<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 3611 to 3625.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-open-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/events/wikipedia-workshop-in-theme-of-sou-dhuni-teen-pune-university"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/edit-a-thon-to-improve-kannada-language-science-related-wikipedia-articles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/journalism-students-of-the-shree-dharmasthala-manjunatheshwara-sdm-college-ujire-enrich-karnataka2019s-folklore-and-folk-art-in-kannada-wikipedia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/wikipedia-edit-a-thon-in-mangalore-to-bring-tulu-wikipedia-live"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/blog_war-driving-in-lhasa-vegas"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/the-hindu-august-23-2015-talamaddale-on-august-23"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/sahil-online-august-14-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/karavali-karnataka-august-14-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/a2kga-global-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/mangalorean-dotcom-august-13-2015"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-open-review">
    <title>Civil Society Organisations and Internet Governance in Asia - Open Review</title>
    <link>https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-open-review</link>
    <description>
        &lt;b&gt;This is a book section written for the third volume (2000-2010) of the Asia Internet History series edited by Prof. Kilnam Chon. The pre-publication text of the section is being shared here to invite suggestions for addition and modification. Please share your comments via email sent to raw[at]cis-india[dot]org with 'Civil Society Organisations and Internet Governance in Asia - Comments' as the subject line. This text is published under Creative Commons Attribution-NoDerivatives 4.0 International license.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;You are most welcome to read the pre-publication drafts of other sections of the Asia Internet History Vol. 3, and share your comments: &lt;a href="https://sites.google.com/site/internethistoryasia/book3" target="_blank"&gt;https://sites.google.com/site/internethistoryasia/book3&lt;/a&gt;.&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Preparations for the World Summit on the Information Society&lt;/h2&gt;
&lt;p&gt;The World Summit on the Information Society (WSIS) conferences organized by the United Nations in Geneva (2003) and Tunis (2005) initiated crucial platforms and networks, some temporary and some continued, for various non-governmental actors to intensively and periodically take part in the discussions of governance of Internet and various related activities towards the goals of inclusive development and human rights. Many of the civil society organizations taking part in the WSIS conferences, as well as the various regional and thematic preparatory meetings and seminars, had little prior experience in the topic of Internet governance. They were entering these conversations from various perspectives, such as local developmental interventions, human and cultural rights activism, freedom and diversity of media, and gender and social justice. With backgrounds in such forms of applied practice and theoretical frameworks, members of these civil society organizations often faced a difficult challenge in articulating their experiences, insights, positions, and suggestions in terms of the (then) emerging global discourse of Internet governance and that of information and communication technologies (ICTs) as instruments of development. At the WSIS: An Asian Response Meeting in 2002, Susanna George, (then) Executive Director of Isis International, Manila, succinctly expressed this challenge being faced by the members of civil society organizations:&lt;/p&gt;
&lt;blockquote&gt;For some feminist activists however, including myself, it has felt like trying to squeeze my concerns into a narrow definition of what gender concerns in ICTs are. I would like it to Cinderella’s ugly sister cutting off her toe to fit into the dainty slipper of gender concerns in ICTs. The development ball, it seems, can only accommodate some elements of what NGO activists, particularly those from the South, are concerned about in relation to new information and communications technologies. (George 2002)&lt;/blockquote&gt;
&lt;p&gt;The above mentioned seminar, held in Bangkok, Thailand, on November 22-24, 2002, was a crucial early meeting for the representatives from Asian civil society organizations to share and shape their understanding and positions before taking part in the global conversations during the following years. The meeting was organised by Bread for All (Switzerland), Communication Rights in the Information Society Campaign (Netherlands), Forum-Asia (Thailand), and World Association for Christian Communication (United Kingdom), as a preparatory meeting before the Asia-Pacific Regional Conference of WSIS, with 34 organizations from 16 Asian countries taking part in it. The Final Document produced at the end of this seminar was quite a remarkable one. It highlighted the simultaneity of Asia as one of the global centres of the information economy and the everyday reality of wide-spread poverty across the Asian countries, and went on to state that the first principle for the emerging global information society should be that the '[c]ommunication rights are fundamental to democracy and human development' (The World Summit on the Information Society: An Asian Response 2002). It proposed the following action items for the efforts towards a global inclusive information society: 1) strengthen community, 2) ensure access, 3) enhance the creation of appropriate content, 4) invigorate global governance, 5) uphold human rights, 6) extend the public domain, 7) protect and promote cultural and linguistic diversity, and 8) ensure public investment in infrastructure (ibid.).&lt;/p&gt;
&lt;p&gt;Immediately after this Conference, several Asian civil society organizations attended the Asian Civil Society Forum, organised as part of the Conference of Non-governmental Organizations in Consultative Relations with the United Nations (CONGO), held in Bangkok, Thailand, during December 9-13, 2002. Representatives of Dhaka Ahsania Mission (Bangladesh), OneWorld South Asia (India), GLOCOM (Japan), Foundation for Media Alternative (Philippines), Korean Progressive Network – JINBONET (Republic of Korea), Friedrich Naumann Foundation (Singapore), International Federation of University Women (Switzerland), and Forum Asia (Regional) drafted a Joint Statement emphasising that a 'broad-based participation of civil society, especially from those communities which are excluded, marginalized and severely deprived, is critical in defining and building such a [true communicative, just and peaceful] society' (Aizu 2002). In the very next month, the Asia-Pacific Regional Conference was held in Tokyo during January 13-15, 2003, 'to develop a shared vision and common strategies for the “Information Society' (WSIS Executive Secretariat 2003: 2). The conference saw participation of representatives from 47 national governments, 22 international organizations, 54 private sector agencies, and 116 civil society organizations across the Asia-Pacific region. The Tokyo Declaration, the final document prepared at the conclusion of the Conference, recognized that:&lt;/p&gt;
&lt;blockquote&gt;[T]he Information Society must ... facilitate full utilization of information and communication technologies (ICT) at all levels in society and hence enable the sharing of social and economic benefits by all, by means of ubiquitous access to information networks, while preserving diversity and cultural heritage. (Ibid.: 2)&lt;/blockquote&gt;
&lt;p&gt;Further, it highlighted the following priority areas of action: 1) infrastructure development, 2) securing affordable, universal access to ICTs, 3) preserving linguistic and cultural diversity and promoting local content, 4) developing human resources, 5) establishing legal, regulatory and policy frameworks, 6) ensuring balance between intellectual property rights (IPR) and public interest, 7) ensuring the security of ICTs, and 8) fostering partnerships and mobilizing resources. It is not difficult to see how the focus of necessary actions shifted from an emphasis on concerns of community and human rights, and public investments and commons, towards those of  legal and policy mechanisms, multi-partner delivery of services, and intellectual property rights. Civil society organizations, expectedly, felt sidelined in this Conference, and decided to issue a join statement of Asian civil society organizations to ensure that their positions are effectively presented. The first two topics mentioned in this document were: 1) '[c]ommunication rights should be fully recognized as a fundamental and universal human right to be protected and promoted in the information society,' and 2) '[t]he participation of civil society in the information society at all levels should be ensured and sustained, from policy planning to implementation, monitoring and evaluation' (UNSAJ et al 2003). The joint statement was endorsed by 30 civil society organizations: UDDIPAN (Bangladesh); COMFREL (Cambodia); ETDA (East Timor); The Hong Kong Council of Social Services (Hong Kong); Food India, IT for Change (India); Indonesian Infocom Society (Indonesia); Active Learning, CPSR, Forum for Citizens' Television and Media, JTEC, Kyoto Journal, Ritsumeikan University Media Literacy Project, UNSAJ (Japan); Computer Association Nepal, Rural Area Development Programme (Nepal); APC Women's Networking Support Programme, Foundation for Media Alternatives, ISIS International (Philippines); Citizens' Action Network, Korean Progressive Network – Jinbonet, Labor News Production, ZAK (Republic of Korea); e-Pacificka Consulting (Samoa); National University of Singapore (Singapore); Public Television Service, Taiwan Association for Human Rights (Taiwan); Asian-South Pacific Bureau for Adult Education, FORUM ASIA, and TVE Asia Pacific (Regional) (Ibid.).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Participation in the WSIS Process&lt;/h2&gt;
&lt;p&gt;The first WSIS conference was held in Geneva in December 2003. Through the processes of organizing this conference, and the second one in Tunis in November 2005, United Nations expressed a clear intention of great participation of actors from the private companies, civil society, academia, and media, along with the governmental organizations. During the first meeting of the WSIS Preparatory Committee (PrepCom-1) in Geneva, during July 1-5, 2002, the civil society organizations demanded that they should be allowed to co-shape the key topics to be discussed during the first conference (2003). There was already an Inter-Governmental Subcommittee on Contents and Themes, but no equivalent platform for the civil society organizations was available. With the approval of the Civil Society Plenary (CSP), the Civil Society Subcommittee on Content and Themes (WSIS-SCT) was instituted during PrepCom-1 (WSIS-SCT 2003b). At the second WSIS Preparatory Committee meeting (PrepCom-2) in Geneva, during February 17-28, 2003, the WSIS-SCT produced a summary of the views of its members titled 'Vision and Principles of Information and Communication Societies,' and also a one page brief titled 'Seven Musts: Priority Principles Proposed by Civil Society' to be used for lobbying purposes (Ibid.). This brief mentioned seven key principles of Internet governance identified by the civil society organization taking part in the WSIS process: (1) sustainable development, (2) democratic governance, (3) literacy, education, and research, (4) human rights, (5) global knowledge commons, (6) cultural and linguistic diversity, and (7) information security (WSIS-SCT 2003a).&lt;/p&gt;
&lt;p&gt;Asian civil society organizations that took part in the PrepCom-2 meeting included United Nations Association of China (China); CASP - Centre for Adivasee Studies and Peace, C2N - Community Communications Network (India); ICSORC - Iranian Civil Society Organizations Resource Center (Iran); GAWF - General Arab Women Federation (Iraq); Daisy Consortium, GLOCOM - Center for Global Communications (Japan); Association for Progressive Communication, Global Knowledge Partnership (Malaysia); Pakistan Christian Peace Foundation (Pakistan); WFEO - World Federation of Engineering  Organization (Palestine); Asian South Pacific Bureau of Adult Education, Foundation for Media Alternatives, ISIS International – Manila (Philippines); Korean Progressive Network - Jinbonet (Republic of Korea); IIROSA - International Islamic Relief Organization (Saudi Arabia); and Taking IT Global (India, Indonesia, Malaysia, Philippines, and Turkey) (ITU 2003a).&lt;/p&gt;
&lt;p&gt;All these efforts led to development of the Civil Society Declaration to the World Summit on the Information Society, which was prepared and published by the Civil Society Plenary at the Geneva conference, on December 08, 2003. The Declaration was titled 'Shaping Information Societies for Human Needs' (WSIS Civil Society Plenary 2003). The Asian civil society organization that took part in the Geneva conference were BFES - Bangladesh Friendship Education Society, Drik, ICTDPB - Information &amp;amp; Communication Technology Development Program, Proshika - A Center for Human Development (Bangladesh); China Society for Promotion of the Guangcai Programme, Chinese People's Association for Friendship with Foreign Countries, United Nations Association of China (China); The Hong Kong Council of Social Service (Hong Kong); CASP - Centre for Adivasee Studies and Peace, Childline India Foundation / Child Helpline International, DAWN - Development Alternatives with Women for a New Era (India); Communication Network of Women's NGOs in Iran, Green front of Iran, ICTRC - Iranian Civil Society Organizations Training and Research Center, Islamic Women's Institute of Iran, Institute for Women's Studies and Research, Organization for Defending Victims of Violence (Iran); ILAM - Center for Arab Palestinians in Israel (Israel); Citizen Digital Solutions, Forum for Citizens' Television and Media, GLOCOM - Center for Global Communications, JCAFE - Japan Computer Access for Empowerment, Soka Gakkai International (Japan); LAD-Nepal - Literary Academy for Dalit of Nepal (Nepal); Asia-Pacific Broadcasting Union, Global Knowledge Partnership (Malaysia); PAK Educational Society / Pakistan Development Network, SMEDA - Small &amp;amp; Medium Enterprise Development Authority (Pakistan); Palestine IT Association of Companies (Palestine); Isis International – Manila, Ugnayan ng Kababaihan sa Pulitika / Philippine Women's Network in Politics and Governance (Philippines); Citizen's Alliance for Consumer Protection of Korea, Korean Civil Society Network for WSIS (Republic of Korea); Youth Challenge (Singapore); Association for Progressive Communications (India and Philippines), CITYNET - Regional Network of Local Authorities for the Management of Human Settlements (India. Mongolia, and Philippines), Taking IT Global (India and Philippines) (ITU 2003b).&lt;/p&gt;
&lt;p&gt;As the preparatory meetings and consultations towards the second WSIS conference advanced during the next year, the Asian civil society organizations attempted to engage more directly with the global Internet governance processes on one hand, and the national Internet and ICT policy situations on the other. Writing about their encounters at and before the second Preparatory Committee meeting of the Tunis conference, held in Geneva during February 17-25, 2005, Anita Gurumurthy and Parminder Jeet Singh made several early observations that have continued to resonate with the experiences of Asian civil society organizations throughout the decade (Gurumurthy &amp;amp; Singh 2005). Firstly, they indicated that the government agencies present in the dialogues tend to take diverging positions in international events and domestic contexts. Secondly, there was a marked absence of formal and informal discussions between the governmental and the civil society representatives of the same country present at the meeting. The government agencies were clearly disinterested in involving civil society organizations in the process. Thirdly, the civil society actors present in the meeting were mostly from the ICT for Development sector, and the organizations working in more 'traditional' sectors – such as education, health, governance reform, etc. – remained absent from the conversations. This is especially problematic in the case of such developing countries where there does not exist strategic linkages between civil society organizaions focusing on topics of technologized developmental interventions, and those involved in more 'traditional' development practices. Rekha Jain, in a separate report on the Indian experience of participating in the WSIS process, re-iterates some of these points (Jain 2006). She notes that '[w]hile the Secretary, [Department of Telecommunications, Government of India] was involved in (PrepCom-1) drafting the initial processes for involvement of NGOs, at the national level, this mechanism was not translated in to a process for involving the civil society or media' (Ibid.: 14).&lt;/p&gt;
