The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 1 to 15.
DesiSec: Episode 1 - Film Release and Screening
https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening
<b>The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec.
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!</b>
<div>Early 2013, the Centre for Internet and Society began shooting its first documentary film project. After months of researching and interviewing activists and experts, CIS is thrilled to announce the release of the first documentary film on cybersecurity in India - <strong>DesiSec: Cybersecurity and Civi Society in India</strong>.</div>
<div> </div>
<div>Trailer link: <a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer">http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</a></div>
<div> </div>
<div>CIS is hosting a special screening of <strong>DesiSec: Episode 1</strong> on <strong>11th December, 2013, 6 pm</strong> and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society.</div>
<div> </div>
<div>We look forward to seeing you there!</div>
<div> </div>
<div>RSVP: <a href="mailto:purba@cis-india.org" target="_blank">purba@cis-india.org</a></div>
<div>Venue: http://osm.org/go/yy4fIjrQL?m=</div>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening'>https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening</a>
</p>
No publisherpurbaCyberspacePrivacyCybersecurityInternet GovernanceSurveillanceCyber Security FilmCyber SecurityEvent2013-12-17T08:13:32ZEventCIS Cybersecurity Series (Part 13) - Pranesh Prakash
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash
<b>CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.</b>
<div>
<div><i>"When it comes to things cyber we completely lose our sense of proportion. While killing someone by negligence only attracts two years of punishment, saying something that people can define "offensive" attracts even more under 66A of the Information Technology Act. Something that can be a nuisance, under the Criminal Laws, can attract up to six months punishment, whereas under the IT act, it is up to three years..." - Pranesh Prakash, lawyer and policy director, Centre for Internet and Society</i></div>
<div></div>
<div>Centre for Internet and Society presents its thirteenth installment of the CIS Cybersecurity Series.</div>
<div></div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</div>
<div></div>
<div>Pranesh is a Policy Director with the Centre, and is a graduate of the National Law School of India University, Bangalore, with a degree in Arts and Law.</div>
<div></div>
</div>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/gUDeTeQ6DAg" width="560"></iframe></p>
<div><b><i><br /></i></b></div>
<div><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyber Security FilmCyberculturesCyber SecurityCyber Security Interview2014-01-20T06:20:44ZBlog EntryCIS Cybersecurity Series (Part 1) - Christopher Soghoian
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian
<b>CIS interviews Christopher Soghoian, cybersecurity researcher and activist, as part of the Cybersecurity Series</b>
<p><em>"We live in a surveillance state. The government can find out who we communicate with, who we talk to, who we are near, when we are at a protest, which stores we go to, where we travel to... they can find out all of these things. And it's unlikely it's going to get rolled back, but the best we can hope for is a system of law where the government gets to use its powers only in the right situation." – Christopher Soghoian, American Civil Liberties Union.</em></p>
<p>Centre for Internet and Society presents its first installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS interviews Christopher Soghoian, a privacy researcher and activist, working at the intersection of technology, law and policy. Christopher is the Principal Technologist and a Senior Policy Analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union (ACLU).</p>
<p>Christopher is based in Washington, D.C. His website is http://www.dubfire.net/</p>
<p><iframe src="http://www.youtube.com/embed/SQo4b-jTAWM" frameborder="0" height="315" width="320"></iframe></p>
<p> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<div><strong><em><br /></em></strong></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-12T10:26:59ZBlog EntryElectoral Databases – Privacy and Security Concerns
https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns
<b>In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.</b>
<p></p>
<p> </p>
<p style="text-align: justify; ">The recent move by the Election Commission of India (ECI) to tie-up with Google for providing electoral look-up services for citizens and electoral information services has faced heavy criticism on the grounds of data security and privacy.<a href="#_edn1" name="_ednref1"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[i]</span></span></a> After due consideration, the ECI has decided to drop the plan.<a href="#_edn2" name="_ednref2"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ii]</span></span></a></p>
