<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 71 to 85.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/software-patents/JTDs-position-on-DPM.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-09-sept-2008.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.odt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.doc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/content-access/open%20access%20day%20flyer.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/content-access/a2k3-panel-xi.ogg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/photocopying-the-past"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-and-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/snooping-to-data-abuse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/want-to-be-watched"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-brother-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/online-anonymity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/government-enter-homes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/facebook-privacy-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/publications/software-patents/JTDs-position-on-DPM.pdf">
    <title>J. T. D'souza</title>
    <link>https://cis-india.org/openness/publications/software-patents/JTDs-position-on-DPM.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/software-patents/JTDs-position-on-DPM.pdf'&gt;https://cis-india.org/openness/publications/software-patents/JTDs-position-on-DPM.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-09-23T10:50:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-09-sept-2008.pdf">
    <title>PDF Format</title>
    <link>https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-09-sept-2008.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-09-sept-2008.pdf'&gt;https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-09-sept-2008.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-08-23T03:06:23Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.odt">
    <title>Oo.org Format</title>
    <link>https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.odt</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.odt'&gt;https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.odt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-08-23T03:06:49Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.doc">
    <title>MS Format</title>
    <link>https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.doc</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.doc'&gt;https://cis-india.org/openness/publications/standards/uploads/response-to-indian-open-standards-policy-10-sept-2008.doc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-08-23T03:07:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/content-access/open%20access%20day%20flyer.pdf">
    <title>Open Access Day Flyer</title>
    <link>https://cis-india.org/openness/publications/content-access/open%20access%20day%20flyer.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/content-access/open%20access%20day%20flyer.pdf'&gt;https://cis-india.org/openness/publications/content-access/open%20access%20day%20flyer.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-10-31T09:24:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/content-access/a2k3-panel-xi.ogg">
    <title>A2K3 Panel XI - Ogg Vorbis</title>
    <link>https://cis-india.org/openness/publications/content-access/a2k3-panel-xi.ogg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/content-access/a2k3-panel-xi.ogg'&gt;https://cis-india.org/openness/publications/content-access/a2k3-panel-xi.ogg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-09-21T14:43:16Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/photocopying-the-past">
    <title>Photocopying the past</title>
    <link>https://cis-india.org/a2k/blogs/photocopying-the-past</link>
    <description>
        &lt;b&gt;There is no single correct position when it comes to intellectual property or IP. In fact, there are at least five correct positions that you could possibly adopt based on who you are — a pro-creator position, a pro-entrepreneur position, a pro-government position, a pro-consumer position and a public interest position.&lt;/b&gt;
        
&lt;p&gt;Therefore, before you progress any further, dear reader, you have to first decide which of the above you are. If you are an average Indian, then you are almost certainly a consumer or a member of the general public. Next, it would only be fair for me to tell you when I am coming from: I work for a policy research organisation that focuses on protecting consumer and public interest in the digital era. Before I proceed any further, also note that not all creators prefer profits to public adulation and therefore creators’ interests are not necessarily always opposed to consumer and public interest.&lt;/p&gt;
&lt;p&gt;At this point, popular imagination is captivated by meta-regulation, issues of corruption and transparency. Few seem interested in the configuration details of property regimes that we are all implicated in: tangible property, capital and, in our increasingly dematerialised world, intangible property such as IP or spectrum. Unfortunately the complications of spectrum, banking and IP make our eyes glaze over and there is almost zero attention being paid to the copyright act amendment to be discussed in Parliament this week.&lt;/p&gt;
&lt;p&gt;For the government, achieving a compromise is the primary objective, and then, perhaps a distant second, raising taxes. This is not a static compromise, since each generation of new technologies precipitates a new round of negotiations between the stakeholders. So while it is easy to be Anna Hazare, it is difficult to be Kapil Sibal. An optimal compromise position as in the world of capital and tangible property protects the production, circulation and consumption of IP. A sub-optimal position results in practices that are in conflict with policy — anti-competitive behaviour or infringement.&lt;/p&gt;
&lt;p&gt;Unfortunately when it comes to evidence-based policy-making, there is little funding for public interest IP research in India and the pockets of the lobbyists of rights-holders are deep. The funded research that they tout claims that government loses significant taxes because of piracy or non-maximalist IP policies. Yet rights-holders, especially multinationals in the software business, are experts at tax avoidance through techniques with names like the “Double Irish” and the “Dutch Sandwich”.&lt;/p&gt;
&lt;p&gt;Like any compromise, the latest amendment is a mixed bag for consumers and the general public. With regard to “digital rights management,” — or what consumers’ advocates refer to as “digital restrictions management” — the government has yielded to the TRIPS-plus agenda even though it is not a signatory to the WIPO Internet treaties. And with regard to the exception for the disabled, the Indian exception is both disability- and works-neutral making it much more robust when compared to the treaty for the visually impaired currently being discussed at the WIPO.&lt;/p&gt;