&lt;p&gt;The frequent lack of interest of national governments, especially in the Asian countries, to engage with civil society organizations on matters of policies and projects in Internet governance and ICTs for development (Souter 2007), further encouraged these organization to utilise the global discussion space opened up by the WSIS process to drive the agendas of democratisation of Internet governance processes, and protection and advancement of human rights and social justice. The second WSIS conference held in Tunis, during November 16-18, 2005, however, did not end in a positive note for the civil society organizations as a whole. The sentiment is aptly captured in the title of the Civil Society Statement issued after the Tunis Conference: 'Much more could have been achieved' (WSIS Civil Society Plenary 2005). Apart from producing this very important critical response to the WSIS process, within a month of its conclusions, the civil society organization contributed effectively in one of the more longer-term impacts of the process – the establishment of the Internet Governance Forums (IGFs). Immediately after the publication of the Report of the Working Group on Internet Governance (Desai et al) in June 2005, the Center for Global Communications (GLOCOM), Japan, acting on behalf of the Civil Society Internet Governance Caucus, came forward with public support for 'the establishment of a new forum to address the broad agenda of Internet governance issues, provided it is truly global, inclusive, and multi-stakeholder in composition allowing all stakeholders from all sectors to participate as equal peers' (WSIS Civil Society Internet Governance Caucus 2005: 3).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Asian Civil Society Organizations at the IGFs&lt;/h2&gt;
&lt;p&gt;In 2006, the WSIS Civil Society Internet Governance Caucus was reformed and established as a permanent 'forum for discussion, advocacy, action, and for representation of civil society contributions in Internet governance processes' (Civil Society Internet Government Caucus 2006). Representatives from Asian civil society organizations have consistently played critical roles in the functionings of this Caucus. Youn Jung Park of the Department of Technology and Society, SUNY Korea, co-founded and co-coordined the original Caucus in 2003. Adam Peake of the Center for Global Communications (GLOCOM), International University of Japan, was co-coordinator of the original Caucus from 2003 to 2006. Parminder Jeet Sing of IT for Change, India, was elected as one of the co-cordinators of the newly reformed Caucus in 2006, with the term ending in 2008. Izumi Aizu of the Institute for HyperNetwork Society and the Institute for InfoSocinomics, Tama University, Japan served as the co-coordinator of the Caucus during 2010-2012.&lt;/p&gt;
&lt;p&gt;The first Internet Governance Forum organized in Athens, October 30 – November 2, 2006, saw participation from a very few Asian civil society organizations, mostly from Bangladesh and Japan (IGF 2006). The second Internet Governance Forum in Rio de Janeiro, November 12-15, 2007 had a wider representation from Asian civil society organizations: Bangladesh NGOs Network for Radio and Communication, BFES - Bangladesh Friendship Education Society, VOICE – Voices for Interactive Choice and Empowerment (Bangladesh); China Association for Science and Technology, Internet Society of China (China); University of Hong Kong (Hong Kong); Alternative Law Forum (via Association for Progressive Communications - Women's Networking Support Programme), Indian Institute of Technology in Delhi, IT for Change (India); GLOCOM, Kumon Center, Tama University (Japan); Sustainable Development Networking Programme (Jordan); Kuwait Information Technology Society (Kuwait); Assocation of Computer Engineers – Nepal, Rural Area Development Programme, Nepal Rural Information Technology Development Society (Nepal); Bytesforall – APC / Pakistan, Pakistan Christian Peace Foundation (Pakistan); Foundation for Media Alternatives, Philippine Resources for Sustainable Development Inc. (Philippines); and LIRNEasia (Sri Lanka). At the Open IGF Consultations in Geneva, on February 26 2008, the Internet Governance Caucus made two significant submissions: 1) that, although structuring the IGF sessions in Athens and Rio de Janeiro around the large themes of access, openness, diversity, and security have been useful to open up the multi-stakeholder dialogues, it is necessary to begin focused discussions of specific public policy issues to take the IGF process forward (Civil Society Internet Governance Caucus 2008a), and 2) that the Multi-Stakeholder Advisory Group (MAG), which drives the IGF process and events, should be made more proactive and transparent, and expanded in size so as to better include the different stakeholder groups who may self-identify their representatives for the MAG (Civil Society Internet Governance Caucus 2008b).&lt;/p&gt;
&lt;p&gt;On one hand, the IGF Hyderabad, December 3-6, 2008, experienced a decline in the percentage of participants from civil society organizations and a rather modest increase in the percentage of participants from Asian countries (see: 6.1.5. Annexe – Tables), especially since this was the first major international Internet governance summit held in an Asian country. On the other hand, the Civil Society Internet Governance Caucus succeeded to bring forth the term 'enhanced cooperation,' as mentioned in the Tunis Agenda, to be addressed and discussed in one of the main sessions of the Forum (IGF 2008). The next IGF held in Sharm El Sheikh, November 15-18, 2009, saw further decline of participation from both the representatives of civil society organizations, and the attendees from Asian countries (see: 6.1.5. Annexe – Tables). In this context, Youn Jung Park made the following statement in the Stock Taking session of the summit:&lt;/p&gt;
&lt;blockquote&gt;As a cofounder of WSIS Civil Society Internet Governance Caucus in 2003, I would like to remind you ... [that] Internet Governance Forum was created as a compromise between those who supported the status quo Internet governance institution under one nation's status provision, and those who requested for more balanced roles for governments under international supervision of the Internet. While IGF has achieved a great success of diluting of such political tension between those who have different views of how to institutionalize Internet governance, ironically Internet governance forum became a forum without governance... [We] have to admit [that] IGF failed to deliver another mandate of the U.N. WSIS: Continuing discussion of how to design Internet governance institutions... The current IGF continues to function as knowledge transfer of ICANN's values to other stakeholders, while those who want to discuss and negotiate on how to design Internet governance institutions should have another platform for that specific U.N. WSIS mandate. (IGF 2009)&lt;/blockquote&gt;
&lt;p&gt;The first Asia Pacific Regional Internet Governance Forum (APrIGF) was held in Hong Kong on June 14-16, 2010. The organising committee included three civil society / acadmic organizations – Center for Global Communications (GLOCOM), Internet Society Hong Kong, and National University of Singapore – and three indpendent experts –  Kuo-Wei Wu (Taiwan), Norbert Klein (Cambodia), and Zahid Jamil (Pakistan). Though the Forum had dominant presence from government and private sector participants, several representatives from Asian civil society / academic organizations spoke at the sessions: Ang Peng Hwa (Singapore Internet Research Centre, Nanyang Technological University), Charles Mok (Internet Society Hong Kong), Christine Loh (Civic Exchange), Chong Chan Yau (Hong Kong Blind Union), Clarence Tsang (Christian Action), Ilya Eric Lee (Taiwan E-Learning and Digital Archives Program, and Research Center for Information Technology Innovation),  Izumi Aizu (Institute for HyperNetwork Society, and Institute for InfoSocinomics, Kumon Center, Tama University), Oliver “Blogie” Robillo (Mindanao Bloggers Community), Parminder Jeet Singh (IT for Change), Priscilla Lui (Against Child Abuse in Hong Kong), Tan Tin Wee (Centre for Internet Research, National University of Singapore), and Yap Swee Seng (Asian Forum for Human Rights and Development). As Ang Peng Hwa noted at the beginning of the summit, its key objective was to provide a formal space for various stakeholders from the Asia-Pacific region to discuss and provide inputs to the IGF process (APrIGF 2010). The regional forum was successful in enabling newer civil society entrants from the Asia-Pacific region to familiarize themselves with the IGF process, and to contribute to it. Oliver “Blogie” Robillo, represented and submit recommendations from Southeast Asian civil society organizations at IGF Vilnius, September 14-17, 2010, which was the first time he took part in the summit series. He emphasised the following topics: 1) openness and freedom of expression are the basis of democracy, and state-driven censorship of Internet in the region is an immediate threat to such global rights, 2) coordinated international efforts need to address and resolve not only global digital divides, but also the divides at regional, national, and sub-nationals scales, 3) the right to privacy is an integral part of cybersecurity, as well as a necessary condition for exercising human rights, 4) global Internet governance efforts must ensure that national governments do not control and restrict abilities of citizens to express through digital means, and it should be aligned with the universal human rights agenda, and 5) even after 5 years of the IGF process, a wider participation of civil society organizations, especially from the Asia-Pacific regions, remains an unachieved goal, which can only be achived if specific resources are allocated and processes are implemented (IGF 2010).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Internet Censorship and Civil Society Responses&lt;/h2&gt;
&lt;p&gt;Throughout the decade of 2000-2010, censorship of Internet and restriction of digital expression remained a crucial Internet rights concern across the world, and especially the Asian countries. One of the earliest global reports on the matter was brought out by the Reporters without Borders. In 2006, it published a list of countries marked as 'Internet Enemies' that featured 16 countries, out of which 11 were from Asia: China, Iran, Maldives, Myanmar (then, Burma), Nepal, North Korea, Saudi Arabia, Syria, Turkmenistan, Uzbekistan, and Vietnam (Reporters without Borders 2006). The list was updated in 2007, and three of these countries – Libya, Maldives, and Nepal – were taken off (Ibid.). The unique contradictions of the Asian region were sharply foregrounded in the 2006-07 report on Internet censorship by OpenNet Initiative, which noted:&lt;/p&gt;
&lt;blockquote&gt;Some of the most and least connected countries in the world are located in Asia: Japan, South Korea, and Singapore all have Internet penetration rates of over 65 percent, while Afghanistan, Myanmar, and Nepal remain three of thirty countries with less than 1 percent of its citizens online. Among the countries in the world with the most restricted access, North Korea allows only a small community of elites and foreigners online. Most users must rely on Chinese service providers for connectivity, while the limited number North Korean–sponsored Web sites are hosted abroad... [T]hough India’s Internet community is the fifth largest in the world, users amounted to only about 4 percent of the country’s population in 2005. Afghanistan, Myanmar, and Nepal are among the world’s least-developed countries. Despite the constraints on resources and serious developmental and political challenges, however, citizens are showing steadily increasing demand for Internet services such as Voice-over Internet Protocol (VoIP), blogging, and chat. (Wang 2007)&lt;/blockquote&gt;
&lt;p&gt;The report further described the strategy used by various Asian governments of 'delegation of policing and monitoring responsibilities to ISPs, content providers, private corporations, and users themselves' (Ibid.) These mechanisms enforce self-surveillance and self-censorship in the face of threats of loss of commercial license, denial of services, and even criminal liability. Defamation suits and related civil and criminal liability have also been used by several Asian governments to silence influential critics and protesters. Direct technical filtering of Internet traffic (especially inwards traffic) and blocking of URLS via government directives sent to Internet Service Providers (ISPs) have also been common practice in key Asian countries (Ibid.). Expectedly, such experiences of oppression led to widespread campaigns and communications by the Asian civil society organizations, as can be sensed from the above mentioned submission by Oliver “Blogie” Robillo at IGF Vilnius.&lt;/p&gt;
&lt;p&gt;Among the Asian countries, the comprehensive technologies of censorship developed and deployed by China has been studied most extensively. The Golden Shield Project was initiated by the Ministry of Public Security of China in 1998 to undertake blanket blocking of incoming Internet traffic based on specific URLs and terms. Evidences of the project getting operationalised became available in 2003 (Garden Networks for Freedom of Information 2004). Censorship of Internet in China, however, has not only been dependent on such sophisticated systems. In 2003, it was made mandatory for all residents of Lhasa, Tibet, to use a specific combination and password to access Internet, which was directly linked to their names and address. An Internet ID Card was issued by the government to implement this (International Campaign for Tibet. 2004). Tibet Action Institute has been a key civil society organization at the forefront of cyber-offensive of the Chinese government. A recent documentary by the Institute, titled 'Tibet: Frontline of the New Cyberwar,' has narrated how it has worked closely with the Citizen Lab, Munk School of Global Affairs, University of Toronto, to identify, trace, and resist the malware- and other cyber-attacks experienced by the civil society actors and websites in favor of independence of Tibet (Tibet Action Institute 2015). Not only activists supporting the Tibetan cause, digital security training emerged as an important aspect of the life of civil society organizations during the decade. Asian organizations like Bytes for All (Pakistan) and Myanmar ICT for Development Organization (Mynamar), as well as international organizations like Front Line Defenders and Citizen Lab have educated and supported civil society activities much beyond the Internet governance sphere with tools and techniques for effectively using digital channels of communications, and defending themselves for cyber-threats.&lt;/p&gt;
&lt;p&gt;Combination of traditional forms of civil society mobilizations and digital techniques have often been used resist attempts by Asian governments to control the online communication space. Huma Yusuf has extensively studied the emergence of hybrid media strategies, using both old media channels like newspapers and new media channels like blogs and video sharing platforms, among citizen journalists and civil society activists in Pakistan as the government took harsh steps towards control of both traditional and online media during 2007-2008 (Yusuf 2009). She has carefully traced how possibilities of new forms of information and media sharing enabled by Internet were initially identified and implemented by citizen journalists and student activists, which was quickly learned and re-deployed by more formal organisation, such as print and electronic news companies, and civil society organizations like those involved in election monitoring (Ibid.). Malaysia also experienced fast-accelerating face-off between the government and the civil society during 2007-2010, as the former started intervening directly into censoring blogs and newspaper websites. On one hand, the government took legal actions against critical bloggers, either directly or indirectly, and on the other it instructed ISPs to block 'offensive content.' It also borrowed the 'Singapore-model' to mandate registration of bloggers with government authorities, if they are identifed as writing on socio-political topics. The civil society actors responded to these oppressive steps by setting up a new blog dedicated to coverage of the defamation cases (filed against prominent bloggers), and publicly sharing instructions for circumvention of the blocks imposed by ISPs. The National Alliance of Bloggers was soon formed, which organised the “Blogs and Digital Democracy” forum on October 3, 2007 (Thien 2011: 46-47). Similarly, Bloggers Against Censorship campaign took shape in India in 2006 as the government first directed ISPs to block specific blogs hosted on Blogspot, TypePad, and Yahoo! Geocities, and then went for complete blocking of Yahoo! Geocities as the ISPs failed to block specific sub-domains of the platform (Bloggers Collective Group 2006). Learning from this experience, the following year Indian government decided to work directly with Orkut to take down 'defamatory content' about a politician (The Economic Times 2007). This is common for other Asian governments too, as they have continued to develop more legally binding and technically sophisticated measures to monitor and control online expression.&lt;/p&gt;
&lt;p&gt;In the 'Internet Enemies Report 2012,' Reporters without Borders listed 12 countries as 'enemies of the Internet,' out of which 10 were from Asia – Bahrain, China, Iran, Myanmar, North Korea, Saudi Arabia, Syria, Turkmenistan, Uzbekistan, and Vietnam – and it named 14 countries that are conducting surveillance on its citizens, out of which 7 were from Asia – India, Kazakhstan, Malaysia, South Korea, Sri Lanka, Thailand, and United Arab Emirates (Reporters without Borders 2012). At the APrIGF held in Tokyo, July 18-20, 2012, a group of delegates from civil society organizations working in the South-East Asian region issued a joint statement with a clear call for global action against the shrinking space for freedom of (digital) expression in the region (Thai Netizen Network et al 2012). They specifically noted the following national acts as examples of the legislative mechanisms being used by different Asian governments to criminalize online speech and/or to harass public dissenters:&lt;/p&gt;