<p style="text-align: justify; ">The plan to partner with Google has led to much apprehension regarding Google gaining access to the database of 790 million voters including, personal information such as age, place of birth and residence. It could have also gained access to cell phone numbers and email addresses had the voter chosen to enroll via the online portal on the ECI website. Although, the plan has been cancelled, it does not necessarily mean that the largest database of citizens of India is safe from any kind of security breach or abuse. In fact, the personal information of each voter in a constituency can be accessed by anyone through the ECI website and the publication of electoral rolls is mandated by the law.</p>
<p style="text-align: justify; "><b>Publication of Electoral Rolls</b><br />The electoral roll essentially contains the name of the voter, name of the relationship (son of/wife of, etc.), age, sex, address and the photo identity card number. The main objective of creation and maintenance of electoral rolls and the issue of Electoral Photo Identity Card (EPIC) was to ensure a free and fair election where the voter would have been able to cast his own vote as per his own choice. In other words, the main purpose of the exercise was to curtail bogus voting. This is achieved by cross referencing the EPIC with the electoral roll.</p>
<p style="text-align: justify; ">The process of creation and maintenance of electoral rolls is governed by the Registration of Electors Rules, 1960. Rule 22 requires the registration officer to publish the roll with list of amendments at his office for inspection and public information. Furthermore, ECI may direct the registration officer to send two copies of the electoral roll to every political party for which a symbol has exclusively been reserved by the ECI. It can be safely concluded that the electoral roll of a constituency is a public document<a href="#_edn3" name="_ednref3"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iii]</span></span></a> given that the roll is published and can be circulated on the direction of the ECI.</p>
<p style="text-align: justify; ">With the computational turn, in 1998 the ECI took the decision to digitize the electoral databases. Furthermore, printed electoral rolls and compact discs containing the rolls are available for sale to general public.<a href="#_edn4" name="_ednref4"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iv]</span></span></a> In addition to that, the electoral rolls for the entire country are available on the ECI website.<a href="#_edn5" name="_ednref5"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[v]</span></span></a> However, the current database is not uniform and standardized, and entries in some constituencies are available only in the local language. The ECI has taken steps to make the database uniform, standardized and centralized.<a href="#_edn6" name="_ednref6"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vi]</span></span></a></p>
<p style="text-align: justify; "><b>Security Concerns</b><br />The Registration of Electoral Rules, 1960 is an archaic piece of delegated legislation which is still in force and casts a statutory duty on the ECI to publish the electoral rolls. The publication of electoral rolls is not a threat to security when it is distributed in hard copies and the availability of electoral rolls is limited. The security risks emerge only after the digitization of electoral database, which allows for uniformity, standardization and centralization of the database which in turn makes it vulnerable and subject to abuse. The law has failed to evolve with the change in technology.</p>
<p style="text-align: justify; ">In a recent article, Bill Davidow analyzes "the dark side of Moore’s Law" and argues that with the growth processing power there has been a growth in surveillance capabilities and on this note the article is titled, “<i>With Great Computing Power Comes Great Surveillance”</i><a href="#_edn7" name="_ednref7"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vii]</span></span></a> Drawing from Davidow’s argument, with the exponential growth in computing power, search has become convenient, faster and cheap. A uniform, standardized and centralized database bearing the personal information of 790 million voters can be searched and categorized in accordance with the search terms. The personal information of the voters can be used for good, but it can be equally abused if it falls into the wrong hands. Big data analysis or the computing power makes it easier to target voters, as bits and pieces of personal information give a bigger picture of an individual, a community, etc. This can be considered intrusive on individual’s privacy since the personal information of every voter is made available in the public domain</p>