&lt;p&gt;However, one particular compromise — the volte-face on Section 2 (m) on parallel imports of books — is particularly distressing for book-lovers and students. As part of the latest amendment, this new section was introduced in 2009. The standing committee report gave the section a thumbs-up, but strangely it has gone missing in the latest version of the bill circulated to the MPs in preparation for the Rajya Sabha debate this Friday.&lt;/p&gt;
&lt;p&gt;Section 2 (m) is a provision that would have saved us from the uncertainty created by what some consider flawed jurisprudence around parallel importation of copyrighted works. As the standing committee report on the copyright amendment puts it, “nobody can deny the fact that the interests of students will be best protected if they have access to the latest editions of the books.” To date, I have never met an IIT or IIM graduate untainted by photocopied books. I would claim that the lack of quality education in our country is still at the level of an epidemic. The indigenous publication industry has benefited from our progressive copyright regime.&lt;/p&gt;
&lt;p&gt;Wouldn’t it be appropriate to afford them maximum flexibility in a future rife with technological shifts? Are all the books that you wish to read available in the libraries and book shops you have access to? Have you ever been forced to photocopy a book because of time constraints? Would you like to see greater choice via increased free-market competition, and reduced state-sanctioned monopolies and enforcement? Does your definition of human rights include the “right to education” and the the “right to entertainment”? Shouldn’t the disabled in India benefit from the $500 million spent each year making books accessible in the US? And finally, shouldn’t a nation providing leadership to the development agenda at WIPO, walk the talk at home? If your answer to any of these questions is yes, you should demand that people are placed before the profits of foreign publishers.&lt;/p&gt;
&lt;p&gt;This article by Sunil Abraham, Executive Director, Centre for Internet and Society was published in the Indian Express on 2 September 2011 in the Indian Express. Please read the original article &lt;a class="external-link" href="http://www.indianexpress.com/news/photocopying-the-past/840461/1"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/photocopying-the-past'&gt;https://cis-india.org/a2k/blogs/photocopying-the-past&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2011-09-25T20:06:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-and-security">
    <title>Privacy and Security Can Co-exist</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-and-security</link>
    <description>
        &lt;b&gt;The blanket surveillance the Centre seeks is not going to make India more secure, writes Sunil Abraham in this article published in Mail Today on June 21, 2011.&lt;/b&gt;
        
&lt;p&gt;TODAY, the national discourse around the “ right to privacy” posits privacy as antithetical to security.&lt;/p&gt;
&lt;p&gt;Nothing can be farther from the truth. Privacy is a necessary but not sufficient condition for security. A bank safe is safe only because the keys are held by a trusted few. No one else can access these keys or has the ability to duplicate them. The 2008 amendment of the IT Act and their associated rules notified April 2011 propose to eliminate whatever little privacy Indian netizens have had so far. Already as per the Internet Service Provider ( ISP) licence, citizens using encryption above 40- bit were expected to deposit the complete decryption key with the Ministry of Communications and Information Technology. This is as intelligent as citizens of a neighbourhood making duplicates of the keys to their homes and handing them over at the local police station.&lt;/p&gt;
&lt;h3&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;Surveillance in any society is like salt in cooking — essential in small quantities but completely counter- productive even slightly in excess. Blanket surveillance makes privacy extinct, it compromises anonymity, essential ingredients for democratic governance, free media, arts and culture, and, most importantly, commerce and enterprise. The Telegraph Act only allowed for blanket surveillance as the rarest of the rare exception. The IT Act, on the other hand, mandates multitiered blanket surveillance of all lawabiding citizens and enterprises.&lt;/p&gt;
&lt;p&gt;When your mother visits the local cybercafe to conduct an e- commerce transaction, at the very minimum there are two levels of blanket surveillance. According to the cyber- cafe rules, all her transaction logs will be captured and stored by the operator for a period of one year. This gentleman would also have access to her ID document and photograph. The ISPs would also store her logs for two years to be in compliance with the ISP licence ( even though none of them publish a data- retention policy). Some e- commerce website, to avoid liability, will under the Intermediary Due Diligence rules also retain logs.&lt;/p&gt;
&lt;p&gt;Data retention at the cyber- cafe, by the ISP and also by the application service provider does not necessarily make Indian cyberspace more secure. On the contrary, redundant storage of sensitive personal information only opens up multiple points of failure and leaks — in the age of Nira Radia and Amar Singh no sensible bank would accept such intrusion into their core business processes.&lt;/p&gt;
&lt;p&gt;Surveillance capabilities are not a necessary feature of information systems.&lt;/p&gt;
&lt;p&gt;They have to be engineered into these systems. Once these features exist they could potentially serve both the legally authorised official and undesirable elements.&lt;/p&gt;
&lt;p&gt;Terrorists, cyber- warriors and criminals will all find systems with surveillance capabilities easier to compromise.&lt;/p&gt;
&lt;p&gt;In other words, surveillance compromises security at the level of system design. There were no Internet or phone lines in the Bin Laden compound — he was depending on a store and forward arrangement based on USB drives. Do we really think that registration of all USB drives, monitoring of their usage and the provision of back doors to these USBs via a master key would have led the investigators to him earlier?&lt;/p&gt;
&lt;h3&gt;Myth&lt;/h3&gt;
&lt;p&gt;Increase in security levels is not directly proportional to an increase in levels of surveillance gear. This is only a myth perpetuated by vendors of surveillance software and hardware via the business press. You wouldn't ask the vendors of Xray machines how many you should purchase for an airport, would you? An airport airport with 2,000 X- ray machines is not more secure than one with 20. But in the age of UID and NATGRID, this myth has been the best route for reaching salestargets using tax- payers’ money.&lt;/p&gt;