&lt;blockquote&gt;Burma – The 2004 Electronic Transactions Act&lt;br /&gt;
Cambodia – The 2012 Draft Cyber-Law, the 1995 Press Law, and the 2010 Penal Code&lt;br /&gt;
Malaysia – The 2012 Amendment to the Evidence Act and the 2011 Computing Professionals Bill&lt;br /&gt;
Indonesia – The 2008 Law on Information and Electronic Transaction and the 2008 Law on Pornography&lt;br /&gt;
The Philippines – The 2012 Data Privacy Act&lt;br /&gt;
Thailand – The 2007 Computer Crimes Act, the Article 112 of the Penal Code, and the 2004 Special Case Investigation Act&lt;br /&gt;
Vietnam – The 1999 Penal Code, the 2004 Publishing Law, the 2000 State Secrets Protection Ordinance, and the 2012 Draft Decree on Internet Management. (Ibid.)&lt;/blockquote&gt;
&lt;p&gt;The statement was co-signed by Thai Netizen Network, Thai Media Policy Centre,  The Institute for Policy Research and Advocacy (ELSAM), Southeast Asian Press Alliance (SEAPA), Southeast Asian Centre for e-Media (SEACeM), Victorius (Ndaru) Eps, Community Legal Education Center (CLEC), Sovathana (Nana) Neang, Asian Forum for Human Rights and Development (FORUM-ASIA), and was endorsed by ICT Watch (Indonesian ICT Partnership Association).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Annexe – Tables&lt;/h2&gt;
&lt;h3&gt;Table 1: Participation from Asian Countries and of representatives from Asian civil society organisations in IGFs, 2006-2010&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Event&lt;/th&gt;
&lt;th&gt;Participants from Asian Countries&lt;/th&gt;
&lt;th&gt;Participants from Civil Society Organizations&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IGF Athens 2006&lt;/td&gt;
&lt;td&gt;11%&lt;/td&gt;
&lt;td&gt;29%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IGF Rio de Janeiro 2007&lt;/td&gt;
&lt;td&gt;13%&lt;/td&gt;
&lt;td&gt;32%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IGF Hyderabad 2008&lt;/td&gt;
&lt;td&gt;56% from India, and 15% from other Asian countries&lt;/td&gt;
&lt;td&gt;25%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IGF Sharm El Sheikh 2009&lt;/td&gt;
&lt;td&gt;17%&lt;/td&gt;
&lt;td&gt;19%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IGF Vilnius 2010&lt;/td&gt;
&lt;td&gt;Not Available&lt;/td&gt;
&lt;td&gt;Not Available&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Source: Reports available on Internet Governance Forum website (http://igf.wgig.org/cms).&lt;/p&gt;
&lt;h3&gt;Table 2: Internet Society Chapters in Asia&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Chapter&lt;/th&gt;
&lt;th&gt;Year of Establishment&lt;/th&gt;
&lt;th&gt;URL&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Afghanistan&lt;/td&gt;
&lt;td&gt;In formation&lt;/td&gt;
&lt;td&gt;Not available&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bahrain&lt;/td&gt;
&lt;td&gt;2001&lt;/td&gt;
&lt;td&gt;http://www.bis.org.bh/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bangladesh&lt;/td&gt;
&lt;td&gt;2011&lt;/td&gt;
&lt;td&gt;http://www.isoc.org.bd/dhaka/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hong Kong&lt;/td&gt;
&lt;td&gt;2005&lt;/td&gt;
&lt;td&gt;http://www.isoc.hk/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;India (Bangalore)&lt;/td&gt;
&lt;td&gt;2010&lt;/td&gt;
&lt;td&gt;http://www.isocbangalore.org/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;India (Chennai)&lt;/td&gt;
&lt;td&gt;2007&lt;/td&gt;
&lt;td&gt;http://www.isocindiachennai.org/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;India (Delhi)&lt;/td&gt;
&lt;td&gt;2002. Rejuvenated in  2008.&lt;/td&gt;
&lt;td&gt;http://www.isocdelhi.in/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;India (Kolkata)&lt;/td&gt;
&lt;td&gt;2009&lt;/td&gt;
&lt;td&gt;http://isockolkata.in/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;India (Trivandrum)&lt;/td&gt;
&lt;td&gt;2015&lt;/td&gt;
&lt;td&gt;Not available&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Indonesia&lt;/td&gt;
&lt;td&gt;2014&lt;/td&gt;
&lt;td&gt;http://www.isoc.or.id/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Israel&lt;/td&gt;
&lt;td&gt;1995&lt;/td&gt;
&lt;td&gt;http://www.isoc.org.il/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Japan&lt;/td&gt;
&lt;td&gt;1994&lt;/td&gt;
&lt;td&gt;http://www.isoc.jp/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lebanon&lt;/td&gt;
&lt;td&gt;2010&lt;/td&gt;
&lt;td&gt;http://www.isoc.org.lb/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Malaysia&lt;/td&gt;
&lt;td&gt;2010&lt;/td&gt;
&lt;td&gt;http://www.isoc.my/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Nepal&lt;/td&gt;
&lt;td&gt;2007&lt;/td&gt;
&lt;td&gt;http://www.internetsociety.org.np/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pakistan (Islamabad)&lt;/td&gt;
&lt;td&gt;2013&lt;/td&gt;
&lt;td&gt;http://www.isocibd.org.pk/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Palestine&lt;/td&gt;
&lt;td&gt;2002&lt;/td&gt;
&lt;td&gt;http://www.isoc.ps/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Philippines&lt;/td&gt;
&lt;td&gt;1999. Rejuvenated in 2009.&lt;/td&gt;
&lt;td&gt;https://www.facebook.com/isoc.ph/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Qatar&lt;/td&gt;
&lt;td&gt;2011&lt;/td&gt;
&lt;td&gt;http://www.isoc.qa/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Republic of Korea&lt;/td&gt;
&lt;td&gt;2014&lt;/td&gt;
&lt;td&gt;Not available&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Singapore&lt;/td&gt;
&lt;td&gt;2011&lt;/td&gt;
&lt;td&gt;http://isoc.sg/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sri Lanka&lt;/td&gt;
&lt;td&gt;2010&lt;/td&gt;
&lt;td&gt;http://www.isoc.lk/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Taipei&lt;/td&gt;
&lt;td&gt;1996&lt;/td&gt;
&lt;td&gt;http://www.isoc.org.tw/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Thailand&lt;/td&gt;
&lt;td&gt;1996&lt;/td&gt;
&lt;td&gt;http://www.isoc-th.org/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;United Arab Emirates&lt;/td&gt;
&lt;td&gt;2007&lt;/td&gt;
&lt;td&gt;http://www.isocuae.com/&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Yemen&lt;/td&gt;
&lt;td&gt;2013&lt;/td&gt;
&lt;td&gt;http://isoc.ye/&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Source: Details of chapters available on Internet Society website (http://www.internetsociety.org/).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Reference&lt;/h2&gt;
&lt;p&gt;Aizu, Izumi et al. 2002. Joint Statement from Asia Civil Society Forum Participants on World Summit on the Information Society (WSIS). December 13. Accessed on July 08, 2015 from http://www.wsisasia.org/wsis-acsf2002/wsis-acsfdec13f.doc.&lt;/p&gt;
&lt;p&gt;Asia Pacific Regional Internet Governance Forum (APrIGF). 2010. APrIGF Roundtable – June 15th, 2010: Session 1 – Welcome Remarks and Introduction – Real Time Transcript. Accessed on July 08, 2015 from http://2010.rigf.asia/aprigf-roundtable-june-15th-2010-session-1/.&lt;/p&gt;
&lt;p&gt;Bloggers Collective Group. 2006. Bloggers Against Censorship. Last updated on April 30, 2009‎. Accessed on July 08, 2015, from http://censorship.wikia.com/wiki/Bloggers_Against_Censorship.&lt;/p&gt;
&lt;p&gt;Civil Society Internet Governance Caucus. 2006. Internet Governance Caucus Charter. October 14. Accessed on July 08, 2015, from http://igcaucus.org/old/IGC-charter_final-061014.html.&lt;/p&gt;
&lt;p&gt;Civil Society Internet Governance Caucus. 2008a. Inputs for the Open IGF Consultation, Geneva, 26th February, 2008 – Statement II: Main Session Themes for IGF, Hyderabad. February 26. Accessed on July 08, 2015, from http://igcaucus.org/old/IGC%20-%20Main%20themes%20for%20IGF%20Hyd.pdf.&lt;/p&gt;
&lt;p&gt;Civil Society Internet Governance Caucus. 2008b. Inputs for the Open IGF Consultation, Geneva, 26th February, 2008 – Statement III: Renewal / Restructuring of Multi-stakeholder Advisory Group. February 26. Accessed on July 08, 2015, from http://igcaucus.org/old/IGC%20-%20MAG%20Rotation.pdf.&lt;/p&gt;
&lt;p&gt;Desai, Nitin, et al. 2005. Report of the Working Group on Internet Governance. United June.  Accessed on July 08, 2015 from http://www.wgig.org/docs/WGIGREPORT.pdf.&lt;/p&gt;
&lt;p&gt;Garden Networks for Freedom of Information. 2004. Breaking through the “Golden Shield.” Open Society Institute. November 01. Accessed on July 08, 2015 from https://www.opensocietyfoundations.org/sites/default/files/china-internet-censorship-20041101.pdf.&lt;/p&gt;
&lt;p&gt;George, Susanna. 2002. Women and New Information and Communications Technologies: The Promise of Empowerment. Presented at The World Summit on the Information Society: An Asian Response Meeting, November 22-24. Accessed on July 08, 2015 from http://www.wsisasia.org/materials/susanna.doc/.&lt;/p&gt;
&lt;p&gt;Gurumurthy, Anita, &amp;amp; Parminder Jeet Singh. 2005. WSIS PrepCom 2: A South Asian Perspective. Association for Progressive Communications. April 01. Accessed on July 08, 2015, from https://www.apc.org/en/news/hr/world/wsis-prepcom-2-south-asian-perspective.&lt;/p&gt;
&lt;p&gt;Internet Governance Forum (IGF). 2006. Athens 2006 – List of Participants.  Accessed on July 08, 2015, from http://www.intgovforum.org/PLP.html.&lt;/p&gt;
&lt;p&gt;Internet Governance Forum (IGF). 2008. Arrangements for Internet Governance, Global and National/Regional. IGF Hyderabad, India. December 5. Accessed on July 08, 2015, from https://web.archive.org/web/20130621205004/http://www.intgovforum.org/cms/hyderabad_prog/AfIGGN.html [Original URL: http://www.intgovforum.org/cms/hyderabad_prog/AfIGGN.html].&lt;/p&gt;
&lt;p&gt;Internet Governance Forum (IGF). 2009. Taking Stock and Looking Forward – On the Desirability of the Continuation of the Forum, Part II. IGF Sharm El Sheikh, Egypt. November 18. Accessed on July 08, 2015, from http://www.intgovforum.org/cms/2009/sharm_el_Sheikh/Transcripts/Sharm%20El%20Sheikh%2018%20November%202009%20Stock%20Taking%20II.txt.&lt;/p&gt;
&lt;p&gt;Internet Governance Forum (IGF). 2010. Taking Stock of Internet Governance and the Way Forward. IGF Vilnius, Lithuania. September 17. Accessed on July 08, 2015, from http://igf.wgig.org/cms/component/content/article/102-transcripts2010/687-taking-stock.&lt;/p&gt;
&lt;p&gt;International Campaign for Tibet. 2004. Chinese Authorities Institute Internet ID Card System in Tibet for Online Surveillance. April 30. Accessed on July 08, 2015, from http://www.savetibet.org/chinese-authorities-institute-internet-id-card-system-in-tibet-for-online-surveillance/.&lt;/p&gt;
&lt;p&gt;International Telecommunication Union (ITU). 2003a. PrepCom-2 / 17-28 February 2003 – Final List of Participants. February 28. Accessed on July 08, 2015, from http://www.itu.int/wsis/participation/prepcom2/prepcom2-cl.pdf.&lt;/p&gt;
&lt;p&gt;International Telecommunication Union (ITU). 2003b. Geneva Phase of the WSIS: List of Participants. Accessed on July 08, 2015, from http://www.itu.int/wsis/docs/geneva/summit_participants.pdf.&lt;/p&gt;
&lt;p&gt;Jain, Rekha. 2006. Participation of Developing Countries in the World Summit on the  Information Society (WSIS) Process: India Case Study. Association for Progressive Communications. March. Accessed on July 08, 2015 from http://rights.apc.org/documents/wsis_india.pdf.&lt;/p&gt;
&lt;p&gt;Reporters without Borders. 2006. List of the 13 Internet Enemies. Last updated on August 28, 2007. Accessed on July 08, 2015 from http://en.rsf.org/list-of-the-13-internet-enemies-07-11-2006,19603.&lt;/p&gt;
&lt;p&gt;Reporters without Borders. 2012. Internet Enemies Report 2012. Accessed on July 08, 2015 from http://en.rsf.org/IMG/pdf/rapport-internet2012_ang.pdf.&lt;/p&gt;
&lt;p&gt;Souter, David. 2007. WSIS and Civil Society. In: Whose Summit? Whose Information Society? Developing Countries and Civil Society at the World Summit on the Information Society. With additional research by Abiodun Jagun. Association for Progressive Communications. Pp. 72-89. Accessed on July 08, 2015 from http://rights.apc.org/documents/whose_summit_EN.pdf.&lt;/p&gt;
&lt;p&gt;Thai Netizen Network et al. 2012. Southeast Asian Civil Society Groups Highlight Increasing Rights Violations Online, Call for Improvements to Internet Governance Processes in the Region. Statement of Civil Society Delegates from Southeast Asia to 2012 Asia-Pacific Regional Internet Governance Forum (APrIGF). July 31. Accessed on July 08, 2015 from https://freedomhouse.org/sites/default/files/AprIGF-Joint%20Statement-FINAL.pdf.&lt;/p&gt;
&lt;p&gt;The Economic Times. 2007. Orkut's Tell-All Pact with Cops. May 01. Accessed on July 08, 2015 from http://articles.economictimes.indiatimes.com/2007-05-01/news/28459689_1_orkut-ip-addresses-google-spokesperson.&lt;/p&gt;
&lt;p&gt;The World Summit on the Information Society: An Asian Response. 2002. Final Document. Accessed on July 08, 2015 from http://www.wsisasia.org/materials/finalversion.doc.&lt;/p&gt;
&lt;p&gt;Thien, Vee Vian. 2011. The Struggle for Digital Freedom of Speech: The Malaysian Sociopolitical Blogosphere’s Experience. In: Ronald Deibert et al. (eds.) Access Contested. OpenNet Initiative. Pp. 43-63. Accessed on July 08, 2015 from http://access.opennet.net/wp-content/uploads/2011/12/accesscontested-chapter-03.pdf.&lt;/p&gt;
&lt;p&gt;Tibet Action Institute. 2015. Tibet: Frontline of the New Cyberwar. YouTube. January 27. Accessed on July 08, 2015 from https://www.youtube.com/watch?v=yE3AQqbGVkk.&lt;/p&gt;
&lt;p&gt;UNSAJ et al. 2003. Civil Society Observations and Response to the Tokyo Declaration. Asia-Pacific Regional Conference on the World Summit on the Information Society. January 15. Accessed on July 08, 2015 from http://www.wsisasia.org/wsis-tokyo/tokyo-statement.html.&lt;/p&gt;
&lt;p&gt;Wang, Stephanie. 2007. Internet Filtering in Asia in 2006-2007. OpenNet Initiative. Accessed on July 08, 2015, from https://opennet.net/studies/asia2007.&lt;/p&gt;
&lt;p&gt;WSIS Civil Society Internet Governance Caucus. 2005. Initial Reactions to the WGIG Report. Contribution from GLOCOM on behalf of the WSIS Civil Society Internet Governance Caucus. July 19. Accessed on July 08, 2015, from www.itu.int/wsis/%20docs2/pc3/contributions/co23.doc.&lt;/p&gt;
&lt;p&gt;WSIS Civil Society Plenary. 2003. “Shaping Information Societies for Human Needs” – Civil  Society Declaration to the World Summit on the Information Society. December 8. Accessed on July 08, 2015, from http://www.itu.int/wsis/docs/geneva/civil-society-declaration.pdf.&lt;/p&gt;
&lt;p&gt;WSIS Civil Society Plenary. 2005. “Much more could have been achieved” – Civil Society Statement on the World Summit on the Information Society. December 18. Accessed on July 08, 2015, from https://www.itu.int/wsis/docs2/tunis/contributions/co13.pdf.&lt;/p&gt;
&lt;p&gt;WSIS Civil Society Subcommittee on Content and Themes. 2003a. “Seven Musts”: Priority Principles Proposed by Civil Society. February 25. Accessed on July 08, 2015, from http://www.movimientos.org/es/foro_comunicacion/show_text.php3%3Fkey%3D1484.&lt;/p&gt;
&lt;p&gt;WSIS Civil Society Subcommittee on Content and Themes. 2003b. Final Report on Prepcom-2 Activities of the Civil Society on Content and Themes. March 27. Accessed on July 08, 2015, from http://www.itu.int/wsis/docs/pcip/misc/cs_sct.pdf.&lt;/p&gt;
&lt;p&gt;WSIS Executive Secretariat. 2003. Report of the Asia-Pacific Regional Conference for WSIS (Tokyo, 13-15 January 2003). WSIS. Accessed on July 08, 2015, from http://www.itu.int/dms_pub/itu-s/md/03/wsispc2/doc/S03-WSISPC2-DOC-0006!!PDF-E.pdf.&lt;/p&gt;
&lt;p&gt;Yusuf, Huma. 2009. Old and New Media: Converging during the Pakistan Emergency (March 2007 - February 2008). MIT Centre for Civic Media. January 12. Accessed on July 08, 2015, from https://civic.mit.edu/blog/humayusuf/old-and-new-media-converging-during-the-pakistan-emergency-march-2007-february-2008.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-open-review'&gt;https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-open-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Civil Society</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-13T05:54:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/events/wikipedia-workshop-in-theme-of-sou-dhuni-teen-pune-university">
    <title>Wikipedia Workshop in the Theme of "Sau Dhuni Teen" in Pune University</title>
    <link>https://cis-india.org/openness/events/wikipedia-workshop-in-theme-of-sou-dhuni-teen-pune-university</link>
    <description>
        &lt;b&gt;A Wikipedia workshop is being planned to be organised in the Srimati Savitribai Phule Pune University on the 20th August 2015. Under the scope of “Sau Dhuni Teen” project, the workshop is focused on building resources in Indian languages for women's studies on Wikipedia and equip its participants with the rudiments of contributing to Wikipedia, and to introduce it as a concept to them. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The goal of Wikipedia Workshop is to build resources in Indian languages  for women's studies on Wikipedia and equip its participants with the  rudiments of contributing to Wikipedia, and to introduce it as a concept  to them.&lt;/p&gt;
&lt;dl&gt;&lt;dt&gt;Primary goals&lt;/dt&gt;&lt;/dl&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ol&gt;
&lt;li&gt;To introduce Wikipedia as an encyclopaedia for research and a concept to new editors.&lt;/li&gt;
&lt;li&gt;To Promote Marathi Wikipedia Community &amp;amp; promote the use of regional languages in Wikipedia.&lt;/li&gt;
&lt;li&gt;To have an open interaction within the editors, existing as well as new.&lt;/li&gt;
&lt;li&gt;To spread the awareness of Wikipedia as a powerful tool.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Expected Attendees&amp;nbsp;:&lt;/strong&gt; 20-30 (only for university research students)&lt;/p&gt;
The event is being organised in collaboration with Centre for Indian Languages in Higher Education (CILHE).