<p style="text-align: justify; ">For example, the availability of a centralized, searchable database of voters along with their age would allow the appropriate authorities to identify wards or constituencies, which has a high population of voters above the age of 65. This would help the authority to set up polling booths at closer location with special amenities. However, the same database can be used to search for density of members of a particular community in a ward or constituency based on the name, age, sex of the voters. This information can be used to disrupt elections, target vulnerable communities during an election and rig elections.</p>
<p style="text-align: justify; "><b>Current IT Laws does not mandate the protection of the electoral database</b><br />A centralized electoral database of the entire country can be considered as a critical information infrastructure (CII) given the impact it may have on the election which is the cornerstone of any democracy. Under Section 70 of the Information Technology Act, 2000 (IT Act) CII means “the computer resource, incapacitation or destruction of which, shall have debilitating impact on national security, economy.”<a href="#_edn8" name="_ednref8"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[viii]</span></span></a> However, the appropriate Government has not notified the electoral database as a protected system<a href="#_edn9" name="_ednref9"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ix]</span></span></a>. Therefore, information security practices and procedures for a protected system are not applicable to the electoral database.</p>
<p style="text-align: justify; ">The Information Technology Rules (IT Rules) are also not applicable to electoral databases, <i>per se</i>. Since, ECI is not a body corporate, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information), Rules, 2011 (<i>hereinafter </i>Reasonable Security Practices Rules) do not apply to electoral databases. Ignoring that Reasonable Security Practices Rules only apply to a body corporate, the electoral database does fall within the ambit of definition of “personal information”<a href="#_edn10" name="_ednref10"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[x]</span></span></a> and should arguably be made subject to the Rules.</p>
<p style="text-align: justify; ">The intent of the ECI for hosting the entire country’s electoral database online <i>inter alia</i> is to provide electronic service delivery to the citizens. It seeks to provide “electoral look up services for citizens ... for better electoral information services.”<a href="#_edn11" name="_ednref11"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[xi]</span></span></a> However, the Information Technology (Electronic Service Delivery) Rules, 2011 are not applicable to the electoral database given that it is not notified by the appropriate Government as a service to be delivered electronically. Hence, the encryption and security standards for electronic service delivery are not applicable to electoral rolls.</p>
<p style="text-align: justify; ">The IT Act and the IT Rules provide a reasonable scope for the appropriate Government to include electoral databases within the ambit of protected system and electronic service delivery. However, the appropriate government has not taken any steps to notify electoral database as protected system or a mode of electronic service delivery under the existing laws.</p>
<p style="text-align: justify; "><b>Conclusion</b><br />Publication of electoral rolls is a necessary part of an election process. It ensures free and fair election and promotes transparency and accountability. But unfettered access to electronic electoral databases may have an adverse effect and would endanger the very goal it seeks to achieve because the electronic database may pose threat to privacy of the voters and also lead to security breach. It may be argued that the ECI is mandated by the law to publish the electoral database and hence, it is beyond the operation of the IT Act. But Section 81 of the IT Act has an overriding effect on any law inconsistent, therewith. The appropriate Government should take necessary steps under the IT Act and notify electoral databases as a protected system.</p>
<p style="text-align: justify; ">It is recommended that the Electors Registration Rules, 1960 should be amended, taking into account the advancement in technology. Therefore, the Rules should aim at restricting the unfettered electronic access to the electoral database and also introduce purposive limitation on the use of the electoral database. It should also be noted that more adequate and robust data protection and privacy laws should be put in place, which would regulate the collection, use, storage and processing of databases which are critical to national security.</p>
<div>
<hr align="left" size="1" width="100%" />
<div id="edn1">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref1" name="_edn1"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[i]</span></span></a> Pratap Vikram Singh, Post-uproar, EC’s Google tie-up plan may go for a toss, Governance Now, January 7, 2014 available at <a class="external-link" href="http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss">http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss</a></p>
