/judis/4157.pdf"&gt;&lt;em&gt;Kathi Kalu Oghad&lt;/em&gt;&lt;/a&gt;, the SC held that compelling the production of fingerprints of an accused person to compare them with fingerprints discovered by the LEA in the course of their investigation does not violate the right to protection against self-incrimination of the accused. &lt;a href="https://lawschoolpolicyreview.com/2019/10/16/biometrics-as-passwords-the-slippery-scope-of-self-incrimination/"&gt;It has been argued&lt;/a&gt; that the ratio in the judgement prohibits the compelling of disclosure of passwords and biometrics for unlocking devices because &lt;a href="https://main.sci.gov.in/judgment/judis/4157.pdf"&gt;&lt;em&gt;Kathi Kalu Oghad&lt;/em&gt;&lt;/a&gt; only dealt with the production of fingerprints in order to compare the fingerprints with pre-existing evidence, as opposed to unlocking new evidence by utilising the fingerprint. However, the judgement deals with self-incrimination and does not address any privacy issues.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The right against self-incrimination approach alone may not be enough to resolve all concerns. Firstly, there may be varying levels of protection provided to different forms of password protections on digital devices; text- and pattern-based passcodes are inarguably protected under Art. 20(3) of the Constitution. However, the protection of biometrics-based passcodes relies upon the correct interpretation of the &lt;a href="https://main.sci.gov.in/judgment/judis/4157.pdf"&gt;&lt;em&gt;Kathi Kalu Oghad&lt;/em&gt;&lt;/a&gt; precedent. Secondly, Art. 20(3) only protects the accused in investigations and not when non-accused digital devices are acquired by LEAs and the passcodes of the devices demanded.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Therefore, considering the aforementioned points, it is pertinent to remember that the right against self-incrimination does not exist in a vacuum separate from privacy. It originates from the concept of decisional autonomy – the right of individuals to make decisions about matters intimate to their life without interference from the state and society. &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;&lt;em&gt;Puttuswamy I&lt;/em&gt;&lt;/a&gt; observed that decisional autonomy is the bedrock of the right to privacy, as privacy allows an individual to make these intimate decisions away from the glare of society and/or the state. This has heightened importance in this context as interference with such autonomy could lead to the person in question facing criminal prosecution. The SC in &lt;a href="https://main.sci.gov.in/jonew/judis/36303.pdf"&gt;&lt;em&gt;Selvi v Karnataka&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;and &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;&lt;em&gt;Puttuswamy I&lt;/em&gt;&lt;/a&gt; has repeatedly affirmed that the right against self-incrimination and the right to privacy are linked concepts, with the court observing that the right to remain silent is an integral aspect of decisional autonomy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In &lt;a href="http://karnatakajudiciary.kar.nic.in:8080/repository/rep_judgmentcase.php"&gt;&lt;em&gt;Virendra Khanna&lt;/em&gt;&lt;/a&gt;, the Karnataka High Court (HC) dealt with the privacy and self-incrimination concerns caused by LEAs compelling the disclosure of passwords. The HC brushes aside concerns related to privacy by noting that the right to privacy is not absolute and that an exception to the right to privacy is state interest and protection of law and order (para 5.11), and that unlawful disclosure of material to third parties could be an actionable wrong (para 15). The court’s interpretation of privacy effectively provides a free pass for the police to interfere with the right to privacy under the pretext of a criminal investigation. This conception of privacy is inadequate as the issue of proportionality is avoided, and the court does not attempt to ensure that the interference is proportionate with the outcome.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;US courts also see the compelling of production of passcodes as an issue of self-incrimination as well as privacy. In its judgement in &lt;a href="https://casetext.com/case/in-re-application-for-a-search-warrant?__cf_chl_f_tk=lTxiJpZIvKfkIBtGQJtMObSmqhdRUZdjGk5hXeMfprQ-1642253001-0-gaNycGzNCJE"&gt;&lt;em&gt;Application for a Search Warrant&lt;/em&gt;&lt;/a&gt;, a US court observed that compelling the disclosure of passcodes existed at an intersection of the right to privacy and self-incrimination; the right against self-incrimination serves to protect the privacy interests of suspects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Disclosure of passwords to digital devices amounts to an intrusion of the privacy of the suspect as the collective contents on the digital device effectively amount to providing LEAs with a method to observe a person’s mind and identity. Police investigative techniques cannot override fundamental rights and must respect the personal autonomy of suspects – particularly, the choice between silence and speech. Through the production of passwords, LEAs can effectively get a snapshot of a suspect’s mind. This is analogous to the polygraph and narco-analysis test struck down as unconstitutional by the SC in &lt;a href="https://main.sci.gov.in/jonew/judis/36303.pdf"&gt;&lt;em&gt;Selvi&lt;/em&gt;&lt;/a&gt; as it violates decisional autonomy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As &lt;a href="https://theproofofguilt.blogspot.com/2021/03/mobile-phones-and-criminal.html"&gt;Sekhri&lt;/a&gt; noted, a criminal process that reflects the aspirations of the &lt;em&gt;Puttuswamy &lt;/em&gt;judgement would require LEAs to first explain with reasonable detail the material which they wish to find in the digital devices. Secondly, they must provide a timeline for the investigation to ensure that individuals are not subjected to inexhaustible investigations with police roving through their devices indefinitely. Thirdly, such a criminal process must demand, a higher burden to be discharged from the state if the privacy of the individual is infringed upon. These aspirations should form the bedrock of a system of judicial warrants that LEAs ought to be required to comply with if they wish to compel the disclosure of passwords from individuals. The framework proposed above is similar to the &lt;a href="http://karnatakajudiciary.kar.nic.in:8080/repository/rep_judgmentcase.php"&gt;&lt;em&gt;Virendra Khanna&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;guidelines, as they provide a system of checks and balances that ensure that the intrusion on privacy is carried out proportionately; additionally, it would require LEAs to show a real requirement to demand access to the device. The independent eyes of a judicial magistrate provide a mechanism of oversight and a check against abuse of power by LEAs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The criminal law apparatus is the most coercive power available to the state, and, therefore, privacy rights will become meaningless unless they can withstand it. Several criminal procedures in the country are rooted in colonial statutes, where the rights of the populace being policed were never a consideration; hence, a radical shift is required. However, post-1947 and &lt;em&gt;Puttuswamy&lt;/em&gt;, the ignorance and refusal to submit to the rights of the population can no longer be justified and significant reformulation is necessary to guarantee meaningful protections to device owners. There is a need to ensure that the rights of individuals are protected, especially when the motivation for their infringement is the supposed noble intentions of the criminal justice system. Failing to defend the right to privacy in these moments would be an invitation for allowing the power of the state to increase and inevitably become absolute.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rethinking-acquisition-of-digital-devices-by-law-enforcement-agencies'&gt;https://cis-india.org/internet-governance/blog/rethinking-acquisition-of-digital-devices-by-law-enforcement-agencies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Harikartik Ramesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-05-02T09:27:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