 
  

 
  


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/events/wikipedia-workshop-in-theme-of-sou-dhuni-teen-pune-university'&gt;https://cis-india.org/openness/events/wikipedia-workshop-in-theme-of-sou-dhuni-teen-pune-university&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>garule</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Marathi Wikipedia</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2016-06-18T18:10:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology">
    <title>Security: Privacy, Transparency and Technology</title>
    <link>https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has been involved in privacy and data protection research for the last five years. It has participated as a member of the Justice A.P. Shah Committee, which has influenced the draft Privacy Bill being authored by the Department of Personnel and Training. It has organised 11 multistakeholder roundtables across India over the last two years to discuss a shadow Privacy Bill drafted by CIS with the participation of privacy commissioners and data protection authorities from Europe and Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was co-authored by Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar. It was published by Observer Research Foundation, &lt;a href="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf" class="internal-link"&gt;Digital Debates 2015: CyFy Journal Volume 2&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Our centre’s work on privacy was considered incomplete by some stakeholders because of a lack of focus in the area of cyber security and therefore we have initiated research on it from this year onwards. In this article, we have undertaken a preliminary examination of the theoretical relationships between the national security imperative and privacy, transparency and technology.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Daniel J. Solove has identified the tension between security and privacy as a false dichotomy: "Security and privacy often clash, but there need not be a zero-sum tradeoff." &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; Further unpacking this false dichotomy, Bruce Schneier says, "There is no security without privacy. And liberty requires both security and privacy." &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; Effectively, it could be said that privacy is a precondition for security, just as security is a precondition for privacy. A secure information system cannot be designed without guaranteeing the privacy of its authentication factors, and it is not possible to guarantee privacy of authentication factors without having confidence in the security of the system. Often policymakers talk about a balance between the privacy and security imperatives—in other words a zero-sum game. Balancing these imperatives is a foolhardy approach, as it simultaneously undermines both imperatives. Balancing privacy and security should instead be framed as an optimisation problem. Indeed, during a time when oversight mechanisms have failed even in so-called democratic states, the regulatory power of technology &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; should be seen as an increasingly key ingredient to the solution of that optimisation problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data retention is required in most jurisdictions for law enforcement, intelligence and military purposes. Here are three examples of how security and privacy can be optimised when it comes to Internet Service Provider (ISP) or telecom operator logs:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Data Retention&lt;/strong&gt;: We propose that the office of the Privacy Commissioner generate a cryptographic key pair for each internet user and give one key to the ISP / telecom operator. This key would be used to encrypt logs, thereby preventing unauthorised access. Once there is executive or judicial authorisation, the Privacy Commissioner could hand over the second key to the authorised agency. There could even be an emergency procedure and the keys could be automatically collected by concerned agencies from the Privacy Commissioner. This will need to be accompanied by a policy that criminalises the possession of unencrypted logs by ISP and telecom operators.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Privacy-Protective Surveillance&lt;/strong&gt;: Ann Cavoukian and Khaled El Emam &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; have proposed combining intelligent agents, homomorphic encryption and probabilistic graphical models to provide “a positive-sum, ‘win–win’ alternative to current counter-terrorism surveillance systems.” They propose limiting collection of data to “significant” transactions or events that could be associated with terrorist-related activities, limiting analysis to wholly encrypted data, which then does not just result in “discovering more patterns and relationships without an understanding of their context” but rather “intelligent information—information selectively gathered and placed into an appropriate context to produce actual knowledge.” Since fully homomorphic encryption may be unfeasible in real-world systems, they have proposed use of partially homomorphic encryption. But experts such as Prof. John Mallery from MIT are also working on solutions based on fully homomorphic encryption.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Fishing Expedition Design&lt;/strong&gt;: Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal have proposed a standard &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; that could be adopted by authorised agencies, telecom operators and ISPs. Instead of giving authorised agencies complete access to logs, they propose a format for database queries, which could be sent to the telecom operator or ISP by authorised agencies. The telecom operator or ISP would then process the query, and anonymise/obfuscate the result-set in an automated fashion based on applicable privacypolicies/regulation. Authorised agencies would then hone in on a subset of the result-set that they would like with personal identifiers intact; this smaller result set would then be shared with the authorised agencies.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;An optimisation approach to resolving the false dichotomy between privacy and security will not allow for a total surveillance regime as pursued by the US administration. Total surveillance brings with it the ‘honey pot’ problem: If all the meta-data and payload data of citizens is being harvested and stored, then the data store will become a single point of failure and will become another target for attack. The next Snowden may not have honourable intentions and might decamp with this ‘honey pot’ itself, which would have disastrous consequences.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If total surveillance will completely undermine the national security imperative, what then should be the optimal level of surveillance in a population? The answer depends upon the existing security situation. If this is represented on a graph with security on the y-axis and the proportion of the population under surveillance on the x-axis, the benefits of surveillance could be represented by an inverted hockey-stick curve. To begin with, there would already be some degree of security. As a small subset of the population is brought under surveillance, security would increase till an optimum level is reached, after which, enhancing the number of people under surveillance would not result in any security pay-off. Instead, unnecessary surveillance would diminish security as it would introduce all sorts of new vulnerabilities. Depending on the existing security situation, the head of the hockey-stick curve might be bigger or smaller. To use a gastronomic analogy, optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India the designers of surveillance projects have fortunately rejected the total surveillance paradigm. For example, the objective of the National Intelligence Grid (NATGRID) is to streamline and automate targeted surveillance; it is introducing technological safeguards that will allow express combinations of result-sets from 22 databases to be made available to 12 authorised agencies. This is not to say that the design of the NATGRID cannot be improved.&lt;/p&gt;
&lt;h3&gt;Security and Transparency&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;There are two views on security and transparency: One, security via obscurity as advocated by vendors of proprietary software, and two, security via transparency as advocated by free/open source software (FOSS) advocates and entrepreneurs. Over the last two decades, public and industry opinion has swung towards security via transparency. This is based on the Linus rule that “given enough eyeballs, all bugs are shallow.” But does this mean that transparency is a necessary and sufficient condition? Unfortunately not, and therefore it is not necessarily true that FOSS and open standards will be more secure than proprietary software and proprietary standards.&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;The recent detection of the Heartbleed &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; security bug in Open SSL, &lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; causing situations where more data can be read than should be allowed, and Snowden’s revelations about the compromise of some open cryptographic standards (which depend on elliptic curves), developed by the US National Institute of Standards and Technology, are stark examples. &lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the same time, however, open standards and FOSS are crucial to maintaining the balance of power in information societies, as civil society and the general public are able to resist the powers of authoritarian governments and rogue corporations using cryptographic technology. These technologies allow for anonymous speech, pseudonymous speech, private communication, online anonymity and circumvention of surveillance and censorship. For the media, these technologies enable anonymity of sources and the protection of whistle-blowers—all phenomena that are critical to the functioning of a robust and open democratic society. But these very same technologies are also required by states and by the private sector for a variety of purposes—national security, e-commerce, e-banking, protection of all forms of intellectual property, and services that depend on confidentiality, such as legal or medical services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In order words, all governments, with the exception of the US government, have common cause with civil society, media and the general public when it comes to increasing the security of open standards and FOSS. Unfortunately, this can be quite an expensive task because the re-securing of open cryptographic standards depends on mathematicians. Of late, mathematical research outputs that can be militarised are no longer available in the public domain because the biggest employers of mathematicians worldwide today are the US military and intelligence agencies. If other governments invest a few billion dollars through mechanisms like Knowledge Ecology International’s proposed World Trade Organization agreement on the supply of knowledge as a public good, we would be able to internationalise participation in standard-setting organisations and provide market incentives for greater scrutiny of cryptographic standards and patching of vulnerabilities of FOSS. This would go a long way in addressing the trust deficit that exists on the internet today.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A techno-utopian understanding of security assumes that more technology, more recent technology and more complex technology will necessarily lead to better security outcomes.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is because the security discourse is dominated by vendors with sales targets who do not present a balanced or accurate picture of the technologies that they are selling. This has resulted in state agencies and the general public having an exaggerated understanding of the capabilities of surveillance technologies that is more aligned with Hollywood movies than everyday reality.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;More Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Increasing the number of x-ray machines or full-body scanners at airports by a factor of ten or hundred will make the airport less secure unless human oversight is similarly increased. Even with increased human oversight, all that has been accomplished is an increase in the potential locations that can be compromised. The process of hardening a server usually involves stopping non-essential services and removing non-essential software. This reduces the software that should be subject to audit, continuously monitored for vulnerabilities and patched as soon as possible. Audits, ongoing monitoring and patching all cost time and money and therefore, for governments with limited budgets, any additional unnecessary technology should be seen as a drain on the security budget. Like with the airport example, even when it comes to a single server on the internet, it is clear that, from a security perspective, more technology without a proper functionality and security justification is counter-productive. To reiterate, throwing increasingly more technology at a problem does not make things more secure; rather, it results in a proliferation of vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Latest Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Reports that a number of state security agencies are contemplating returning to typewriters for sensitive communications in the wake of Snowden’s revelations makes it clear that some older technologies are harder to compromise in comparison to modern technology. &lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; Between iris- and fingerprint-based biometric authentication, logically, it would be easier for a criminal to harvest images of irises or authentication factors in bulk fashion using a high resolution camera fitted with a zoom lens in a public location, in comparison to mass lifting of fingerprints.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Complex Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Fifteen years ago, Bruce Schneier said, "The worst enemy of security is complexity. This has been true since the beginning of computers, and it’s likely to be true for the foreseeable future." &lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; This is because complexity increases fragility; every feature is also a potential source of vulnerabilities and failures. The simpler Indian electronic machines used until the 2014 elections are far more secure than the Diebold voting machines used in the 2004 US presidential elections. Similarly when it comes to authentication, a pin number is harder to beat without user-conscious cooperation in comparison to iris- or fingerprint-based biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the following section of the paper we have identified five threat scenarios &lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; relevant to India and identified solutions based on our theoretical framing above.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Threat Scenarios and Possible Solutions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Hacking the NIC Certifying Authority&lt;/strong&gt;&lt;br /&gt;One of the critical functions served by the National Informatics Centre (NIC) is as a Certifying Authority (CA). &lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; In this capacity, the NIC issues digital certificates that authenticate web services and allow for the secure exchange of information online. &lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Operating systems and browsers maintain lists of trusted CA root certificates as a means of easily verifying authentic certificates. India’s Controller of Certifying Authority’s certificates issued are included in the Microsoft Root list and recognised by the majority of programmes running on Windows, including Internet Explorer and Chrome. &lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; In 2014, the NIC CA’s infrastructure was compromised, and digital certificates were issued in NIC’s name without its knowledge. &lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; Reports indicate that NIC did not "have an appropriate monitoring and tracking system in place to detect such intrusions immediately." &lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; The implication is that websites could masquerade as another domain using the fake certificates. Personal data of users can be intercepted or accessed by third parties by the masquerading website. The breach also rendered web servers and websites of government bodies vulnerable to attack, and end users were no longer sure that data on these websites was accurate and had not been tampered with. &lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt; The NIC CA was forced to revoke all 250,000 SSL Server Certificates issued until that date &lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; and is no longer issuing digital certificates for the time being. &lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt;Public key pinning is a means through which websites can specify which certifying authorities have issued certificates for that site. Public key pinning can prevent man-in-the-middle attacks due to fake digital certificates. &lt;a name="fr20" href="#fn20"&gt;[20]&lt;/a&gt; Certificate Transparency allows anyone to check whether a certificate has been properly issued, seeing as certifying authorities must publicly publish information about the digital certificates that they have issued. Though this approach does not prevent fake digital certificates from being issued, it can allow for quick detection of misuse. &lt;a name="fr21" href="#fn21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;‘Logic Bomb’ against Airports&lt;/strong&gt;&lt;br /&gt;Passenger operations in New Delhi’s Indira Gandhi International Airport depend on a centralised operating system known as the Common User Passenger Processing System (CUPPS). The system integrates numerous critical functions such as the arrival and departure times of flights, and manages the reservation system and check-in schedules. &lt;a name="fr22" href="#fn22"&gt;[22]&lt;/a&gt; In 2011, a logic bomb attack was remotely launched against the system to introduce malicious code into the CUPPS software. The attack disabled the CUPPS operating system, forcing a number of check-in counters to shut down completely, while others reverted to manual check-in, resulting in over 50 delayed flights. Investigations revealed that the attack was launched by three disgruntled employees who had assisted in the installation of the CUPPS system at the New Delhi Airport. &lt;a name="fr23" href="#fn23"&gt;[23]&lt;/a&gt; Although in this case the impact of the attack was limited to flight delay, experts speculate that the attack was meant to take down the entire system. The disruption and damage resulting from the shutdown of an entire airport would be extensive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Adoption of open hardware and FOSS is one strategy to avoid and mitigate the risk of such vulnerabilities. The use of devices that embrace the concept of open hardware and software specifications must be encouraged, as this helps the FOSS community to be vigilant in detecting and reporting design deviations and investigate into probable vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Attack on Critical Infrastructure&lt;/strong&gt;&lt;br /&gt;The Nuclear Power Corporation of India encounters and prevents numerous cyber attacks every day. &lt;a name="fr24" href="#fn24"&gt;[24]&lt;/a&gt; The best known example of a successful nuclear plant hack is the Stuxnet worm that thwarted the operation of an Iranian nuclear enrichment complex and set back the country’s nuclear programme. &lt;a name="fr25" href="#fn25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The worm had the ability to spread over the network and would activate when a specific configuration of systems was encountered &lt;a name="fr26" href="#fn26"&gt;[26]&lt;/a&gt; and connected to one or more Siemens programmable logic controllers. &lt;a name="fr27" href="#fn27"&gt;[27]&lt;/a&gt; The worm was suspected to have been initially introduced through an infected USB drive into one of the controller computers by an insider, thus crossing the air gap. &lt;a name="fr28" href="#fn28"&gt;[28]&lt;/a&gt; The worm used information that it gathered to take control of normal industrial processes (to discreetly speed up centrifuges, in the present case), leaving the operators of the plant unaware that they were being attacked. This incident demonstrates how an attack vector introduced into the general internet can be used to target specific system configurations. When the target of a successful attack is a sector as critical and secured as a nuclear complex, the implications for a country’s security and infrastructure are potentially grave.