</div>
<div id="edn2">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref2" name="_edn2"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ii]</span></span></a> Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at <a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf">http://eci.nic.in/eci_main1/current/PN09012014.pdf</a></p>
</div>
<div id="edn3">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref3" name="_edn3"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iii]</span></span></a> Section 74, Indian Evidence Act, 1872</p>
</div>
<div id="edn4">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref4" name="_edn4"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[iv]</span></span></a> <a class="external-link" href="http://eci.nic.in/eci_main1/the_function.aspx">eci.nic.in/eci_main1/the_function.aspx</a></p>
</div>
<div id="edn5">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref5" name="_edn5"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[v]</span></span></a> <a class="external-link" href="http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx">http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx</a></p>
</div>
<div id="edn6">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref6" name="_edn6"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vi]</span></span></a> “At present, in most States and UTs the Electoral Database is kept at the district level. In some cases it is kept even with the vendors. In most States/UTs it is maintained in MS Access, while in some cases it is on a primitive technology like FoxPro and in some other cases on advanced RDBMS like Oracle or Sql Server. The database is not kept in bilingual form in some of the States/UTs, despite instructions of the Commission. In most cases Unicode fonts are not used. The database structure not being uniform in the country, makes it almost impossible for the different databases to talk to each other” – Election Commission of India, Revision of Electoral Rolls with reference to 01-01-2010 as the qualifying date – Integration and Standardization of the database- reg., No. 23/2009-ERS, January 6, 2010 available at e<a class="external-link" href="http://eci.nic.in/eci_main/eroll&epic/ins06012010.pdf">ci.nic.in/eci_main/eroll&epic/ins06012010.pdf</a><span dir="RTL"></span></p>
</div>
<div id="edn7">
<p class="MsoEndnoteText"><a href="#_ednref7" name="_edn7"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[vii]</span></span></a><a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"><span><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"> </span></span></span>http://www.theatlantic.com/technology/archive/2014/01/with-great-computing-power-comes-great-surveillance/282933/</a></p>
</div>
<div id="edn8">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref8" name="_edn8"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[viii]</span></span></a> Section 70, Information Technology Act, 2000</p>
</div>
<div id="edn9">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref9" name="_edn9"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[ix]</span></span></a> Computer resource which directly or indirectly affects the facility of Critical Information Infrastructure</p>
</div>
<div id="edn10">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref10" name="_edn10"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[x]</span></span></a> Rule 2(1)(i), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</p>
</div>
<div id="edn11">
<p class="MsoEndnoteText" style="text-align: justify; "><a href="#_ednref11" name="_edn11"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference">[xi]</span></span></a> Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at <a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf">http://eci.nic.in/eci_main1/current/PN09012014.pdf</a></p>
</div>
</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns'>https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns</a>
</p>
No publishersnehashishDigital GovernancePrivacyCybersecurityData ProtectionInternet GovernanceSafetyInformation TechnologyCyber SecuritySecuritye-GovernanceTransparency, PoliticsE-Governance2014-01-16T11:07:21ZBlog EntryIntroducing the Cybersecurity Visuals Media Handbook
https://cis-india.org/internet-governance/blog/introducing-the-cybersecurity-visuals-media-handbook
<b>The need for intervention in the cybersecurity imagery in media publications was realised during a brainstorming workshop that was conducted by CIS with illustrators, designers, and cybersecurity researchers.</b>
<p id="docs-internal-guid-f6dbda88-7fff-48b2-b929-86369f9d201b" dir="ltr"> </p>
<p dir="ltr">Handbook concept, content and design by: <strong>Padmini Ray Murray and Paulanthony George</strong></p>
<p dir="ltr">Blog post authored by: <strong>Saumyaa Naidu </strong>and<strong> Arindrajit Basu</strong></p>
<p dir="ltr">With inputs from: <strong>Karan Saini<br /></strong></p>
<p dir="ltr">Edited by: <strong>Shweta Mohandas</strong></p>