&lt;p&gt;Surveillance must be intelligent, informed by evidence and guided by a scientific method. Has the ban on public WiFi and the current ID requirements at cyber- cafes led to the arrest of terrorists or criminals in India? Where is the evidence that more resource hungry blanket surveillance is going to provide a return on the investment? Unnecessary surveillance is counter- productive and distracts the security agenda with irrelevance.&lt;/p&gt;
&lt;p&gt;Finally, there is the question of perception management. Perceptions of security do not only depend on reality but on personal and popular sentiment. There are two possible configurations for information systems — one, where the fundamental organising principle is trust and second, where the principle is suspicion.&lt;/p&gt;
&lt;p&gt;Systems based on suspicion usually give rise to criminal and corrupt behaviour.&lt;/p&gt;
&lt;h3&gt;Perception&lt;/h3&gt;
&lt;p&gt;If the state were to repeatedly accuse its law- abiding citizens of being terrorists and criminals it might end up provoking them into living up to these unfortunate expectations. If citizens realise that every moment of their digital lives is being monitored by multiple private and government bodies, they will begin to use anonymisation and encryption technology round the clock even when it is not really necessary. Ordinary citizens will be forced to visit the darker and nastier corners of the Internet just to download encryption tools and other privacy enabling software. Like prohibition this will only result in further insecurity and break- down of the rule of law.&lt;/p&gt;
&lt;p&gt;The writer is executive director of the Bangalore- based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Read the original published in Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/Details.aspx?boxid=231936750&amp;amp;id=55069&amp;amp;issuedate=2162011"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-and-security'&gt;https://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T09:05:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/snooping-to-data-abuse">
    <title>Snooping Can Lead to Data Abuse</title>
    <link>https://cis-india.org/internet-governance/blog/snooping-to-data-abuse</link>
    <description>
        &lt;b&gt;THE NATGRID, aiming to link databases of 21 departments and ministries for better counter-terror measures, adopts blunt policy approach, subjecting every citizen to the same level of blanket surveillance, instead of a targeted approach that intelligently focuses on geographic or demographic areas that are currently important, writes Sunil Abraham in this article published by Mail Today on June 9, 2011.&lt;/b&gt;
        
&lt;p&gt;THE NATGRID, aiming to link databases of 21 departments and ministries for better counter- terror measures, adopts blunt policy approach, subjecting every citizen to the same level of blanket surveillance, instead of a targeted approach that intelligently focuses on geographic or demographic areas that are currently important.&lt;br /&gt;&lt;br /&gt;All you manage to do with the current approach help software, hardware and biometric equipment vendors achieve their sales targets. It is quite unlikely that security agencies will learn anything insightful by putting everybody under the same degree of surveillance. There is no scientific evidence to show that we will be a safer nation if the government eavesdropped into all aspects of a citizen’s life. Targeted surveillance, on the other hand, is like good old- fashioned detective work. Put a particular section — of potential troublemakers — under surveillance and leave the others alone.&lt;/p&gt;
&lt;p&gt;With round- the- clock, 100- per cent, 360- degree surveillance, all the data is scrutinised all the time. The more effective approach is to sample and collect data while maintaining data trails. If anything suspicious is noticed, the rest of the trail can be dug up. Blanket surveillance only leads to leaks and abuse and tremendous distraction. The surveillance infrastructure will be overburdened as 99 per cent of the records and files scanned will be of no interest terms of fighting terrorism, etc.&lt;/p&gt;
&lt;p&gt;The 21 databases need to be opened only when there is anything suspicious in any of the extracted and scrutinised samples or subsets. If there is a suspicious pattern, it should lead to opening of subsets in all the databases. Obviously, there should be ways in which the databases can talk to each other — demand for a particular subset, and not for all the records to be available to agencies all the time.&lt;/p&gt;
&lt;p&gt;The NATGRID has to be able to let investigators selectively go in and out of the necessary subsets data. No one should be able to have a 360 degree view of all activities of all Indians. AS OF now, the NATGRID design does not appear to have a safeguard for data abuse. And no matter what you see Hollywood movies, this configuration does not exist in Europe or the US. Two important forms of protections that should be available in democracies with robust privacy laws are missing in India. The first is breach notification.&lt;/p&gt;
&lt;p&gt;If intelligence agencies and the police have looked up your files, you have a right to be informed. Secondly, you can request for a copy of the information that is maintained on you and request modifications if the data is inaccurate, so as to prevent harassment. Such checks and balances are necessary an intelligent and appropriate surveillance regime.&lt;/p&gt;
&lt;p&gt;Merging all 21 databases for 1.2 billion people into a single system only provides a juicy target for any internal or external enemy. From the perspective national security, it is a foolish thing to do. Terrorist groups will be able to target a single failure point destroy over a billion lives. Since the current configuration of the NATGRID only undermines national security, one is forced conclude that national security is a false pretext.&lt;/p&gt;
&lt;p&gt;This explains the deep scepticism among many the intelligence agencies involved. The real purpose of the project is to scare citizens in the age of Arab springs. The NATGRID is a disciplinary measure aimed at social engineering of citizens’ behaviour. Unfortunately, our media has been misled by the corporate cheerleaders of this humongous waste of money.&lt;/p&gt;
&lt;p&gt;The writer is executive director at the Centre for Internet and Society in Bangalore.&lt;br /&gt;( As told to Max Martin)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://epaper.mailtoday.in/epaperhome.aspx?issue=962011"&gt;Follow on Mail Today&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/publications/snooping-data-abuse.pdf" class="internal-link" title="Snooping Can Lead to Data Abuse (PDF)"&gt;Download the original here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/snooping-to-data-abuse'&gt;https://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:39:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/want-to-be-watched">
    <title>Do You Want to be Watched?</title>