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Security audits and other transparency measures to identify vulnerabilities are critical in sensitive sectors. Incentive schemes such as prizes, contracts and grants may be evolved for the private sector and academia to identify vulnerabilities in the infrastructure of critical resources to enable/promote security auditing of infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Micro Level: Chip Attacks&lt;/strong&gt;&lt;br /&gt;Semiconductor devices are ubiquitous in electronic devices. The US, Japan, Taiwan, Singapore, Korea and China are the primary countries hosting manufacturing hubs of these devices. India currently does not produce semiconductors, and depends on imported chips. This dependence on foreign semiconductor technology can result in the import and use of compromised or fraudulent chips by critical sectors in India. For example, hardware Trojans, which may be used to access personal information and content on a device, may be inserted into the chip. Such breaches/transgressions can render equipment in critical sectors vulnerable to attack and threaten national security. &lt;a name="fr29" href="#fn29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Indigenous production of critical technologies and the development of manpower and infrastructure to support these activities are needed. The Government of India has taken a number of steps towards this. For example, in 2013, the Government of India approved the building of two Semiconductor Wafer Fabrication (FAB) manufacturing facilities &lt;a name="fr30" href="#fn30"&gt;[30]&lt;/a&gt; and as of January 2014, India was seeking to establish its first semiconductor characterisation lab in Bangalore. &lt;a name="fr31" href="#fn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Macro Level: Telecom and Network Switches&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The possibility of foreign equipment containing vulnerabilities and backdoors that are built into its software and hardware gives rise to concerns that India’s telecom and network infrastructure is vulnerable to being hacked and accessed by foreign governments (or non-state actors) through the use of spyware and malware that exploit such vulnerabilities. In 2013, some firms, including ZTE and Huawei, were barred by the Indian government from participating in a bid to supply technology for the development of its National Optic Network project due to security concerns. &lt;a name="fr32" href="#fn32"&gt;[32]&lt;/a&gt; Similar concerns have resulted in the Indian government holding back the conferment of ‘domestic manufacturer’ status on both these firms. &lt;a name="fr33" href="#fn33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Following reports that Chinese firms were responsible for transnational cyber attacks designed to steal confidential data from overseas targets, there have been moves to establish laboratories to test imported telecom equipment in India. &lt;a name="fr34" href="#fn34"&gt;[34]&lt;/a&gt; Despite these steps, in a February 2014 incident the state-owned telecommunication company  Bharat Sanchar Nigam Ltd’s network was hacked, allegedly by Huawei. &lt;a name="fr35" href="#fn35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Security practitioners and policymakers need to avoid the zero-sum framing prevalent in popular discourse regarding security VIS-A-VIS privacy, transparency and technology.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;A successful hack of the telecom infrastructure could result in massive disruption in internet and telecommunications services. Large-scale surveillance and espionage by foreign actors would also become possible, placing, among others, both governmental secrets and individuals personal information at risk.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While India cannot afford to impose a general ban on the import of foreign telecommunications equipment, a number of steps can be taken to address the risk of inbuilt security vulnerabilities. Common International Criteria for security audits could be evolved by states to ensure compliance of products with international norms and practices. While India has already established common criteria evaluation centres, &lt;a name="fr36" href="#fn36"&gt;[36]&lt;/a&gt; the government monopoly over the testing function has resulted in only three products being tested so far. A Code Escrow Regime could be set up where manufacturers would be asked to deposit source code with the Government of India for security audits and verification. The source code could be compared with the shipped software to detect inbuilt vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyber security cannot be enhanced without a proper understanding of the relationship between security and other national imperatives such as privacy, transparency and technology. This paper has provided an initial sketch of those relationships, but sustained theoretical and empirical research is required in India so that security practitioners and policymakers avoid the zero-sum framing prevalent in popular discourse and take on the hard task of solving the optimisation problem by shifting policy, market and technological levers simultaneously. These solutions must then be applied in multiple contexts or scenarios to determine how they should be customised to provide maximum security bang for the buck.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. Daniel J. Solove, Chapter 1 in Nothing to Hide: The False Tradeoff between Privacy and Security (Yale University Press: 2011), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1827982.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Bruce Schneier, “What our Top Spy doesn’t get: Security and Privacy aren’t Opposites,” Wired, January 24, 2008, http://archive.wired.com/politics/security commentary/security matters/2008/01/securitymatters_0124 and Bruce Schneier, “Security vs. Privacy,” Schneier on Security, January 29, 2008, https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. There are four sources of power in internet governance: Market power exerted by private sector organisations; regulatory power exerted by states; technical power exerted by anyone who has access to certain categories of technology, such as cryptography; and finally, the power of public pressure sporadically mobilised by civil society. A technically sound encryption standard, if employed by an ordinary citizen, cannot be compromised using the power of the market or the regulatory power of states or public pressure by civil society. In that sense, technology can be used to regulate state and market behaviour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. Ann Cavoukian and Khaled El Emam, “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism,” Information &amp;amp; Privacy Commisioner, September 2013, Ontario, Canada, http://www.privacybydesign.ca/content/uploads/2013/12/pps.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal, “Information Integration and Analysis: A Semantic Approach to Privacy”(presented at the third IEEE International Conference on Information Privacy, Security, Risk and Trust, Boston, USA, October 2011), ebiquity.umbc.edu/_file_directory_/papers/578.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Bruce Byfield, “Does Heartbleed disprove ‘Open Source is Safer’?,” Datamation, April 14, 2014, http://www.datamation.com/open-source/does-heartbleed-disprove-open-source-is-safer-1.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. “Cybersecurity Program should be more transparent, protect privacy,” Centre for Democracy and Technology Insights, March 20, 2009, https://cdt.org/insight/cybersecurity-program-should-be-more-transparent-protect-privacy/#1.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. “Cracked Credibility,” The Economist, September 14, 2013, http://www.economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Miriam Elder, “Russian guard service reverts to typewriters after NSA leaks,” The Guardian, July 11, 2013, www.theguardian.com/world/2013/jul/11/russia-reverts-paper-nsa-leaks and Philip Oltermann, “Germany ‘may revert to typewriters’ to counter hi-tech espionage,” The Guardian, July 15, 2014, www.theguardian.com/world/2014/jul/15/germany-typewriters-espionage-nsa-spying-surveillance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Bruce Schneier, “A Plea for Simplicity,” Schneier on Security, November 19, 1999, https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. With inputs from Pranesh Prakash of the Centre for Internet and Society and Sharathchandra Ramakrishnan of Srishti School of Art, Technology and Design.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. “Frequently Asked Questions,” Controller of Certifying Authorities, Department of Electronics and Information Technology, Government of India, http://cca.gov.in/cca/index.php?q=faq-page#n41.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn13" href="#fr13"&gt;13&lt;/a&gt;]. National Informatics Centre Homepage, Government of India, http://www.nic.in/node/41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. Adam Langley, “Maintaining Digital Certificate Security,” Google Security Blog, July 8, 2014, http://googleonlinesecurity.blogspot.in/2014/07/maintaining-digital-certificate-security.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. This is similar to the kind of attack carried out against DigiNotar, a Dutch certificate authority. See: http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1246&amp;amp;context=jss.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. R. Ramachandran, “Digital Disaster,” Frontline, August 22, 2014, http://www.frontline.in/the-nation/digital-disaster/article6275366.ece.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. “NIC’s digital certification unit hacked,” Deccan Herald, July 16, 2014, http://www.deccanherald.com/content/420148/archives.php.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. National Informatics Centre Certifying Authority Homepage, Government of India, http://nicca.nic.in//.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn20" href="#fr20"&gt;20&lt;/a&gt;]. Mozilla Wiki, “Public Key Pinning,” https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn21" href="#fr21"&gt;21&lt;/a&gt;]. “Certificate Transparency - The quick detection of fraudulent digital certificates,” Ascertia, August 11, 2014, http://www.ascertiaIndira.com/blogs/pki/2014/08/11/certificate-transparency-the-quick-detection-of-fraudulent-digital-certificates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn22" href="#fr22"&gt;22&lt;/a&gt;]. “Indira Gandhi International Airport (DEL/VIDP) Terminal 3, India,” Airport Technology.com, http://www.airport-technology.com/projects/indira-gandhi-international-airport-terminal -3/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn23" href="#fr23"&gt;23&lt;/a&gt;]. “How techies used logic bomb to cripple Delhi Airport,” Rediff, November 21, 2011, http://www.rediff.com/news/report/how-techies-used-logic-bomb-to-cripple-delhi-airport/20111121 htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn24" href="#fr24"&gt;24&lt;/a&gt;]. Manu Kaushik and Pierre Mario Fitter, “Beware of the bugs,” Business Today, February 17, 2013, http://businesstoday.intoday.in/story/india-cyber-security-at-risk/1/191786.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn25" href="#fr25"&gt;25&lt;/a&gt;]. “Stuxnet ‘hit’ Iran nuclear plants,” BBC, November 22, 2010, http://www.bbc.com/news/technology-11809827.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn26" href="#fr26"&gt;26&lt;/a&gt;]. In this case, systems using Microsoft Windows and running Siemens Step7 software were targeted.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn27" href="#fr27"&gt;27&lt;/a&gt;]. Jonathan Fildes, “Stuxnet worm ‘targeted high-value Iranian assets’,” BBC, September 23, 2010, http://www.bbc.com/news/technology-11388018.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn28" href="#fr28"&gt;28&lt;/a&gt;]. Farhad Manjoo, “Don’t Stick it in: The dangers of USB drives,” Slate, October 5, 2010, http://www.slate.com/articles/technology/technology/2010/10/dont_stick_it_in.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn29" href="#fr29"&gt;29&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn30" href="#fr30"&gt;30&lt;/a&gt;]. “IBM invests in new $5bn chip fab in India, so is chip sale off?,” ElectronicsWeekly, February 14, 2014, http://www.electronicsweekly.com/news/business/ibm-invests-new-5bn-chip-fab-india-chip-sale-2014-02/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn31" href="#fr31"&gt;31&lt;/a&gt;]. NT Balanarayan, “Cabinet Approves Creation of Two Semiconductor Fabrication Units,” Medianama, February 17, 2014, http://articles.economictimes.indiatimes.com/2014-02-04/news/47004737_1_indian-electronics-special-incentive-package-scheme-semiconductor-association.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn32" href="#fr32"&gt;32&lt;/a&gt;]. Jamie Yap, “India bars foreign vendors from national broadband initiative,” ZD Net, January 21, 2013, http://www.zdnet.com/in/india-bars-foreign-vendors-from-national-broadband-initiative-7000010055/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn33" href="#fr33"&gt;33&lt;/a&gt;]. Kevin Kwang, “India holds back domestic-maker status for Huawei, ZTE,” ZD Net, February 6, 2013, http://www.zdnet.com/in/india-holds-back-domestic-maker-status-for-huawei-zte-70 00010887/. Also see “Huawei, ZTE await domestic-maker tag,” The Hindu, February 5, 2013, http://www.thehindu.com/business/companies/huawei-zte-await-domesticmaker-tag/article4382888.ece.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn34" href="#fr34"&gt;34&lt;/a&gt;]. Ellyne Phneah, “Huawei, ZTE under probe by Indian government,” ZD Net, May 10, 2013, http://www.zdnet.com/in/huawei-zte-under-probe-by-indian-government-7000015185/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn35" href="#fr35"&gt;35&lt;/a&gt;]. Devidutta Tripathy, “India investigates report of Huawei hacking state carrier network,” Reuters, February 6, 2014, http://www.reuters.com/article/2014/02/06/us-india-huawei-hacking-idUSBREA150QK20140206.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn36" href="#fr36"&gt;36&lt;/a&gt;]. “Products Certified,” Common Criteria Portal of India, http://www.commoncriteria-india.gov.in/Pages/ProductsCertified.aspx.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology'&gt;https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-15T10:53:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf">
    <title>Security: Privacy, Transparency and Technology</title>
    <link>https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf'&gt;https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-19T02:24:57Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/edit-a-thon-to-improve-kannada-language-science-related-wikipedia-articles">
    <title>Edit-a-thon to improve Kannada-language science-related Wikipedia articles</title>
    <link>https://cis-india.org/openness/blog-old/edit-a-thon-to-improve-kannada-language-science-related-wikipedia-articles</link>
    <description>
        &lt;b&gt;A Kannada Wikipedia edit-a-thon is planned to improve science-related articles that are part of the Government of Karnataka's high school syllabus.&lt;/b&gt;
        
&lt;p&gt;More details are available in the &lt;a href="http://bitly.com/knwpsci"&gt;project page&lt;/a&gt; in Kannada.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/edit-a-thon-to-improve-kannada-language-science-related-wikipedia-articles'&gt;https://cis-india.org/openness/blog-old/edit-a-thon-to-improve-kannada-language-science-related-wikipedia-articles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-09-04T09:06:17Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/journalism-students-of-the-shree-dharmasthala-manjunatheshwara-sdm-college-ujire-enrich-karnataka2019s-folklore-and-folk-art-in-kannada-wikipedia">
    <title>Journalism Students of the SDM College Ujire Enrich Karnataka’s Folklore And Folk Art in Kannada Wikipedia</title>
    <link>https://cis-india.org/openness/blog-old/journalism-students-of-the-shree-dharmasthala-manjunatheshwara-sdm-college-ujire-enrich-karnataka2019s-folklore-and-folk-art-in-kannada-wikipedia</link>
    <description>
        &lt;b&gt;As part of an ongoing partnership with the Shree Dharmasthala Manjunatheshwara (SDM) College Ujjire, with active support from a few Kannada Wikipedia editors, CIS-A2K began an outreach programme so that the journalism students could help many Kannada readers about Karnataka’s rich folklore and folk art.&lt;/b&gt;
        
&lt;p id="docs-internal-guid-e599ce9d-d03b-a6b5-0c6a-3e6664727eb0" dir="ltr"&gt;Both first year and second year students of Master of Communication and Journalism (MCJ) of SDM College participated in this workshop. Out of 35 participants, 11 were female. Students had discussed already about enhancing Kannada Wikipedia articles on folklore and folk art forms of Karnataka. About 20 new user accounts were created and the students have started creating articles in their user &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Sandbox"&gt;sandboxes&lt;/a&gt; which they will later move as articles upon enhancement with vital information. Some of the students chose to find existing articles and add more information to them. Long time Kannada Wikimedian &lt;a href="https://kn.wikipedia.org/wiki/User:VASANTH S.N."&gt;S N Vasanthkn&lt;/a&gt;. from Dharmasthala helped as resource person to help the new editors with Wikipedia editing. However, as first timers, many struggled with the encyclopedic way of writing and maintaining &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view"&gt;neutral point of view&lt;/a&gt;. These students will be mentored by Vasanth as he is visiting them every Monday.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;More details from the &lt;a href="https://kn.wikipedia.org/s/1cpm"&gt;event &lt;/a&gt;page.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/journalism-students-of-the-shree-dharmasthala-manjunatheshwara-sdm-college-ujire-enrich-karnataka2019s-folklore-and-folk-art-in-kannada-wikipedia'&gt;https://cis-india.org/openness/blog-old/journalism-students-of-the-shree-dharmasthala-manjunatheshwara-sdm-college-ujire-enrich-karnataka2019s-folklore-and-folk-art-in-kannada-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Kannada Wikipedia</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2015-09-15T09:09:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/wikipedia-edit-a-thon-in-mangalore-to-bring-tulu-wikipedia-live">
    <title>Wikipedia edit-a-thon in Mangalore to bring Tulu Wikipedia live</title>
    <link>https://cis-india.org/openness/wikipedia-edit-a-thon-in-mangalore-to-bring-tulu-wikipedia-live</link>
    <description>
        &lt;b&gt;A Wikipedia edit-a-thon was organised in Mangalore, Karnataka this 14th to encourage more Tulu-language speakers to contribute to Tulu Wikipedia. Tulu Wikipedia is is currently in the Incubator but the enthusiastic editor community is putting their best effort to bring it live out of Incubator. This edit-a-thon is one of the many activities the Tulu Wikimedia community has organised.&lt;/b&gt;
        
&lt;p&gt;30 Wikipedia editors participated and created about 89 new articles. Interestingly, 12 of these 30 participants crossed more than 10 edits. Some of the new participants faced problems with using the&lt;a href="https://www.mediawiki.org/wiki/Help:Extension:UniversalLanguageSelector/Input_methods#Kannada"&gt; input methods&lt;/a&gt; and the &lt;a href="https://en.wikipedia.org/wiki/Help:Wiki_markup"&gt;Wiki-markup&lt;/a&gt;. It is important to note that because of the lack of addition of Tulu-alphabet code points in the Unicode chart, and the speakers being well conversant in Kannada, they are using Kannada script for Tulu Wikipedia Incubator project. There is a plan to organise a monthly meetup and/or edit-a-thon to continue the momentum these editors have brought in. &lt;a href="http://www.tuluacademy.org/en/"&gt;Tulu Sahitya Academy&lt;/a&gt; has kindly supported the event.&lt;/p&gt;
More details in the &lt;a class="external-link" href="https://incubator.wikimedia.org/wiki/Wp/tcy/ವಿಕಿಪೀಡಿಯ:ಕಜ್ಜಕೊಟ್ಯ-5"&gt;event page&lt;/a&gt; (in Tulu). 
  

 
  


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/wikipedia-edit-a-thon-in-mangalore-to-bring-tulu-wikipedia-live'&gt;https://cis-india.org/openness/wikipedia-edit-a-thon-in-mangalore-to-bring-tulu-wikipedia-live&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Tulu Wikipedia</dc:subject>
    

   <dc:date>2015-09-15T09:07:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things">
    <title>A Review of the Policy Debate around Big Data and Internet of Things</title>
    <link>https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things</link>
    <description>
        &lt;b&gt;This blog post seeks to review and understand how regulators and experts across jurisdictions are reacting to Big Data and Internet of Things (IoT) from a policy perspective.&lt;/b&gt;