<hr />
<p id="docs-internal-guid-59922688-7fff-a1d0-fe00-604684f18a9a" dir="ltr"><img src="https://cis-india.org/internet-governance/resources/cpage.jpg/image_large" alt="Cybersecurity Visuals Media Handbook" class="image-inline" title="Cybersecurity Visuals Media Handbook" /></p>
<p dir="ltr">The need for intervention in the cybersecurity imagery in media publications was realised during a brainstorming workshop that was conducted by CIS with illustrators, designers, and cybersecurity researchers. The details and learnings from the workshop can be read <a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu">here</a>. The discusisons led to the initiative of creating a media handbook in collaboration with the designers at <a class="external-link" href="http://designbeku.in/">Design Beku</a>, and the researchers at CIS.</p>
<p dir="ltr">This handbook was conceived to be a concise guide for media publications to understand the specific concepts within cybersecurity and use it as a reference to create visuals that are more informative, relevant, and look beyond stereotypes. </p>
<h3 dir="ltr">The limits of visibility and the need for relevant cybersecurity imagery</h3>
<p dir="ltr">Due to the <a href="https://journals.sagepub.com/doi/10.1177/0967010613484955">"limits of visibility" </a>and relative complexity inherent in any representation of cybersecurity, objects and concepts in this field have no immediate visual representation. A <a href="https://www.google.com/search?biw=1088&bih=532&tbm=isch&sxsrf=ACYBGNTzGAoRkFgLQqWAC1BONRpQ0m57Yg%3A1573735586730&sa=1&ei=okzNXa2YLKvTz7sPnPimiAI&q=cybersecurity&oq=cybersecurity&gs_l=img.3..35i39j0l2j0i10j0l4j0i10j0.1323.4106..4209...1.0..0.671.3151.2-3j2j1j2......0....1..gws-wiz-img.....10..35i362i39j0i67.AdmHly8ktxs&ved=0ahUKEwit8ff03enlAhWr6XMBHRy8CSEQ4dUDCAY&uact=5">Google Search</a> of the term cybersecurity reveals padlocks, company logos, and lines of numbers indicating code-stereotypes that have very little with the substantive discourse prevailing in cybersecurity policy circles. This stereotype can be further understood by exploring the portrayal of a 'hacker' in the media, both in newspapers and popular culture.</p>
<p dir="ltr">Shires <a href="https://www.tandfonline.com/doi/pdf/10.1080/13523260.2019.1670006?needAccess=true">argues</a> that a dominant association with ‘danger’ has made the hacker image a "rich repository of noir influences". Therefore, a hacker is usually depicted as a male figure in a dark-coloured hoodie, with no considerations of spatial, temporal, or cultural contexts.</p>
<p dir="ltr">Visuals influence various actors in any conflict. In traditional non-cyber domains, spatial representations of conflict often omit the blood and gore that is a core facet of reality, and therefore, in some ways ‘legitimize war.’ An impersonal, unrealistic depiction of cybersecurity threats vectors or substantive discussions have two key negatives. </p>
<p dir="ltr">First, it re-entrenches the notion of cybersecurity as distant and undecipherable discourse that eludes the individual. This undermines the critical importance of the participatory nature of the process. The goal of decision-making around cybersecurity should focus on individuals feeling secure and not be driven by policy-makers who decide technical parameters without broader consultation..</p>
<p dir="ltr">Second, it undermines the concept being discussed in the news article. If the visual is accompanying an op-ed, often the visual serves as a trigger for comprehending the content of the op-ed. Presently, op-eds on the<a href="https://www.thehindubusinessline.com/opinion/private-public-partnership-for-cyber-security/article25821899.ece"> global agreements in cyberspace</a>, <a href="https://www.thehindubusinessline.com/opinion/lessons-from-us-response-to-cyber-attacks-ep/article25372326.ece">attribution of cyber attacks,</a> and <a href="https://www.livemint.com/technology/tech-news/what-is-pegasus-the-chosen-tool-for-total-surveillance-11572578636720.html">‘total surveillance’</a> by Pegasus are depicted very similarly. These over-simplifications are inaccurate and undermine the nuances of the substantive content in each case, thereby impacting negatively the influence that each piece can have on public awareness and on the state of cybersecurity discourse.</p>
<p dir="ltr">Realistic descriptions of cybersecurity enable a granular understanding of threat vectors. There is also a need for signalling that celebrates and encourages greater diversity in this space. Cybersecurity discourse globally remains dominated by experts who are white and male. Explicitly re-conceptualizing these visuals to celebrate a variety of identities could be a push for other countries and communities (especially in the Global South)</p>
<p dir="ltr">This would enable the hitherto ‘disregarded communities’ in global cybersecurity discourse to understand and participate in the policy-making process.Our design handbook aims to guide media-persons in facilitating these goals.</p>