    <link>https://cis-india.org/internet-governance/blog/want-to-be-watched</link>
    <description>
        &lt;b&gt;The new rules under the IT Act are an assault on our freedom, says Sunil Abraham in this article published in Pragati on June 8, 2011.&lt;/b&gt;
        
&lt;p&gt;Privacy is a necessary but not sufficient condition for security. A bank safe is safe only because the keys are held by a trusted few. No one else can access these keys or has the ability to duplicate them. The 2008 Amendment of the Information Technology (IT) Act and their associated rules notified April 2011 proposes to eliminate whatever little privacy Indian netizens have had so far. Already as per the internet service provider (ISP) &amp;nbsp;license, citizens using encryption above 40-bit were expected to deposit the complete decryption key with the Ministry of Communications and Information Technology. This is as intelligent as citizens of a neighbourhood making duplicates of the keys to their homes and handing them over at the local police station. With the IT Act’s latest rules things get from bad to worse. (For an analysis of the new rules under the IT Act, see the In Parliament section of this issue).&lt;/p&gt;
&lt;p&gt;Now imagine my daughter visits the neighborhood cybercafe, the manager would now be entitled to scan her ID document and take a photograph of her using his own camera. He would also be authorised to capture her browser history including unencrypted credentials and authentication factors. He would then store this information for a period of one year and provide them to any government entity that sends him a letter. He could continue to hold on to the files as there would be no clear guidelines or penalties around deletion. The ISP that provides connectivity to the cybercafe would store a copy of my daughter’s Internet activities for two years. None of our ISPs publish or provide on request a copy of their data retention policies.&lt;/p&gt;
&lt;p&gt;Now suppose my daughter used an online peer-production like Wikipedia or social-media platform like MySpace to commit an act of blasphemy by drawing fan-art for her favorite Swedish symphonic black metal band. A neo-Pentecostal Church sends a takedown notice to the website hosting the artwork. Unfortunately, this is a fringe Web 2.0 platform run by Indian entrepreneur who happens to be a friend of yours. When the notice arrived, our entrepreneur was in the middle of a three-week trek in the Himalayas. Even though he had disabled anonymous contributions and started comprehensive data retention of user activity on the site, unfortunately he was not able to delete the offending piece of content within 36 hours. If the honourable judge is convinced, both your friend and my daughter would be sitting in jail for a maximum of three years for the newly christened offence of blasphemous online speech.&lt;/p&gt;
&lt;p&gt;You might dismiss my misgivings by saying “after all we are not China, Saudi Arabia or Myanmar”, and that no matter what the law says we are always weak on implementation. But that is completely missing the point. The IT Act appears to be based on the idea that the the Indian public can be bullied into self-censorship via systemic surveillance. Employ tough language in the law and occasionally make public examples of certain minor infringers. There have been news reports of young men being jailed for using expletives against Indian politicians or referring to a head of state as a “rubber stamp.” The message is clear—you are being watched so watch your tongue.&lt;/p&gt;
&lt;p&gt;Surveillance capabilities are not a necessary feature of information systems. They have to be engineered into these systems. Once these features exists, they could potentially serve both the legally authorised official and other undesirable elements. Terrorists, cyber-warriors and criminals will all find systems with surveillance capabilities easier to compromise. In other words, surveillance compromises security at the level of system design. There were no internet connections or phone lines in the bin Laden compound—he was depending on store and forward arrangement based on USB drives. Do we really think that registration of all USB drives, monitoring of their usage and the provision of back doors to these USBs via master key would have lead the investigators to him earlier? Has the ban on public wi-fi and the current ID requirements at cyber-cafes led to the arrest of any terrorists or criminals in India? Where is the evidence that resource hungry blanket surveillance is providing return on investment? Intelligence work cannot be replaced with resource-hungry blanket surveillance. Unnecessary surveillance distracts the security with irrelevance.&lt;/p&gt;
&lt;p&gt;Increase in security levels is not directly proportional to increase in levels of surveillance. A certain amount of surveillance is unavoidable and essential. But after the optimum amount of surveillance has been reached, additional surveillance only undermines security. The multiple levels of data retention at the cybercafe, by the ISP and also by the application service provider does not necessarily make Indian cyberspace more secure. On the contrary, redundant storage of personal sensitive information only acts as multiple points of failure and leaks—in the age of Niira Radia and Amar Singh one does not have be reminded of authorised and unauthorised surveillance and their associated leaks.&lt;/p&gt;
&lt;p&gt;Finally, there is the question of perception management. Perceptions of security does not only depend on reality but on personal and popular sentiment. There are two possible configurations for information systems—one, where the fundamental organising principle is trust or second, where the principle is suspicion. Systems based on suspicion usually gives rise to criminal and corrupt behavior. If the state were to repeatedly accuse its law-abiding citizens of being terrorists and criminals, it might end up provoking them into living up to these unfortunate expectations. If citizens realise that every moment of their digital lives is being monitored by multiple private and government bodies—they will begin to use anonymisation and encryption technology round the clock even when it is not really necessary. Ordinary citizens will be forced to visit the darker and nastier corners of the internet just to download encryption tools and other privacy enabling software. Like the prohibition, this will only result in further insecurity and break-down in the rule of law.&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://pragati.nationalinterest.in/2011/06/do-you-want-to-be-watched/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/want-to-be-watched'&gt;https://cis-india.org/internet-governance/blog/want-to-be-watched&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:11:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-brother-watching-you">
    <title>Big Brother is Watching You</title>