        &lt;h3&gt;Defining and Connecting Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet of Things is a term that refers to networked objects and systems that can connect to the internet and can transmit and receive data. Characteristics of IoT include the gathering of information through sensors, the automation of functions, and analysis of collected data.[1] For IoT devices, because of the &lt;i&gt;velocity&lt;/i&gt; at which data is generated, the &lt;i&gt;volume&lt;/i&gt; of data that is generated, and the &lt;i&gt;variety&lt;/i&gt; of data generated by different sources [2] - IoT devices can be understood as generating Big Data and/or relying on Big Data analytics. In this way IoT devices and Big Data are intrinsically interconnected.&lt;/p&gt;
&lt;h3&gt;General Implications of Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Big Data paradigms are being adopted across countries, governments, and business sectors because of the potential insights and change that it can bring. From improving an organizations business model, facilitating urban development, allowing for targeted and individualized services, and enabling the prediction of certain events or actions - the application of Big Data has been recognized as having the potential to bring about dramatic and large scale changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, experts have identified risks to the individual that can be associated with the generation, analysis, and use of Big Data. In May 2014, the White House of the United States completed a ninety day study of how big data will change everyday life. The Report highlights the potential of Big Data as well as identifying a number of concerns associated with Big Data. For example: the selling of personal data, identification or re-identification of individuals, profiling of individuals, creation and exacerbation of information asymmetries, unfair, discriminating, biased, and incorrect decisions based on Big Data analytics, and lack of or misinformed user consent.[3] Errors in Big Data analytics that experts have identified include statistical fallacies, human bias, translation errors, and data errors.[4] Experts have also discussed fundamental changes that Big Data can bring about. For example, Danah Boyd and Kate Crawford in the article &lt;i&gt;"Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon"&lt;/i&gt; propose that Big Data can change the definition of knowledge and shape the reality it measures.[5] Similarly, a BSC/Oxford Internet Institute conference report titled " &lt;i&gt;The Societal Impact of the Internet of Things&lt;/i&gt;" points out that often users of Big Data assume that information and conclusions based on digital data is reliable and in turn replace other forms of information with digital data.[6]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns that have been voiced by the Article 29 Working Party and others specifically about IoT devices have included insufficient security features built into devices such as encryption, the reliance of the devices on wireless communications, data loss from infection by malware or hacking, unauthorized access and use of personal data, function creep resulting from multiple IoT devices being used together, and unlawful surveillance.[7]&lt;/p&gt;
&lt;h3&gt;Regulation of Big Data and Internet of Things&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The regulation of Big Data and IoT is currently being debated in contexts such as the US and the EU. Academics, civil society, and regulators are exploring questions around the adequacy of present regulation and overseeing frameworks to address changes brought about Big Data, and if not - what forms of or changes in regulation are needed? For example, Kate Crawford and Jason Shultz in the article &lt;i&gt;"Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms"&lt;/i&gt;stress the importance of bringing in 'data due process rights' i.e ensuring fairness in the analytics of Big Data and how personal information is used.[8] While Solon Barocas and Andrew Selbst in the article &lt;i&gt;"Big Data's Disparate Impact"&lt;/i&gt; explore if present anti-discrimination legislation and jurisprudence in the US is adequate to protect against discrimination arising from Big Data practices - specifically data mining.[9]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact of Big Data and IoT on Data Protection Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of data protection, various government bodies, including the Article 29 Data Protection Working Party set up under the Directive 95/46/EC of the European Parliament, the Council of Europe, the European Commission, and the Federal Trade Commission, as well as experts and academics in the field, have called out at least ten different data protection principles and concepts that Big Data impacts:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Collection Limitation:&lt;/strong&gt; As a result of the generation of Big Data as enabled by networked devices, increased capabilities to analyze Big Data, and the prevalent use of networked systems - the principle of collection limitation is changing.[10]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Consent: &lt;/strong&gt;As a result of the use of data from a wide variety of sources and the re-use of data which is inherent in Big Data practices - notions of informed consent (initial and secondary) are changing.[11]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Minimization:&lt;/strong&gt; As a result of Big Data practices inherently utilizing all data possible - the principle of data minimization is changing/obsolete.[12]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Notice:&lt;/strong&gt; As a result of Big Data practices relying on vast amounts of data from numerous sources and the re-use of that data - the principle of notice is changing.[13]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Purpose Limitation:&lt;/strong&gt; As a result of Big Data practices re-using data for multiple purposes - the principle of purpose limitation is changing/obsolete.[14]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Necessity: &lt;/strong&gt;As a result of Big Data practices re-using data, the new use or re-analysis of data may not be pertinent to the purpose that was initially specified- thus the principle of necessity is changing.[15]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Access and Correction:&lt;/strong&gt; As a result of Big Data being generated (and sometimes published) at scale and in real time - the principle of user access and correction is changing.[16]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Opt In and Opt Out Choices: &lt;/strong&gt;Particularly in the context of smart cities and IoT which collect data on a real time basis, often without the knowledge of the individual, and for the provision of a service - it may not be easy or possible for individuals to opt in or out of the collection of their data.[17]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;PI:&lt;/strong&gt; As a result of Big Data analytics using and analyzing a wide variety of data, new or unexpected forms of personal data may be generated - thus challenging and evolving beyond traditional or specified definitions of personal information.[18]&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Controller:&lt;/strong&gt; In the context of IoT, given the multitude of actors that can collect, use and process data generated by networked devices, the traditional understanding of what and who is a data controller is changing.[19]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Possible Technical and Policy Solutions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a Report titled "&lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World&lt;/i&gt;" by the Federal Trade Commission in the United States it was noted that though IoT changes the application and understanding of certain privacy principles, it does not necessarily make them obsolete.[20] Indeed many possible solutions that have been suggested to address the challenges posed by IoT and Big Data are technical interventions at the device level rather than fundamental policy changes. For example it has been proposed that IoT devices can be programmed to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Automatically delete data after a specified period of time [21] (addressing concerns of data retention)&lt;/li&gt;
&lt;li&gt;Ensure that personal data is not fed into centralized databases on an automatic basis [22] (addressing concerns of transfer and sharing without consent, function creep, and data breach)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Offer consumers combined choices for consent rather than requiring a one time blanket consent at the time of initiating a service or taking fresh consent for every change that takes place while a consumer is using a service. [23] (addressing concerns of informed and meaningful consent)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Categorize and tag data with accepted uses and programme automated processes to flag when data is misused. [24] (addressing concerns of misuse of data)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply 'sticky policies' - policies that are attached to data and define appropriate uses of the data as it 'changes hands' [25] (addressing concerns of user control of data)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Allow for features to only be turned on with consent from the user [26] (addressing concerns of informed consent and collection without the consent or knowledge of the user)&lt;/li&gt;
&lt;li&gt;Automatically convert raw personal data to aggregated data [27] (addressing concerns of misuse of personal data and function creep)&lt;/li&gt;
&lt;li&gt;Offer users the option to delete or turn off sensors [28] (addressing concerns of user choice, control, and consent)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Such solutions place the designers and manufacturers of IoT devices in a critical role. Yet some, such as Kate Crawford and Jason Shultz are not entirely optimistic about the possibility of effective technological solutions - noting in the context of automated decision making that it is difficult to build in privacy protections as it is unclear when an algorithm will predict personal information about an individual.[29]&lt;/p&gt;
&lt;p&gt;Experts have also suggested that more emphasis should be placed on the principles and practices of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Transparency,&lt;/li&gt;
&lt;li&gt; Access and correction,&lt;/li&gt;
&lt;li&gt;Use/misuse&lt;/li&gt;
&lt;li&gt;Breach notification&lt;/li&gt;
&lt;li&gt;Remedy&lt;/li&gt;
&lt;li&gt;Ability to withdraw consent&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Others have recommended that certain privacy principles need to be adapted to the Big Data/IoT context. For example, the Article 29 Working Party has clarified that in the context of IoT, consent mechanisms need to include the types of data collected, the frequency of data collection, as well as conditions for data collection.[30] While the Federal Trade Commission has warned that adopting a pure "use" based model has its limitations as it requires a clear (and potentially changing) definition of what use is acceptable and what use is not acceptable, and it does not address concerns around the collection of sensitive personal information.[31] In addition to the above, the European Commission has stressed that the right of deletion, the right to be forgotten, and data portability also need to be foundations of IoT systems and devices.[32]&lt;/p&gt;
&lt;h3&gt;Possible Regulatory Frameworks&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To the question - are current regulatory frameworks adequate and is additional legislation needed, the FTC has recommended that though a specific IoT legislation may not be necessary, a horizontal privacy legislation would be useful as sectoral legislation does not always account for the use, sharing, and reuse of data across sectors. The FTC also highlighted the usefulness of privacy impact assessments and self regulatory steps to ensure privacy.[33] The European Commission on the other hand has concluded that to ensure enforcement of any standard or protocol - hard legal instruments are necessary.[34] As mentioned earlier, Kate Crawford and Jason Shultz have argued that privacy regulation needs to move away from principles on collection, specific use, disclosure, notice etc. and focus on elements of due process around the use of Big Data - as they say "procedural data due process". Such due process should be based on values instead of defined procedures and should include at the minimum notice, hearing before an independent arbitrator, and the right to review. Crawford and Shultz more broadly note that there are conceptual differences between privacy law and big data that pose as serious challenges i.e privacy law is based on causality while big data is a tool of correlation. This difference raises questions about how effective regulation that identifies certain types of information and then seeks to control the use, collection, and disclosure of such information will be in the context of Big Data – something that is varied and dynamic. According to Crawford and Shultz many regulatory frameworks will struggle with this difference – including the FTC's Fair Information Privacy Principles and the EU regulation including the EU's right to be forgotten.[35] The European Data Protection Supervisor on the other hand looks at Big Data as spanning the policy areas of data protection, competition, and consumer protection – particularly in the context of 'free' services. The Supervisor argues that these three areas need to come together to develop ways in which the challenges of Big Data can be addressed. For example, remedy could take the form of data portability – ensuring users the ability to move their data to other service providers empowering individuals and promoting competitive market structures or adopting a 'compare and forget' approach to data retention of customer data. The Supervisor also stresses the need to promote and treat privacy as a competitive advantage, thus placing importance on consumer choice, consent, and transparency.[36] The European Data Protection reform has been under discussion and it is predicted to be enacted by the end of 2015. The reform will apply across European States and all companies operating in Europe. The reform proposes heavier penalties for data breaches, seeks to provide users with more control of their data.[37] Additionally, Europe is considering bringing digital platforms under the Network and Information Security Directive – thus treating companies like Google and Facebook as well as cloud providers and service providers as a critical sector. Such a move would require companies to adopt stronger security practices and report breaches to authorities.[38]&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A review of the different opinions and reactions from experts and policy makers demonstrates the ways in which Big Data and IoT are changing traditional forms of protection that governments and societies have developed to protect personal data as it increases in value and importance. While some policy makers believe that big data needs strong legislative regulation and others believe that softer forms of regulation such as self or co-regulation are more appropriate, what is clear is that Big Data is either creating a regulatory dilemma– with policy makers searching for ways to control the unpredictable nature of big data through policy and technology through the merging of policy areas, the honing of existing policy mechanisms, or the broadening of existing policy mechanisms - while others are ignoring the change that Big Data brings with it and are forging ahead with its use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Answering the 'how do we regulate Big Data” question requires &lt;strong&gt;re-conceptualization of data ownership and realities&lt;/strong&gt;. Governments need to first recognize the criticality of their data and the data of their citizens/residents, as well as the contribution to a country's economy and security that this data plays. With the technologies available now, and in the pipeline, data can be used or misused in ways that will have vast repercussions for individuals, society, and a nation. All data, but especially data directly or indirectly related to citizens and residents of a country, needs to be looked upon as owned by the citizens and the nation. In this way, data should be seen as a part of &lt;strong&gt;critical&lt;/strong&gt; &lt;strong&gt;national infrastructure of a nation, &lt;/strong&gt;and accorded the security, protections, and legal backing thereof to &lt;strong&gt;prevent the misuse of the resource by the private or public sectors, local or foreign governments&lt;/strong&gt;. This could allow for local data warehousing and bring physical and access security of data warehouses on par with other critical national infrastructure. Recognizing data as a critical resource answers in part the concern that experts have raised – that Big Data practices make it impossible for data to be categorized as personal and thus afforded specified forms of protection due to the unpredictable nature of big data. Instead – all data is now recognized as critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to being able to generate personal data from anonymized or non-identifiable data, big data also challenges traditional divisions of public vs. private data. Indeed Big Data analytics can take many public data points and derive a private conclusion. The use of Big Data analytics on public data also raises questions of consent. For example, though a license plate is public information – should a company be allowed to harvest license plate numbers, combine this with location, and sell this information to different interested actors? This is currently happening in the United States.[39] Lastly, Big Data raises questions of ownership. A solution to the uncertainty of public vs. private data and associated consent and ownership could be the creation a &lt;strong&gt;National Data Archive&lt;/strong&gt; with such data. The archive could function with representation from the government, public and private companies, and civil society on the board. In such a framework, for example, companies like Airtel would provide mobile services, but the CDRs and customer data collected by the company would belong to the National Data Archive and be available to Airtel and all other companies within a certain scope for use. This 'open data' approach could enable innovation through the use of data but within the ambit of national security and concerns of citizens – a framework that could instill trust in consumers and citizens. Only when backed with strong security requirements, enforcement mechanisms and a proactive, responsive and responsible framework can governments begin to think about ways in which Big Data can be harnessed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[1] BCS - The Chartered Institute for IT. (2013). The Societal Impact of the Internet of Things. Retrieved May 17, 2015, from http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;[2] Sicular, S. (2013, March 27). Gartner’s Big Data Definition Consists of Three Parts, Not to Be Confused with Three “V”s. Retrieved May 20, 2015, from http://www.forbes.com/sites/gartnergroup/2013/03/27/gartners-big-data-definition-consists-of-three-parts-not-to-be-confused-with-three-vs/&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3] Executive Office of the President. “Big Data: Seizing Opportunities, Preserving Values”. May 2014. Available at: &lt;a href="https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf"&gt;https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4] Moses, B., Lyria, &amp;amp; Chan, J. (2014). Using Big Data for Legal and Law Enforcement Decisions: Testing the New Tools (SSRN Scholarly Paper No. ID 2513564). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2513564&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5] Danah Boyd, Kate Crawford. &lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;CRITICAL QUESTIONS FOR BIG DATA&lt;/a&gt;. In&lt;a href="http://www.tandfonline.com/toc/rics20/15/5"&gt;formation, Communication &amp;amp; Society &lt;/a&gt; Vol. 15, Iss. 5, 2012. Available at: &lt;a href="http://www.tandfonline.com/doi/full/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/full/10.1080/1369118X.2012.678878&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[6]  The Chartered Institute for IT, Oxford Internet Institute, University of Oxford. “The Societal Impact of the Internet of Things” February 2013. Available at: &lt;a href="http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf"&gt;http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[7] ARTICLE 29 Data Protection Working Party. (2014). &lt;i&gt;Opinion 8/2014 on the on Recent Developments on the Internet of Things.&lt;/i&gt; European Commission. Retrieved May 20, 2015, from http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[8] Crawford, K., &amp;amp; Schultz, J. (2013). Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms (SSRN Scholarly Paper No. ID 2325784). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2325784&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[9] Barocas, S., &amp;amp; Selbst, A. D. (2015). Big Data’s Disparate Impact (SSRN Scholarly Paper No. ID 2477899). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2477899&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[10] Barocas, S., &amp;amp; Selbst, A. D. (2015). Big Data’s Disparate Impact (SSRN Scholarly Paper No. ID 2477899). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=2477899&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[11] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[12] Tene, O., &amp;amp; Polonetsky, J. (2013). Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[13]  Omer Tene and Jules Polonetsky, &lt;i&gt;Big Data for All: Privacy and User Control in the Age of Analytics&lt;/i&gt;, 11 Nw. J. Tech. &amp;amp; Intell. Prop. 239 (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[14] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[15] Information Commissioner's Office. (2014). Big Data and Data Protection. Infomation Commissioner's Office. Retrieved May 20, 2015, from https://ico.org.uk/media/for-organisations/documents/1541/big-data-and-data-protection.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[16] Article 29 Data Protection Working Party. “Opinion 8/2014 on the on Recent Developments on the Internet of Things”. September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;h&lt;/a&gt;&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;ttp://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[17] The Chartered Institute for IT and Oxford Internet Institute, University of Oxford. “The Societal Impact of the Internet of Things”. February 14&lt;sup&gt;th&lt;/sup&gt; 2013. Available at: &lt;a href="http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf"&gt;http://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[18] Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1st 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[19] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16th 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[20] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[21] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[22] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[23] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[24] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commision. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[25] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[26] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[27] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[28] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[29]  Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1st 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2nd 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[30]  Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[31] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commission. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[32] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[33] Federal Trade Commission. (2015). &lt;i&gt;Internet of Things: Privacy &amp;amp; Security in a Connected World.&lt;/i&gt; Federal Trade Commission. Retrieved May 20, 2015, from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[34] Article 29 Data Protection Working Party “Opinion 8/2014 on the on Recent Developments on the Internet of Things” September 16&lt;sup&gt;th&lt;/sup&gt; 2014. Available at: &lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf"&gt;http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[35] Kate Crawford and Jason Shultz, “Big Data and Due Process: Towards a Framework to Redress Predictive Privacy Harms”. Boston College Law Review, Volume 55, Issue 1, Article 4. January 1&lt;sup&gt;st&lt;/sup&gt; 2014. Available at: &lt;a href="http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr"&gt;http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=3351&amp;amp;context=bclr&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[36] European Data Protection Supervisor. Preliminary Opinion of the European Data Protection Supervisor, Privacy and competitiveness in the age of big data: the interplay between data protection, competition law and consumer protection in the Digital Economy. March 2014. Available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[37] SC Magazine. Harmonised EU data protection and fines by the end of the year. June 25&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: &lt;a href="http://www.scmagazineuk.com/harmonised-eu-data-protection-and-fines-by-the-end-of-the-year/article/422740/"&gt;http://www.scmagazineuk.com/harmonised-eu-data-protection-and-fines-by-the-end-of-the-year/article/422740/&lt;/a&gt;. Accessed: August 8&lt;sup&gt;th&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[38] Tom Jowitt, “Digital Platforms to be Included in EU Cybersecurity Law”. TechWeek Europe. August 7&lt;sup&gt;th&lt;/sup&gt; 2015. Available at: http://www.techweekeurope.co.uk/e-regulation/digital-platforms-eu-cybersecuity-law-174415&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[39] Adam Tanner. Data Brokers are now Selling Your Car's Location for $10 Online. July 10&lt;sup&gt;th&lt;/sup&gt; 2013. Available at: http://www.forbes.com/sites/adamtanner/2013/07/10/data-broker-offers-new-service-showing-where-they-have-spotted-your-car/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things'&gt;https://cis-india.org/internet-governance/blog/review-of-policy-debate-around-big-data-and-internet-of-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2015-08-17T08:36:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/blog_war-driving-in-lhasa-vegas">
    <title>War Driving in Lhasa Vegas</title>
    <link>https://cis-india.org/raw/blog_war-driving-in-lhasa-vegas</link>
    <description>
        &lt;b&gt;This post by Oxblood Ruffin is part of the 'Studying Internets in India' series. Oxblood Ruffin is a hacktivist and film maker. He joined the CULT OF THE DEAD COW in 1996 as its Foreign Minister. Colonel Ruffin is co-author of the Hacktivismo Enhanced Source Software Licencse Agreement (HESSLA), network curmudgeon, and line cook. He will publish a book on information warfare in 2016. In this essay, Colonel Ruffin traces the history of Internet access in Dharamsala, and the factors at play in shaping it - mundane and maverick, familiar and outlier.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;em&gt;Monkeys would often climb up the poles to fool around with the routers forcing Yahel to fix a cage around them to make them “monkey-proof”&lt;/em&gt;&lt;br /&gt; — Eric Brewer&lt;/h3&gt;
&lt;h3&gt;&lt;em&gt;War is an outmoded concept&lt;/em&gt;&lt;br /&gt; — Dalai Lama&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/raw/histories-of-the-internet/cisraw_oxbloodruffin_dharamsala.jpeg" alt="Oxblood Ruffin - Dharamsala" title="Oxblood Ruffin - Dharamsala" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Dharamsala is on the frontline of the Indian internet, fuelled by information activists. Its transition from a sleepy hill station to the residence of the Dalai Lama and the Tibetan government in exile clearly politicised the region. The Tibetan diaspora was its primary network. Information flowed in and out of Dharamsala along conventional means. Students of Buddhism, backpackers, and tourists began to arrive after reading exotic press reports. And then almost overnight everything changed. The internet arrived and with it an explosion of content and possibility. Dharamsala transitioned again.&lt;/p&gt;
&lt;p&gt;In 1959 the Dalai Lama (HHDL) escaped from Tibet to India after the Chinese invasion. And estimated six thousand monasteries and temples were destroyed by the Peoples Liberation Army and up to 1.2 million Tibetans - approximately one sixth of the population - were killed or died of starvation after China invaded Tibet in 1950. A large influx of Tibetan refugees followed HHDL which in turn made Dharamsala a popular tourist destination.&lt;/p&gt;
&lt;p&gt;It is equally chaotic. Like much of touristic India it is full of shambolic hawkers in pursuit of the gora dollar; Israeli twenties fresh from the military and hot for bhang; American unicorns stinking of patchouli in their first pair of harem pants; and young Punjabi men drowning in beer on the weekends. Dharamsala is all of these things, and it is more. Dharamshala is a Hindi word loosely translated into English as 'spiritual dwelling' or 'sanctuary'.&lt;/p&gt;
&lt;p&gt;The region is surrounded by pine forests. The Dalai Lama’s residence in McLeod Ganj and the headquarters of the Central Tibetan Administration (the Tibetan government in exile, or CTA) are also located in Dharamsala. Some folks from Delhi have remarked that when they’re in McLeod Ganj they have the feeling that they aren’t in India. Much of the architecture is in the Tibetan style and the diversity of town-life is atypical. The local Gaddi [tribal] community is supplemented by Kashmiri merchants and Tibetan vendors. Then there is the steady stream of tourists from every point on earth; many having come to study Tibetan culture and Buddhism. Even though HHDL arrived in this mountain town ten years before the first nodes of the internet were deployed, Dharamsala had become a hotbed of activism waiting to connect.&lt;/p&gt;
&lt;p&gt;In the earliest days campaigning was contained within the Tibetan community, and the bustling Dharamsala of today had yet to emerge. But over time, year by year, volunteers from the outside would drift through. Most would work for a few weeks or a few months. Some would never leave. Networks were formed and the technologies of those times were worked overtime. Printing presses, fax machines, photocopiers, tape recorders, photography and, film. Everything was used to get the Tibetan message out, and all of these technologies were used to preserve Tibetan culture in ways that were forbidden in Chinese occupied Tibet. And steadily another technology was developing. The internet.&lt;/p&gt;
&lt;p&gt;In 1986 the Education and Research Network (ERNET) was initiated by the Department of Electronics and transmitted India’s first email exchange. But email had rapidly been flourishing years before on military and university networks in the West. The push came from the outside to get Dharamsala on the internet and to think about email as an emerging communications alternative. In 1989 Indira Singh - a New York based computer consultant - envisioned a globally connected Dharamsala. And at the same time Thubten Samdup - a Tibetan living in Montreal - was wrestling with the problem of how to bring communication costs down. Ms. Singh sent the first email message over an ad-hoc telephone connection from Dharamsala to the Office of Tibet in New York.&lt;/p&gt;
&lt;p&gt;“Hello from Dharamsala”, it said.&lt;/p&gt;
&lt;p&gt;It did not take long to convince officials from the CTA that email and the internet were the future of communications from Dharamsala. While discussions of the technology caused many eyes to glaze over the economics did not: email was cheaper and faster than regular mail. The sell was that simple. Not to mention that Tibetan activists in North America and Europe were already using email. Thubten Samdup founded World Tibet Network News (WTN) on Usenet in 1992; and established eleven different listservs in different languages serving various verticals in the Tibetan diaspora. Although the internet existed in India at the time, it was rather rarefied. Research institutes and military networks primarily in urban centres formed the earliest nodes. The further and mountainous reaches of Dharamsala were not on the drawing board, until they were pushed onto the internet from the outside. In 1993 the International Centre for Human Rights and International Development in Montreal donated fifteen thousand dollars to buy three computers and set up email service for the CTA.&lt;/p&gt;
&lt;p&gt;Other developments followed apace.&lt;/p&gt;
&lt;p&gt;Back in 1989 when Ms. Singh first contemplated an interconnected Dharamsala another computer scientist was sorting out his own vision. Sir Tim Berners-Lee was fiddling with what was to become the World Wide Web. He released the code to the public on Christmas day 1990, and with that the seeds to the mainstreaming of the internet were planted. In 1995 the dial-up internet was introduced for the public in six major cities in India by VSNL. Dharamsala was not included in the rollout, but technical experts in the CTA had been quietly working behind the scenes. In cooperation with North American hackers the CTA’s official Website Tibet.net was launched in 1996 under the stewardship of Thubten Samdup. That same year Sabeer Bhatia, a U.S. based engineer from Bangalore released Hotmail, a free Web email service that garnered 100,000 Indian subscribers within the first three weeks.&lt;/p&gt;
&lt;p&gt;The following year five Bay Area technical experts under the supervision of Dan Haig made a forty hour haul from San Francisco to Dharamsala. Their mission was to set up an intranet for the CTA using sixty thousand dollars of their own money, and carrying one hundred and sixty-five pounds of cables and hardware in their backpacks. The mountain had come to Muhammed if that metaphor is not too strained for Tibetan Buddhists. Once again Dharamsala’s international support network kickstarted the local process. Haig and his colleagues wired the seven ministries of the CTA and the Library of Tibetan Works and Archives giving them high-speed intranet connections. The also created and email system and dial-up service for many cultural institutions in the Dharamsala area that were too far away to be on the network.&lt;/p&gt;
&lt;p&gt;For a town far away in the mountains full of monks and political refugees, Dharamsala was making great strides on the Indian internet. The next leap forward came in the form of an accidental activist. Yahel Ben-David had been a young officer in the Israeli Defence Forces, a successful Linux entrepreneur, and an avid hiker. When he got a call in 1998 to help the CTA install a satellite dish he jumped. What could be better than a three week working vacation in the mountains? Three weeks turned into three months; eventually he relocated to Dharamsala with his wife where he would spend the next eight years working on tech projects. For the next four years Ben-David developed a Local Area Network (LAN) for the CTA and switched everything to ethernet. Monasteries, the Dalai Lama’s private office, and NGOs were all connected. But Ben-David was still dissatisfied.&lt;/p&gt;
&lt;p&gt;Given Dharamsala’s remoteness and the cost-prohibitive realities of proper infrastructure development, the region wouldn’t be seeing a high speed internet any time soon. Radio networks were a technical possibility but the cost of licensed solutions was prohibitive. WiFi could have been a solution but was to be illegal for public use until 2004, and then only indoors. Ben-David put his ham radio knowledge to use by tearing part every Linux SOHO (small office/home office) networking device he could find. He founded the Tibetan Technology Centre (TTC) with Phuntsok Dorjee, a non-profit technology company that would train local talent and develop bespoke routers. And finally in January 2005 the Indian government deregulated WiFi for public use. Within hours of that ruling Ben-David put up the first node of the Dharamsala Community Wireless Mesh Network. It had effectively become the first public WiFi network in the country.&lt;/p&gt;
&lt;p&gt;Testing and tweaking the nodes was a continuous process. In addition to the demanding mountainous terrain environmental issues had to be factored in: Four distinct seasons which included a heavy monsoon; daily power outages; and last but not least, monkeys. They are particularly destructive creatures when they discover something new to play with. Ben-David settled on tamper-proof cages to encase the routers. Similarly the power outages were countered with solar panels. TTC was putting itself on the map for its innovations internationally, and Dharamsala began to attract more and more technical talent. The town that had once been the preserve of backpackers and Buddhists was broadening to include networking and security experts and open-source developers. None of this was lost on the Chinese intelligence community.&lt;/p&gt;
&lt;p&gt;Dharamsala had been an embarrassment to the Chinese ever since the Dalai Lama escaped in 1959. The town has been constantly monitored as have been prominent activists and all of the Tibetan Support Groups. China was particularly displeased when Tibetan activists in Dharamsala partnered with the Cult of the Dead Cow (cDc) hacking group to protest Google’s operations in China. Increasingly Tibetans suffered targeted malware attacks. Listservs and networks were compromised and sensitive information about the CTA, Dalai Lama and activists found its way back to the Chinese intelligence community. A typical exploit of the time involved forged email headers appearing to come from a friendly source. It would include a PDF file containing a message of support. Once opened a friendly enough document would appear, however, it contained a modified version of a PDF-Encode vulnerability. The exploit silently dropped and ran a file called C:\Program Files\Update\winkey.exe. It was a keylogger that collected and sent everything typed on the affected machine to a server running in China. By 2008 Dharamsala appeared to be on the frontline of China’s cyber-espionage ambitions.&lt;/p&gt;
&lt;p&gt;Security researchers at the University of Toronto were approached by the office of the Dalai Lama to examine its computers. Something wasn’t right. The ensuing investigation confirmed that malware had been installed on these machines. They were able to monitor the commands on the infected computers and discover the names of the documents exfiltrated from Dharamsala. Further investigation pointed to specific correspondence stolen and that those behind the attack had gained control of the email servers in the Dalai Lama’s office. One incident was particularly telling. After an email invitation was sent to a foreign diplomat, the Chinese government made a call to the same diplomat discouraging the meeting. And a young woman working for a Dharamsala group making chat connections between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet. She was shown copies of her chat sessions and ordered to stop her political activities. What followed was extraordinary.&lt;/p&gt;
&lt;p&gt;The Toronto researchers discovered that the Dalai Lama’s Dharamsala network was completely compromised, and also those of Tibetan exile groups in India, Brussels, London, and New York. And then the kicker. Additionally their investigations revealed that the command and control centre infecting the computers from China had also taken over more than 1300 computers in 103 countries. Much of the malware had been attached embassies and foreign ministries, including the Indian embassy in Washington. What had originally been thought to be Chinese interference in the Dalai Lama’s affairs and those of the Tibetan Support Groups turned out to only be the tip of the iceberg. The researchers uncovered an international spying operation. But even when exposed and caught by compelling evidence, Chinese officials denied any involvement and dismissed the researchers report as propaganda.&lt;/p&gt;
&lt;p&gt;Despite China’s cries of innocence, the Tibetan community took some satisfaction from the incident. They had been the objects of Chinese interference for years and now the world could see that they weren’t just being paranoid about Chinese hackers. It also garnered wider support in Dharamsala and the Tibetan diaspora for greater security awareness. Groups like Students for a Free Tibet and Tibet Action Institute who had been offering security workshops for years experienced increasing demand for their services. And one thing should also be noted. While the Tibetan community had been on the receiving end of computer hacking and online harassment for years, they never responded in kind. Dharamsala’s response to Chinese aggression has always been non-violent action, online and offline. Two examples come to mind.&lt;/p&gt;
&lt;p&gt;The Dalai Lama had always wanted to be able to speak directly to the Chinese people. Thubten Samdup who had spearheaded a number of internet initiatives organised a group of Chinese speaking Tibetans to engage mainland Chinese via chat online. The strategy was simple. Let people on the other end know that they are chatting with Tibetans, and did they have any questions? The internet probed to be a great leveller and one by one some minds were cleared of disinformation about Tibet and the Dalai Lama. Even though this project met with modest success things were becoming worse in occupied Tibet. Beginning in 2009 Tibetans began self-immolating as a desperate form of non-violent protest. Were it not for a network of monks most of the details of the 138 immolations to date would not be known to the world.&lt;/p&gt;