    <link>https://cis-india.org/internet-governance/blog/big-brother-watching-you</link>
    <description>
        &lt;b&gt;The government is massively expanding its surveillance power over law-abiding citizens and businesses, says Sunil Abraham in this article published by the Deccan Herald on June 1, 2011.&lt;/b&gt;
        
&lt;p&gt;Imagine: An HIV positive woman calls a help-line from an ISD/STD booth. The booth operator can get to know who she called, when and for how long. But he would not have any idea on who she is or where she lives.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, instead of a phone call, imagine that she uses a cyber café to seek help on a website for HIV positive people. The cyber-cafe operator would have a copy of her ID – remember that many ID documents have phone numbers and addresses. He may then take her photograph using his own camera. One can only hope that he will take only a mug-shot without using the zoom lens inappropriately. He would also use a software – to log her Internet activities and make a reasonable guess on her HIV status.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The average Facebook page may have 50 different URLs to display the various images, animations and videos that are linked to that page. Each of those URLs would be stored, regardless of whether she scrolls down to see any of them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The cyber-cafe operator is obliged under the Cyber Cafe rules to store this information for a period of one year. But there are no clear guidelines on when and how he should dispose of these logs. An unethical operator could leak the logs to a marketeer, a spammer, a neighbourhood Romeo or the local moral police. A careless operator maybe vulnerable to digital or physical theft and before you know it, such logs could end up on the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ever since 26/11, cyber-cafes in metros have been photocopying ID documents – but so far not a single terrorist attack has been foiled or a crime solved thanks to this highly intrusive measure. But despite the lack of evidence to prove the efficacy of the current levels of surveillance, the government has decided to expand them exponentially.&lt;/p&gt;
&lt;p&gt;Imagine again: A media organisation such as Deccan Herald is investigating a public interest issue with the help of a whistle-blower or an anonymous informant. Deccan Herald reporters may think that by turning the encryption on when using Gmail or Hotmail they are protecting their source.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the ISP serving Deccan Herald is obliged by the license terms to log all traffic be it broadband, dial-up or mobile users passing through it. Again, there are no clear guidelines on when to delete these logs and none of the Indian ISPs publicly publish a data retention policy. Besides retaining data, the ISPs have to install real-time surveillance equipment within their network infrastructure and make them available for government officials. If a government official wants to track who is talking to Deccan Herald reporters, he just has to ask. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;With ISPs and online service providers – all the police have to do is send an information request under Section 92 of the Code of Criminal Procedure. In other words, they don't even have to bother about a court order. Between January 2010 to June 2010 Google received 1,430 information requests from India. &amp;nbsp;Many other companies, for example, Microsoft, are not as transparent as Google about the state surveillance. So we will never know what they are subjected to.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If the whistle-blower was using Blackberry, all traffic would be transferred from the device to the RIM's Network Operation Centre situated outside India in an encrypted tunnel before it travels onto the Internet. This prevents the government from learning which mail server is being used from the logs and surveillance equipment at the ISP premises. And that is why the government has been engaged in a five-year long public fight with RIM over access to Blackberry traffic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, thanks to the IT Act, the government can demand the service providers, including RIM, to hand over the decryption keys by accusing any individual of a variety of vague offenses -- for example engaging in communication that is ‘grossly harmful’ or ‘harms minors in any way’ – &amp;nbsp;under the IT Act. Refusal to hand over the keys is punishable with a jail term of three years.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Finally, imagine that an Indian enterprise is developing trade-secrets or handling trade-secrets on behalf of their international partners. This enterprise is using a VPN or virtual private network for confidential digital communication. As per the ISP license all encryption above 40-bit is only permitted with written permission from DoT along with mandatory deposit of the decryption key.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the age of wire-tap leaks, only a miniscule minority of international business partners would trust the government of India not to leak or misuse the keys that have been deposited with them. Most individuals, SMEs and large enterprises routinely use encryption higher than 40 bit strength. For example, Gmail uses128 bit and Skype uses 256 bit encryption. Many services use dynamic encryption, that is generate &amp;nbsp;different keys for each session.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So far I have not heard of anyone who has actually secured permission or deposited the keys. In other words, the Indian enterprise has two choices – either break the law to protect business confidentiality or obey it and lose clients.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The IT Act (Amendment 2008) and its associated Rules, notified in April this year are a massive expansion of blanket surveillance on ordinary, law-abiding Indians. They represent a paradigm shift in surveillance and a significant dilution in privacy protections afforded to citizens under the Telegraph Act.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This has terrifying consequences for our plural society, free media and businesses. Department of Information Technology in particular Dr. Gulshan Rai's office has so far only brushed aside these concerns and denied receiving feedback from the industry and civil society. If our media continues to ignore this clamp down on our civil liberties, we will soon have to furnish ID documents before purchasing thumb drives. After all, Bin Laden was found using them in his Abbottabad home.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.deccanherald.com/content/165420/big-brother-watching-you.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-brother-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-brother-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:32:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity">
    <title>We are anonymous, we are legion</title>
    <link>https://cis-india.org/internet-governance/blog/online-anonymity</link>
    <description>
        &lt;b&gt;Online anonymity is vital for creativity and entrepreneurship on the Web, writes Sunil Abraham. The article was published in the Hindu on April 18, 2011.&lt;/b&gt;
        
&lt;p&gt;During his keynote at the International World Wide Web Conference recently, Sir Tim Berners-Lee argued for the preservation of online anonymity as a safeguard against oppression. This resonated with his audience in Hyderabad, given the recent uproar in the Indian blogosphere and twitterverse around the IT Act (Amendment 2008) and the recently published associated rules for intermediaries and cyber cafes.&lt;/p&gt;
&lt;p&gt;Over time, there has been a dilution of standards for blanket surveillance. The Telegraph Act allowed for blanket surveillance of phone traffic only as the rarest of exceptions. The IT Act and the ISP licence on the other hand, authorise and require ISPs and cyber cafes to undertake blanket surveillance as the norm in the form of data retention. The transaction database of the UID (Unique Identification Number) project will log of all our interactions with the government, private sector and other citizens; all these are frightening developments for freedom of expression in general and anonymous speech in particular.&lt;/p&gt;
&lt;p&gt;Anonymous speech is a necessary pre-condition for democratic and open governance, free media, protection of whistle-blowers and artistic freedom. On many controversial areas of policy formulation, it is usually anonymous officials from various ministries making statements to the press. Would mapping UIDs to IP address compromise the very business of government? A traditional newspaper may solicit anonymous tips regarding an ongoing investigative journalism campaign through their website.&lt;/p&gt;
&lt;p&gt;Would data retention by ISPs expose their anonymous sources? Whistle-blowers usually use public Wi-Fi or cyber cafes because they don't want their communications traced back to residential or official IP addresses. Won't the ban on open public Wi-Fi networks and the mandatory requirement for ID documents at cyber cafes jeopardise their safety significantly? Throughout history, great art has been produced anonymously or under a nom de plume. Will the draft Intermediary Due Diligence Rules, which prohibits impersonation even if it is without any criminal intent, result in artists sanitising their art into banality?&lt;/p&gt;
&lt;p&gt;Anonymous speech online is facilitated by three forms of sharing — shared standards, shared software and shared identities. Shared or open standards such as asymmetric encryption and digital signatures allow for anonymous, private and yet authenticated communications. Shared software or Free/Open Source Software reassures all parties involved that there is no spy-ware or back door built into tools and technologies built around these standards.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Shared identities, unlike shared software and standards, is a cultural hack and, therefore, almost impossible to protect against. V for Vendetta, the graphic novel by Alan Moore gives us an insight into how this is could be done. The hero, V, hides his identity behind a Guy Fawkes mask. Towards the end of the novel, he couriers thousands of similar masks to the homes of ordinary citizens.&lt;/p&gt;
&lt;p&gt;In the final showdown between V and the oppressive regime, these citizens use these masks to form an anonymous mob that confuses the security forces into paralysis. Shared identities online therefore, is the perfect counterfoil to digital surveillance.&lt;/p&gt;
&lt;p&gt;As Dr. Berners-Lee spoke in Hyderabad, the Internet Rights and Principles Dynamic Coalition of the Internet Governance Forum released a list of 10 principles for online governance at the meeting convened by the UN Special Rapporteur on Freedom of Expression in Stockholm.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The fifth principle includes “freedom from surveillance, the right to use encryption, and the right to online anonymity”. One hopes that Gulshan Rai of CERT-IN will heed the advice provided by his international peers and amend the IT Act rules before they have a chilling effect on online creativity and entrepreneurship.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the article originally published in the Hindu&lt;/em&gt;, &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/article1705308.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/online-anonymity'&gt;https://cis-india.org/internet-governance/blog/online-anonymity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:38:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do">
    <title>Wherever you are, whatever you do</title>
    <link>https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do</link>
    <description>
        &lt;b&gt;Facebook recently launched a location-based service called Places. Privacy advocates are resenting to this new development. Sunil Abraham identifies the three prime reasons for this outcry against Facebook. The article was published in the Indian Express on 23 August, 2010.&lt;/b&gt;
        
&lt;p&gt;Privacy activists are up in arms again, at Facebook’s recent launch of a new location-based service called Places. But what’s the new issue here? For years, telecom operators have been able to roughly locate you by triangulating the signal strength between the three nearest cell towers. In India, geo-location is part of the call logs maintained by the operator. That is how the police was able to determine that Bangalore resident Sathish Gupta killed his wife Priyanka. He took her mobile with him during a jog with his friend and then faked a phone call as an alibi. He knew that the time-stamps on the call logs would corroborate his lies. But the location-data nailed him. So, in short, the state and telecom operators know where you are even if you don’t have a smartphone with GPS support.&lt;/p&gt;
&lt;p&gt;For those who can afford it? GPS support provides greater accuracy and reliability, independent of telecom signal strength. The immediate and future benefits are huge. For parents, MyKidIsSafe.com, allows them to create a geo-fence and receive automatic notification when the child leaves the safety zone. In combination with RFID, businesses are able to provide their customers with accurate updates regarding status of deliveries. The Karnataka police is able to verify that the police inspector issuing the challan using a Blackberry for a traffic violation is not doing it from home. Seven hundred and fifty thousand gay men from 162 countries use a geo-social network called Grindr to find love. In the future, most car-pooling services will be GPS-enabled. Geo-location-based crowd-sourcing will be used to predict and avoid traffic jams by measuring the density and velocity of mobile phones on various routes.&lt;/p&gt;