&lt;p&gt;From the first self-immolation China initiated an information blackout in Tibet. Foreign journalists were not allowed into Tibet and all communications networks were heavily monitored. However one man managed to get the message out. Gyanak Tsering is a Tibetan studying at the Kirti Monastery in Dharamsala. He escaped from Tibet in 1999 and began experimenting with the internet and mobile technology. Working with security experts in Dharamsala Mr. Tsering began to covertly transfer information to and from Tibet. Mobile phones are the primary communication devices in Tibet and increasingly smartphones are used to access the mobile Web. Whenever a self-immolation is reported in the press it is because Mr. Tsering has been sent the details from Tibet. When he has verified the details with three separate sources in Tibet he releases the information to the press. Some wags in Dharamsala refer to Mr. Tsering as the Jason Bourne Buddhist.&lt;/p&gt;
&lt;p&gt;Technical innovation in Dharamsala has always been driven by necessity. Initially it was because the internet was cheaper and faster than conventional communications. Then WiFi development brought more people online because it was easier to deploy than conventional infrastructure. Whatever challenges were faced in Dharamsala there was always some workaround, and others began to notice. Largely as a result of the Dharamsala Community Wireless Mesh Network (later rechristened AirJaldi) open-source developers began flocking to the region. It is now one of India’s more attractive development hubs with IT conferences, new businesses, coding workshops, and hacker spaces. What was once a sleepy hill station emerged as a Tibetan refuge that adapted to the internet and proved that anything was possible.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: The post, including the image, is published under &lt;a href="https://creativecommons.org/licenses/by/4.0/" target="_blank"&gt;Creative Commons Attribution 4.0 International&lt;/a&gt; license, and copyright is retained by the author.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/blog_war-driving-in-lhasa-vegas'&gt;https://cis-india.org/raw/blog_war-driving-in-lhasa-vegas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Oxblood Ruffin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2015-08-17T08:19:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/the-hindu-august-23-2015-talamaddale-on-august-23">
    <title>Talamaddale on August 23</title>
    <link>https://cis-india.org/openness/news/the-hindu-august-23-2015-talamaddale-on-august-23</link>
    <description>
        &lt;b&gt;A talamaddale ‘Karna Chedana’ and ‘Shalya Nirgamana’ will be organised at Abhisheka mandira on the premises of Manjunatha temple at Kadri on August 23 at 2.30 p.m. Yakshagana playback singers Balipa Narayana Bhagawatha and Puttige Raghurama Holla will take part.&lt;/b&gt;
        &lt;h2&gt;Workshop&lt;/h2&gt;
&lt;p class="body" style="text-align: justify; "&gt;A three-day workshop on writing  for Tulu Wikipedia began at Ramakrishna Pre-University College and  Ramakrishna College here on Friday. Speaking on the occasion U.B.  Pavanaja, Programme Officer, Centre for Internet and Society, Bengaluru,  and a Wikipedia representative said that if a language was to sustain  it should in use continuously and all information should be available in  that language. Tulu also should be kept alive using modern tools of  technology.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Read the original coverage published by the Hindu on August 16, 2015 &lt;a class="external-link" href="http://www.thehindu.com/news/cities/Mangalore/talamaddale-on-august-23/article7545909.ece?utm_source=RSS_Feed&amp;amp;utm_medium=RSS&amp;amp;utm_campaign=RSS_Syndication"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/the-hindu-august-23-2015-talamaddale-on-august-23'&gt;https://cis-india.org/openness/news/the-hindu-august-23-2015-talamaddale-on-august-23&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-09-20T15:57:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/sahil-online-august-14-2015">
    <title>ಬೆಳ್ತಂಗಡಿ:ಎಲ್ಲಾ ಕಾಲಕ್ಕೂ ಲಭ್ಯ ಇರುವ ಸ್ವತಂತ್ರ ಹಾಗೂ ಮುಕ್ತ ವಿಶ್ವಕೋಶ ವಿಕಿಪೀಡಿಯಾ-ಪವನಜ</title>
    <link>https://cis-india.org/openness/news/sahil-online-august-14-2015</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS-A2K) has ongoing partnership with SDM College, Ujire. Students of Masters in Communication and Journalism will be writing articles in Kannada Wikipedia. This academic year’s programme was inaugurated on August 12.  It was followed by hands-on workshop. SahilOnline has reported this on August 14, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the online entry published by &lt;a class="external-link" href="http://www.sahilonline.in/dakshana-kannada/%E0%B2%AC%E0%B3%86%E0%B2%B3%E0%B3%8D%E0%B2%A4%E0%B2%82%E0%B2%97%E0%B2%A1%E0%B2%BF%E0%B2%8E%E0%B2%B2%E0%B3%8D%E0%B2%B2%E0%B2%BE-%E0%B2%95%E0%B2%BE%E0%B2%B2%E0%B2%95%E0%B3%8D%E0%B2%95%E0%B3%82/#.VewsF318hQp"&gt;SahilOnline&lt;/a&gt; on August 14, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;ಬೆಳ್ತಂಗಡಿ: ವಿಕಿಪಿಡಿಯಾ ಎಲ್ಲರಿಗೂ ಎಲ್ಲಾ ಕಾಲಕ್ಕೂ ಲಭ್ಯ ಇರುವ ಸ್ವತಂತ್ರ ಹಾಗೂ ಮುಕ್ತ ವಿಶ್ವಕೋಶವಾಗಿದೆ. ಉಪಯುಕ್ತ ಬರವಣಿಗೆಗಳ ಕೋಶವನ್ನು ಹೊಂದಿದ ಇದನ್ನು ಯಾರು ಬೇಕಾದರೂ ಮುಕ್ತವಾಗಿ ಬಳಸಬಹುದು ಎಂದು ಪತ್ರಿಕಾ ಅಂಕಣಕಾರ ಬೆಂಗಳೂರಿನ ಡಾ. ಯು. ಬಿ. ಪವನಜ ಹೇಳಿದರು.&lt;br /&gt;ಅವರು ಗುರುವಾರ ಉಜಿರೆ ಎಸ್.ಡಿ.ಎಮ್. ಸ್ವಾಯತ್ತ ಕಾಲೇಜಿನಲ್ಲಿ ಪತ್ರಿಕೋದ್ಯಮ ವಿಭಾಗದ ವಿದ್ಯಾರ್ಥಿಗಳಿಗೆ ವಿಕಿಪಿಡಿಯಾ ಬರವಣಿಗೆ ಬಗ್ಗೆ ಮಾಹಿತಿ ನೀಡಿ ಮಾತನಾಡಿದರು.&lt;br /&gt;&lt;br /&gt;2001ರಲ್ಲಿ ಅಮೇರಿಕಾದಲ್ಲಿ ಪ್ರಾರಂಭಗೊಂಡ ವಿಕಿಪಿಡಿಯಾ ಪ್ರಪಂಚದ 290 ಭಾಷೆಗಳಲ್ಲಿ ಲಭ್ಯ ಇದೆ. ದೇಶದ 20 ಭಾಷೆಗಳಲ್ಲಿ ಲೇಖನಗಳನ್ನು ಒಳಗೊಂಡಿದೆ. 2003ರಲ್ಲಿ ಕನ್ನಡದಲ್ಲಿಯೂ ವಿಕಿಪಿಡಿಯಾ ಬರವಣಿಗೆ ಪ್ರಾರಂಭವಾಗಿದೆ. ಕೇವಲ 20 ಸಾವಿರ ಲೇಖನಗಳು ಇದೆ. ಬೇರೆ ಭಾಷೆಗಳಿಗೆ ಹೋಲಿಸಿದರೆ ಕಡಿಮೆ ಅನ್ನಿಸುತ್ತದೆ. ಕನ್ನಡದಲ್ಲಿ ಪ್ರಬುದ್ಧತೆಯ ಬರವಣಿಗೆ ಶೈಲಿಯನ್ನು ಸುಧಾರಿಸಿಕೊಳ್ಳಲು ಇದೊಂದು ಸುಲಭದ ಮಾಧ್ಯಮ. ವಿದ್ಯಾರ್ಥಿಗಳು ಸಂಶೋಧನಾ ಪ್ರವೃತ್ತಿ ಮತ್ತು ಕೌಶಲ ಬೆಳೆಸಿಕೊಳ್ಳಬೇಕು ಎಂದರು.&lt;br /&gt;&lt;br /&gt;ವಿಕಿಪಿಡಿಯಾ ಬಳಕೆಯಿಂದ ನಮ್ಮ ಭಾಷೆ ಮತ್ತು ಶೈಲಿ ಸುಧಾರಣೆಯಾಗುತ್ತದೆ. ಮಾಹಿತಿ ಸಂಗ್ರಹದೊಂದಿಗೆ ಕ್ರೋಢೀಕರಣ ಮತ್ತು ಉಲ್ಲೇಖವೂ ಅಗತ್ಯ. ಗೂಗಲ್‍ನಲ್ಲಿ ಯಾವುದೇ ಮಾಹಿತಿ ಇರುವುದಿಲ್ಲ. ಮಾಹಿತಿ ಎಲ್ಲಿ ಸಿಗುತ್ತದೆ ಎಂದು ಮಾತ್ರ ಅದು ಸೂಚಿಸುತ್ತದೆ. ಯಾವುದೇ ಪ್ರಕರಣ ಘಟಿಸಿದ ತಕ್ಷಣ ವಿಕಿಪಿಡಿಯಾದಲ್ಲಿ ಅದು ನವೀಕರಣ ಆಗುತ್ತದೆ. ಪತ್ರಕರ್ತರು ನಿರಂತರ ಅಧ್ಯಯನಶೀಲರಾಗಿ ಮಾಹಿತಿ ಸಂಗ್ರಹಿಸಬೇಕು. ಭಾಷೆ ಬಳಸಿದಾಗ ಅದು ಬೆಳೆಯುತ್ತದೆ ಹಾಗೂ ನಮ್ಮ ಸಂಸ್ಕೃತಿ ಉಳಿಯುತ್ತದೆ ಎಂದರು.&lt;br /&gt;&lt;br /&gt;ಕಾಲೇಜಿನ ಪತ್ರಿಕೋದ್ಯಮ ವಿಭಾಗದ ಮುಖ್ಯಸ್ಥ ಪ್ರೊ. ಭಾಸ್ಕರ ಹೆಗ್ಡೆ ಉಪಸ್ಥಿತರಿದ್ದರು. ವಿದ್ಯಾರ್ಥಿಗಳಾದ ಅರಹಂತ ಸ್ವಾಗತಿಸಿ, ಚೇತನ್ ಕಾರ್ಯಕ್ರಮ ನಿರ್ವಹಿಸಿದರು.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/sahil-online-august-14-2015'&gt;https://cis-india.org/openness/news/sahil-online-august-14-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Kannada Wikipedia</dc:subject>
    

   <dc:date>2015-09-06T12:09:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/karavali-karnataka-august-14-2015">
    <title>ವಿಕಿಪಿಡಿಯ ಮುಕ್ತವಾಗಿ ಬಳಸಿ: ಡಾ.ಪವನಜ</title>
    <link>https://cis-india.org/openness/news/karavali-karnataka-august-14-2015</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS-A2K) has ongoing partnership with SDM College, Ujire. Students of Masters in Communication and Journalism will be writing articles in Kannada Wikipedia. This academic year’s programme was inaugurated on August 12.  It was followed by hands-on workshop. Karavali Karnataka, a Karnataka news portal has reported this in an article published on August 14, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original coverage in Kannada published by Karavali Karnataka on August 14, 2015 &lt;a class="external-link" href="http://karavalikarnataka.com/news/fullstory.aspx?story_id=3846&amp;amp;languageid=1&amp;amp;catid=102&amp;amp;menuid=0"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;ಬೆಳ್ತಂಗಡಿ: ವಿಕಿಪಿಡಿಯ ಎಲ್ಲರಿಗೂ ಎಲ್ಲಾ ಕಾಲಕ್ಕೂ ಲಭ್ಯ ಇರುವ ಸ್ವತಂತ್ರ ಹಾಗೂ ಮುಕ್ತ ವಿಶ್ವಕೋಶವಾಗಿದೆ. ಉಪಯುಕ್ತ ಬರವಣಿಗೆಗಳ ಕೋಶವನ್ನು ಹೊಂದಿದ ಇದನ್ನು ಯಾರು ಬೇಕಾದರೂ ಮುಕ್ತವಾಗಿ ಬಳಸಬಹುದು ಎಂದು ಅಂಕಣಕಾರ ಬೆಂಗಳೂರಿನ ಡಾ. ಯು. ಬಿ. ಪವನಜ ಹೇಳಿದರು.&lt;br /&gt;&lt;br /&gt;ಅವರು ಉಜಿರೆ ಎಸ್.ಡಿ.ಎಮ್. ಸ್ವಾಯತ್ತ ಕಾಲೇಜಿನಲ್ಲಿ ಪತ್ರಿಕೋದ್ಯಮ ವಿಭಾಗದ ವಿದ್ಯಾರ್ಥಿಗಳಿಗೆ ವಿಕಿಪಿಡಿಯ ಬರವಣಿಗೆ ಬಗ್ಗೆ ಮಾಹಿತಿ ನೀಡಿ ಮಾತನಾಡಿದರು.&lt;br /&gt;&lt;br /&gt;2001ರಲ್ಲಿ ಅಮೇರಿಕಾದಲ್ಲಿ ಪ್ರಾರಂಭಗೊಂಡ ವಿಕಿಪಿಡಿಯಾ ಪ್ರಪಂಚದ 290 ಭಾಷೆಗಳಲ್ಲಿ ಲಭ್ಯ ಇದೆ. ದೇಶದ 20 ಭಾಷೆಗಳಲ್ಲಿ ಲೇಖನಗಳನ್ನು ಒಳಗೊಂಡಿದೆ.  2003ರಲ್ಲಿ ಕನ್ನಡದಲ್ಲಿಯೂ ವಿಕಿಪಿಡಿಯ ಬರವಣಿಗೆ ಪ್ರಾರಂಭವಾಗಿದೆ. ಕೇವಲ 20 ಸಾವಿರ ಲೇಖನಗಳು ಇದೆ. ಬೇರೆ ಭಾಷೆಗಳಿಗೆ ಹೋಲಿಸಿದರೆ ಕಡಿಮೆ ಅನ್ನಿಸುತ್ತದೆ. ಕನ್ನಡದಲ್ಲಿ ಪ್ರಬುದ್ಧತೆಯ ಬರವಣಿಗೆ ಶೈಲಿಯನ್ನು ಸುಧಾರಿಸಿಕೊಳ್ಳಲು ಇದೊಂದು ಸುಲಭದ ಮಾಧ್ಯಮ. ವಿದ್ಯಾರ್ಥಿಗಳು ಸಂಶೋಧನಾ ಪ್ರವೃತ್ತಿ ಮತ್ತು ಕೌಶಲ ಬೆಳೆಸಿಕೊಳ್ಳಬೇಕು ಎಂದರು.&lt;br /&gt;&lt;br /&gt;ವಿಕಿಪಿಡಿಯ ಬಳಕೆಯಿಂದ ನಮ್ಮ ಭಾಷೆ ಮತ್ತು ಶೈಲಿ ಸುಧಾರಣೆಯಾಗುತ್ತದೆ. ಮಾಹಿತಿ ಸಂಗ್ರಹದೊಂದಿಗೆ ಕ್ರೋಢೀಕರಣ ಮತ್ತು ಉಲ್ಲೇಖವೂ ಅಗತ್ಯ. ಗೂಗಲ್ನಲ್ಲಿ ಯಾವುದೇ ಮಾಹಿತಿ ಇರುವುದಿಲ್ಲ. ಮಾಹಿತಿ ಎಲ್ಲಿ ಸಿಗುತ್ತದೆ ಎಂದು ಮಾತ್ರ ಅದು ಸೂಚಿಸುತ್ತದೆ. ಯಾವುದೇ ಪ್ರಕರಣ ಘಟಿಸಿದ ತಕ್ಷಣ ವಿಕಿಪಿಡಿಯದಲ್ಲಿ ಅದು ನವೀಕರಣ ಆಗುತ್ತದೆ. ಪತ್ರಕರ್ತರು ನಿರಂತರ ಅಧ್ಯಯನಶೀಲರಾಗಿ ಮಾಹಿತಿ ಸಂಗ್ರಹಿಸಬೇಕು. ಭಾಷೆ ಬಳಸಿದಾಗ ಅದು ಬೆಳೆಯುತ್ತದೆ ಹಾಗೂ ನಮ್ಮ ಸಂಸ್ಕೃತಿ ಉಳಿಯುತ್ತದೆ ಎಂದರು.&lt;br /&gt;&lt;br /&gt;ಕಾಲೇಜಿನ ಪತ್ರಿಕೋದ್ಯಮ ವಿಭಾಗದ ಮುಖ್ಯಸ್ಥ ಪ್ರೊ. ಭಾಸ್ಕರ ಹೆಗ್ಡೆ ಉಪಸ್ಥಿತರಿದ್ದರು. ವಿದ್ಯಾರ್ಥಿಗಳಾದ ಅರಹಂತ ಸ್ವಾಗತಿಸಿ, ಚೇತನ್ ಕಾರ್ಯಕ್ರಮ ನಿರ್ವಹಿಸಿದರು.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/karavali-karnataka-august-14-2015'&gt;https://cis-india.org/openness/news/karavali-karnataka-august-14-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-09-06T12:03:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/a2kga-global-censorship">
    <title>Global Censorship: Shifting Modes, Persisting Paradigms</title>
    <link>https://cis-india.org/a2k/a2kga-global-censorship</link>
    <description>
        &lt;b&gt;'Global Censorship: Shifting Modes, Persisting Paradigms' is a book edited by Pranesh Prakash, Nagla Rizk, and Carlos Affonso Souza, and published by the Access to Knowledge Global Academy as part of its Access to Knowledge Research Series.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/a2kga-global-censorship'&gt;https://cis-india.org/a2k/a2kga-global-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-14T11:22:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril">
    <title>Right to Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril</link>
    <description>
        &lt;b&gt;It seems to have become quite a fad, especially amongst journalists, to use this headline and claim that the right to privacy which we consider so inherent to our being, is under attack. However, when I use this heading in this piece I am not referring to the rampant illegal surveillance being done by the government, or the widely reported recent raids on consenting (unmarried) adults who were staying in hotel rooms in Mumbai. I am talking about the fact that the Supreme Court of India has deemed it fit to refer the question of the very existence of a fundamental right to privacy to a Constitution Bench to finally decide the matter, and define the contours of such right if it does exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In an order dated August 11, 2015 the Supreme Court finally gave in to the arguments advanced by the Attorney General and admitted that there is some “unresolved contradiction” regarding the existence of a constitutional “right to privacy” under the Indian Constitution and requested that a Constitutional Bench of appropriate strength.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court was hearing a petition challenging the implementation of the Adhaar Card Scheme of the government, where one of the grounds to challenge the scheme was that it was violative of the right to privacy guaranteed to all citizens under the Constitution of India. However to counter this argument, the State (via the Attorney General) challenged the very concept that the Constitution of India guarantees a right to privacy by relying on an “unresolved contradiction” in judicial pronouncements on the issue, which so far had only been of academic interest. This “unresolved contradiction” arose because in the cases of &lt;b&gt;&lt;i&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/i&gt;&lt;/b&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of U.P. &amp;amp; Others,&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;b&gt;[2]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(decided by &lt;i&gt;Eight &lt;/i&gt;and &lt;i&gt;Six &lt;/i&gt;Judges respectively) the Supreme Court has categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However somehow the later case of &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of M.P. and another&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;i&gt;Kharak Singh&lt;/i&gt; to hold that a right to privacy does exist and is guaranteed as a fundamental right under the Constitution of India.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;b&gt;&lt;i&gt;R. Rajagopal &amp;amp; Another &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Tamil Nadu &amp;amp; Others,&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;b&gt;[5]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(popularly known as &lt;i&gt;Auto Shanker’s &lt;/i&gt;case) and &lt;b&gt;&lt;i&gt;People’s Union for Civil Liberties (PUCL) &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11 order, all these judgments were decided by two or three Judges only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioners on the other hand made a number of arguments to counter those made by the Attorney General to the effect that the fundamental right to privacy is well established under Indian law and that there is no need to refer the matter to a Constitutional Bench. These arguments are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The observations made in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;regarding the absence of right to privacy are not part of the &lt;i&gt;ratio decidendi&lt;/i&gt; of that case and, therefore, do not bind the subsequent smaller Benches such as &lt;b&gt;&lt;i&gt;R. Rajagopal &lt;/i&gt;&lt;/b&gt;and &lt;b&gt;&lt;i&gt;PUCL&lt;/i&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Even in &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;it was held that the right of a person not to be disturbed at his residence by the State is recognized to be a part of a fundamental right guaranteed under Article 21. It was argued that this is nothing but an aspect of privacy. The observation in para 20 of the majority judgment (quoted in footnote 2 above) at best can be construed only to mean that there is no fundamental right of privacy against the State’s authority to keep surveillance on the activities of a person. However, they argued that such a conclusion cannot be good law any more in view of the express declaration made by a seven-Judge bench decision of this Court in &lt;b&gt;&lt;i&gt;Maneka Gandhi &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Both &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were decided on an interpretation of the Constitution based on the principles expounded in &lt;b&gt;&lt;i&gt;A.K. Gopalan &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Madras&lt;/b&gt;&lt;/i&gt;,&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; which have themselves been declared wrong by a larger Bench in &lt;b&gt;&lt;i&gt;Rustom Cavasjee Cooper &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than the points above, it was also argued that world over in all the countries where Anglo-Saxon jurisprudence is followed, ‘privacy’ is recognized as an important aspect of the liberty of human beings. The petitioners also submitted that it was too late in the day for the Union of India to argue that the Constitution of India does not recognize privacy as an aspect of the liberty under Article 21 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However these arguments of the petitioners were not enough to convince the Supreme Court that there is no doubt regarding the existence and contours of the right to privacy in India. The Court, swayed by the arguments presented by the Attorney General, admitted that questions of far reaching importance for the Constitution were at issue and needed to be decided by a Constitutional Bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving some insight into its reasoning to refer this issue to a Constitutional Bench, the Court did seem to suggest that its decision to refer the matter to a larger bench was more an exercise in judicial propriety than an action driven by some genuine contradiction in the law. The Court said that if the observations in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were accepted as the law of the land, the fundamental rights guaranteed under the Constitution of India would get “denuded of vigour and vitality”. However the Court felt that institutional integrity and judicial discipline require that smaller benches of the Court follow the decisions of larger benches, unless they have very good reasons for not doing so, and since in this case it appears that the same was not done therefore the Court referred the matter to a larger bench to scrutinize the ratio of &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra)&lt;/i&gt; and decide the judicial correctness of subsequent two judge and three judge bench decisions which have asserted or referred to the right to privacy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: “A power of search and seizure is in any system of jurisprudence an overriding power of the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not to subject such regulation to constitutional limitations &lt;i&gt;by recognition of a fundamental right to privacy&lt;/i&gt;, analogous to the American Fourth Amendment, &lt;i&gt;we have no justification to import it, into a totally different fundamental right, by some process of strained construction&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: “&lt;b&gt;… &lt;/b&gt;Nor do we consider that Art. 21 has any relevance in the context as was sought to be suggested by learned counsel for the petitioner. As already pointed out, &lt;i&gt;the right of privacy is not a guaranteed right under our Constitution&lt;/i&gt;and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an infringement of a fundamental right guaranteed by Part III.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; It is interesting to note that while the decisions in both &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; were given in the context of similar facts (challenging the power of the police to make frequent domiciliary visits both during the day and night at the house of the petitioner) while the majority in &lt;i&gt;Kharak Singh&lt;/i&gt; specifically denied the existence of a fundamental right to privacy, however they held the conduct of the police to be violative of the right to personal liberty guaranteed under Article 21, since the Regulations under which the police actions were undertaken were themselves held invalid. On the other hand, while &lt;i&gt;Gobind&lt;/i&gt; held that a fundamental right to privacy does exist in Indian law, it may be interfered with by the State through procedure established by law and therefore upheld the actions of the police since they were acting under validly issued Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; (1978) 1 SCC 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; AIR 1950 SC 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; (1970) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-13T15:32:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/mangalorean-dotcom-august-13-2015">
    <title>ವಿಕಿಪಿಡಿಯಾ ಬಳಕೆಯಿಂದ ನಮ್ಮ ಭಾಷೆ ಮತ್ತು ಶೈಲಿ ಸುಧಾರಣೆಯಾಗುತ್ತದೆ - ಡಾ. ಯು.ಬಿ. ಪವನಜ</title>
    <link>https://cis-india.org/openness/news/mangalorean-dotcom-august-13-2015</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS-A2K) has ongoing partnership with SDM College, Ujire. Students of Masters in Communication and Journalism will be writing articles in Kannada Wikipedia. This academic year’s programme was inaugurated on August 12.  It was followed by hands-on workshop. Mangalorean.com, a Karnataka portal has reported this  on August 13, 2015.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This was published online by &lt;a class="external-link" href="http://www.mangalorean.com/%E0%B2%97%E0%B3%8D%E0%B2%B0%E0%B2%BE%E0%B2%AE%E0%B3%80%E0%B2%A3-%E0%B2%AA%E0%B3%8D%E0%B2%B0%E0%B2%A6%E0%B3%87%E0%B2%B6%E0%B2%A6-%E0%B2%86%E0%B2%B0%E0%B3%8D%E0%B2%A5%E0%B2%BF%E0%B2%95-%E0%B2%AA/"&gt;mangalorean.com&lt;/a&gt; on August 13, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ವಿಕಿಪಿಡಿಯಾ ಬರವಣಿಗೆ ಬಗ್ಗೆ ಮಾಹಿತಿ&lt;br /&gt;&lt;br /&gt;ವಿಕಿಪಿಡಿಯಾ ಎಲ್ಲರಿಗೂ ಎಲ್ಲಾ ಕಾಲಕ್ಕೂ ಲಭ್ಯ ಇರುವ ಸ್ವತಂತ್ರ ಹಾಗೂ ಮುಕ್ತ ವೀಶ್ವಕೋಶವಾಗಿದೆ. ಇದನ್ನು ಯಾರು ಬೇಕಾದರೂ ಸ್ವತಂತ್ರವಾಗಿ ಬಳಸಬಹುದು ಎಂದು ಪ್ರಜಾವಾಣಿ ಪತ್ರಿಕೆಯ ಅಂಕಣಕಾರ ಬೆಂಗಳೂರಿನ ಡಾ. ಯು.ಬಿ. ಪವನಜ ಹೇಳಿದರು.&lt;br /&gt;&lt;br /&gt;ಉಜಿರೆಯಲ್ಲಿ ಎಸ್.ಡಿ.ಎಮ್. ಸ್ವಾಯತ್ತ ಕಾಲೇಜಿನಲ್ಲಿ ಗುರುವಾರ ಪತ್ರಿಕೋದ್ಯಮ ವಿಭಾಗದ ವಿದ್ಯಾರ್ಥಿಗಳಿಗೆ ವಿಕಿಪಿಡಿಯಾ ಬರವಣಿಗೆ ಬಗ್ಗೆ ಮಾಹಿತಿ ನೀಡಿ ಅವರು ಮಾತನಾಡಿದರು.&lt;br /&gt;&lt;br /&gt;ಗೂಗಲ್‍ನಲ್ಲಿ ಯಾವುದೇ ಮಾಹಿತಿ ಇರುವುದಿಲ್ಲ. ಮಾಹಿತಿ ಎಲ್ಲಿ ಸಿಗುತ್ತದೆ ಎಂದು ಮಾತ್ರ ಅದು ಸೂಚಿಸುತ್ತದೆ. ಯಾವುದೇ ಪ್ರಕರಣ ಘಟಿಸಿದ ತಕ್ಷಣ ವಿಕಿಪಿಡಿಯಾದಲ್ಲಿ ಅದು ನವೀಕರಣ ಆಗುತ್ತದೆ.&lt;br /&gt;&lt;br /&gt;2001ರಲ್ಲಿ ಅಮೇರಿಕಾದಲ್ಲಿ ಪ್ರಾರಂಭಗೊಂಡ ವಿಕಿಪಿಡಿಯಾ ಪ್ರಪಂಚನದ 290 ಭಾಷೆಗಳಲ್ಲಿ ಲಭ್ಯ ಇದೆ. 2003ರಲ್ಲಿ ಕನ್ನಡದಲ್ಲಿಯೂ ವಿಕಿಪಿಡಿಯಾ ಬರವಣಿಗೆ ಪ್ರಾರಂಭವಾಗಿದೆ. ವಿದ್ಯಾರ್ಥಿಗಳು ಸಂಶೋಧನಾ ಪ್ರವೃತ್ತಿ ಮತ್ತು ಕೌಶಲ ಬೆಳೆಸಿಕೊಳ್ಳಬೇಕು ಎಂದು ಸಲಹೆ ನೀಡಿದ ಅವರು ವಿಕಿಪಿಡಿಯಾ ಬಳಕೆಯಿಂದ ನಮ್ಮ ಭಾಷೆ ಮತ್ತು ಶೈಲಿ ಸುಧಾರಣೆಯಾಗುತ್ತದೆ. ಮಾಹಿತಿ ಸಂಗ್ರಹದೊಂದಿಗೆ ಕ್ರೋಢೀಕರಣ ಮತ್ತು ಉಲ್ಲೇಖವೂ ಅಗತ್ಯ ಎಂದು ಅವರು ಹೇಳಿದರು.&lt;br /&gt;&lt;br /&gt;ಪತ್ರಕರ್ತರು ನಿರಂತರ ಅಧ್ಯಯನಶೀಲರಾಗಿ ಮಾಹಿತಿ ಸಂಗ್ರಹಿಸಬೇಕು. ಭಾಷೆ ಬಳಸಿದಾಗ ಅದು ಬೆಳೆಯುತ್ತದೆ ಹಾಗೂ ನಮ್ಮ ಸಂಸ್ಕøತಿ ಉಳಿಯುತ್ತದೆ ಎಂದು ಅವರು ಅಭಿಪ್ರಾಯಪಟ್ಟರು.&lt;br /&gt;&lt;br /&gt;ಕಾಲೇಜಿನ ಪತ್ರಿಕೋದ್ಯಮ ವಿಭಾಗದ ಮುಖ್ಯಸ್ಥ ಪ್ರೊ. ಭಾಸ್ಕರ ಹೆಗ್ಡೆ ಉಪಸ್ಥಿತರಿದ್ದರು.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/mangalorean-dotcom-august-13-2015'&gt;https://cis-india.org/openness/news/mangalorean-dotcom-august-13-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Kannada Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-18T18:21:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