&lt;p&gt;Privacy advocates worry that after helping the police solve crimes and fight terrrorism, telecom companies retain the logs instead of deleting, anonymising or obfuscating them. Especially so in India, given the lack of privacy laws, telecom operators, web and mobile service providers could retain the logs for customer profiling or worse still, sell the raw data or analysis to third parties. Cyber-stalkers, child molesters and rapists benefit. Cat burglars will know when you are away and be able to clean out your house in a more relaxed fashion. Geo-surveillance by a state, obsessed with terrorism, will have negligible benefits while extracting a huge social cost and significantly undermining national security.&lt;/p&gt;
&lt;p&gt;So why this particular outcry against the world’s most successful social networking website? There are three reasons that come immediately to mind. First, Facebook has a terrible record with privacy. In the last five years, the default settings have moved from one where no personal data was available for anonymous access to one with anonymous access to everything except birthday and contact information. And these are settings that affect the majority of the half a billion people who don’t bother changing default settings. So there is no guarantee that Facebook will not get more intrusive with its default geo-location privacy settings.&lt;/p&gt;
&lt;p&gt;Second, a friend can geo-tag you without requiring you to approve or confirm this. Once you are geo-tagged, all your common friends will be notified through the friend-feed system. This is similar to the current system of photo sharing. A friend can upload a inappropriate photograph and tag you almost instantly all your work-mates who also happen to be your Facebook friends get a notification via the feed. Of course, you can always untag the photo, change the settings and defriend the culprit but by then the damage is usually done.&lt;/p&gt;
&lt;p&gt;Third, the Facebook user-interface for privacy settings is notoriously complex and cumbersome. Many users will think that they have managed to bolt down the security settings when in fact their personal data will remain all up for grabs. The half a million third-party products available today on the Facebook platform only compounds this problem.&lt;/p&gt;
&lt;p&gt;Read the original in the&lt;a class="external-link" href="http://www.indianexpress.com/news/Wherever-you-are--whatever-you-do/663810"&gt; Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do'&gt;https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:12:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/government-enter-homes">
    <title>Does the Government want to enter our homes?</title>
    <link>https://cis-india.org/internet-governance/blog/government-enter-homes</link>
    <description>
        &lt;b&gt;When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August, 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy and civil liberties of its citizens.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;What? Me worry about the blackberry imbroglio?&lt;/strong&gt;&lt;br /&gt;If Pierre Trudeau were alive today, he would feel similarly about the Canadian innovation that is making news these days. But, given the Indian media's objective take on the ongoing BlackBerry tussle, one would assume that the media is unaffected.&lt;/p&gt;
&lt;p&gt;Many internet observers say that&amp;nbsp; the very future of democracy and free media is at stake. If rogue politicians and bureaucrats are able to eavesdrop on the communications of media houses, wouldn't that sound the death knell for sting operations, anonymous informants and whistle-blowers?&lt;/p&gt;
&lt;p&gt;And, consequently, free press and democracy? How can the media keep its calm when one of the last bastions of electronic privacy in India is being stormed?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Isn’t this a lost cause already?&lt;/strong&gt;&lt;br /&gt;Perhaps, our reporters and editors have remained complacent, because they do not want to swim against the tide. After all, governments across the world have used excuses like cyber-terrorism, organised crime, pornography, piracy etc. to justify censorship and surveillance regimes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The priveleged access that the governments of India, Saudi Arabia and UAE are demanding has already been provided to the governments of USA, Canada and Russia, for example.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We don't know how much they know about us!&lt;/strong&gt;&lt;br /&gt;The average reader might not be aware of the access that the Indian government has to his/her personal information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To be clear, the Indian government, like most other governments, is able to intercept, decrypt, monitor and record sms and voice call traffic by working in partnership with ISP and Telecom operators.&lt;/p&gt;
&lt;p&gt;This is legalised through ISP licence agreements, which requires ISPs to provide monitoring equipment that can be used to by various law enforcement and intelligence agencies. There is no clear policy on data-retention policies.&lt;/p&gt;
&lt;p&gt;Industry insiders say that SMS messages, telephone call logs, email headers, and web requests are archived from anywhere between three months and a year.&lt;/p&gt;
&lt;p&gt;Do these ISPs and telecom operators then delete, anonymise or obfuscate this data? Or do they they retain it for posterity for market research?&lt;/p&gt;
&lt;p&gt;In the absence of a privacy law — the Indian citizen can only make intelligent guesses.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Encryption is our friend&lt;/strong&gt;&lt;br /&gt;As a student, when I passed a love note to my lady-love in class, I would use a symmetric key encryption scheme.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;She would use the same key as I did to unencrypt the machine, ie, substituting the alphabet with the next/previous one.&lt;/p&gt;
&lt;p&gt;If someone was able to intercept the key, then all communication between us in both directions would be compromised.&lt;/p&gt;
&lt;p&gt;Asymmetric key encryption solves this problem by giving both parties two keys — a public key and a private key. I would use my lady-love’s public key to encrypt a message meant for her.&lt;/p&gt;
&lt;p&gt;Only she would be able to unencrypt the message by using her private key. The size of the key — 40bit, 128bit, 256bit etc. determines the strength of the encryption.&lt;/p&gt;
&lt;p&gt;The more bits you have, the longer it will take for someone to break through using a brute force method. The brute force method or dictionary method is when you try every single combination —just as you would with an old suitcase.&lt;/p&gt;
&lt;p&gt;The time taken also depends on computing resources — whether you are a jealous boyfriend, or the FBI, or a corporation like Google. These days, governments depend on corporations for hardware and network muscle.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How does Blackberry encrypt differently?&lt;/strong&gt;&lt;br /&gt;Other smart phone providers like IPhone and Nokia make email and Internet traffic transparent to the ISP and telecom operator, making it easy for governments are able to keep track of Internet users on mobile phones just as they monitor dial-up or broadband users.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Most mobile services come with a basic encryption. Blackberry is different because it introduces an additional level of encryption, and then routes traffic either through corporate servers or through its own servers in Canada and other parts of the world.&lt;/p&gt;
&lt;p&gt;The fact that information is routed thus can pose a threat to the Indian government, if officials are using Blackberries to exchange highly classified information.&lt;/p&gt;
&lt;p&gt;Then, GoI could be worried if western intelligence agencies are eavesdropping.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How will this end? Will Blackberry leave?&lt;/strong&gt;&lt;br /&gt;Blackberry has never exited a country, because in the end it has prioritised consumer privacy over commercial compulsions. For example Blackberry has now ‘resolved’ security probwith Saudi Arabia.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I don’t think we should worry about deals or compromises. However, this is not to say that Blackberry should not be applauded.&lt;/p&gt;
&lt;p&gt;They have taken a public stand against unrestricted governmental access to their clients’ information; one should always applaud corporates who fight hard for privacy and civil liberties.&lt;/p&gt;
&lt;p&gt;What the Blackberry dilemma is showing us is the social cost of the electronic Big Brother will be steep, as it should be.&lt;/p&gt;
&lt;p&gt;To protect citizens’ rights, civil society must resist and insist on suitable checks and balances like governmental transparency and fair judicial oversight.&lt;/p&gt;
&lt;p&gt;Read the article in &lt;a class="external-link" href="http://www.punemirror.in/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=2010081020100810224737834e2c8a329&amp;amp;sectxslt="&gt;Pune Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/government-enter-homes'&gt;https://cis-india.org/internet-governance/blog/government-enter-homes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:12:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/facebook-privacy-india">
    <title>Facebook, privacy and India</title>
    <link>https://cis-india.org/news/facebook-privacy-india</link>
    <description>
        &lt;b&gt;Does Facebook's decision to open out user information and data to third party websites amount to an invasion of privacy and should users' seriously consider getting out of the site? Sunil Abraham doesn't think so.&lt;/b&gt;
        &lt;p&gt;Even if you aren’t a Facebook user (and most likely than not you are), chances are that you’ve at least heard that there are problems related to privacy settings on the site. The net has been abuzz with indignation over a decision by Facebook to open out user information and data to third party websites. A number of high profile Facebook users (and many more low profile ones) completely deactivated their accounts after the changes were announced by Founder and Chief executive Mark Zuckerberg and critics immediately pointed out that users were losing control of their personal information.&lt;/p&gt;
&lt;p&gt;There have been a slew of articles condemning the move, and highlighting “dramatic” changes to the sites privacy policy. Most alarming perhaps being &lt;a class="external-link" href="http://mattmckeon.com/facebook-privacy/"&gt;this slideshow&lt;/a&gt; compiled by Matt McKeon.&lt;/p&gt;
&lt;p&gt;All these are legitimate concerns, but how worried should we be really? Should you be seriously considering getting off the site? “As long as you are a little smart about what you upload on Facebook, there is no need to do anything as drastic as deleting your account”, says Sunil Abraham the executive director of the Centre for Internet &amp;amp; society, based out of Bangalore. Abraham said that the issue has shown people the risk of uploading certain types of photographs and content on to the net, but most importantly highlights the need for a privacy commission in India.&lt;/p&gt;
&lt;p&gt;“The EU has a commission which makes certain directives to sites like Facebook from time to time, which are then adhered to. India should also seriously consider setting up a similar commission, he said.&lt;/p&gt;
&lt;p&gt;Facebook has mantained that its privacy settings are prominently displayed and can be easily accessed by users. But critics say that it is much too long and convoluted. The BBC reports that the policy in its current form has 50 different settings, 170 options and runs to 5,830 words, &lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/technology/10125260.stm"&gt;making it longer than the US Constitution&lt;/a&gt;. And the sheer volume of outrage has prompted a rethink of the privacy policy by Facebook, which since held an internal meeting to discuss the affair.&lt;/p&gt;
&lt;p&gt;Abraham agrees that the issue of privacy is a complex one, but noted that the definition of what constituted “privacy” varied from culture to culture. “In India, it is perfectly normal for someone to ask someone else how much they earn, while such a question would be completely outside the boundaries of propriety in most Western countries”, he said. The issue with Facebook, he says, is that its desicion to change its privacy settings was tantamount to a breach of contract. “People who joined Facebook did so because they were comfortable with the settings and regulations available on the site. For Facebook to suddenly change that violates the spirit of that contract”, he said.&lt;/p&gt;
&lt;p&gt;Meanwhile the founder and chief executive of Facebook Mark Zuckerberg has &lt;a class="external-link" href="http://www.washingtonpost.com/wp-dyn/content/article/2010/05/23/AR2010052303828.html"&gt;written an article in the Washington Post today&lt;/a&gt; directly addressing issues relating to privacy controls on the popular  social networking site.&lt;/p&gt;
&lt;p&gt;“The biggest message we have heard recently is that people want easier  control over their information. Simply put, many of you thought our  controls were too complex. Our intention was to give you lots of  granular controls; but that may not have been what many of you wanted.  We just missed the mark,”said Zuckerberg.&lt;/p&gt;
&lt;p&gt;Read the article in &lt;a class="external-link" href="http://blog.livemint.com/play-things/2010/05/24/facebook-privacy-and-india/"&gt;Livemint&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/facebook-privacy-india'&gt;https://cis-india.org/news/facebook-privacy-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-26T11:40:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