<p dir="ltr">An initial design brief for the media handbook was arrived at through our conversations with the designers at Design Beku. It was decided that the handbook would be concise and use a lighter tone in terms of language and be more visual than textual. For greater access, a digital, interactive format was seen as the most suitable option. </p>
<p dir="ltr">In order to scope the existing visuals, a sampling of cybersecurity coverage under different subjects in various media publications over the last one year was carried out. This included both global and Indian publications such as <a href="https://www.livemint.com/">Livemint</a>, <a href="https://scroll.in/">Scroll</a>, <a href="https://techcrunch.com/">Tech Crunch</a>, <a href="https://www.vice.com/en_us/section/tech">Motherboard - Vice</a>, and the <a href="https://www.economist.com/">Economist</a>. Research and op-eds by CIS researchers were also considered to broadly determine the most relevant subjects within cybersecurity.</p>
<p dir="ltr">The subjects selected based on the coverage were Cyberwarfare (Data Localisation), Cyber Attacks, Blockchain, Misinformation, Data Protection, Ethical Hacking, and Internet shutdowns. It was also gathered that there are several sub-topics within these subjects which would be indicated in the handbook. </p>
<p dir="ltr">The structure of the handbook was detailed out further to include a panorama image comprising illustrations that would speak to all the selected subjects, and text to explain the intention and process of making these illustrations. The handbook would begin with introducing its purpose, and go on to describe the concepts within each illustration, along with recommendations for illustrators working on such images. It would also consist of the definitions for each cybersecurity concept being visualised. </p>
<p dir="ltr">The handbook and accompanying illustrations were conceptualised and designed by <strong>Padmini Ray Murray</strong> and <strong>Paulanthony George</strong> from Design Beku. It was our great privilege to be a part of this process. We would also like to thank <strong>Karan Saini</strong> for his invaluable inputs that helped us commission this publication.</p>
<p dir="ltr">A draft of the handbook is hereby being published <a href="https://cis-india.org/internet-governance/resources/cyber-security-media-handbook">here</a>. This would be followed by a final version which will be in the form of an interactive web platform for both desktop and mobile devices. </p>
<p dir="ltr">We thank the Hewlett Foundation for funding this research.</p>
<hr />
<div> </div>
<div> </div>
<h2 dir="ltr">Annexure</h2>
<div>While commissioning the research, we had deliberated upon a series of definitions that we felt would be useful for the designers in conceptualizing their illustrations. These are provided below, and will form a part of the final handbook described above.</div>
<h3 dir="ltr"><br /></h3>
<h3 dir="ltr">Data Localisation</h3>
<p dir="ltr">Data localisation can broadly be defined as 'any legal limitation on data moving globally and compelling it to remain locally’. These policies can take a variety of forms. This could include a specific requirement to locally store copies of data, local content production requirements, or imposing conditions on cross border data transfers that in effect act as a localization mandate.</p>
<h3 dir="ltr">Cyber Attacks/Warfare</h3>
<p dir="ltr">Terms: Critical infrastructure, state-sponsored attackers, disruption and/or espionage, attribution, data leaks, bugs, zero days, misconfigurations</p>
<p dir="ltr">Cyber attacks are a hostile act using computer or related networks or systems, and intended to disrupt and/or destroy an adversary’s critical cyber systems, assets, or functions. The intended effects of cyber attack are not necessarily limited to the targeted computer systems or data themselves.</p>
<h3 dir="ltr">Blockchain</h3>
<p dir="ltr">Terms: Crypto-currency, immutable infrastructure, node compromise</p>
<p dir="ltr">Blockchain is a list of records linked using cryptography. It relies on three core elements in order to function effectively-decentralization, proof of work consensus and practical immutability.</p>
<h3 dir="ltr">Misinformation</h3>
<p dir="ltr">Terms: Propagation and spread, large-scale & inauthentic coordinated activities</p>
<p dir="ltr">The concerted spread of inaccurate information through one (or more) of four methods of propagation-doctored or manipulated primary information, genuine information shared in a false context,selective or misleading use of information and the misinterpretation of information.</p>
<h3 dir="ltr">Data Protection</h3>
<p dir="ltr">Terms: Cryptographic protection, access controls, privacy</p>
<p dir="ltr">Data Protection is protection through legal means accorded to private data from misuse by private or state actors. It includes processes such as collection and dissemination of data and technology, the public perception and expectation of privacy, and the political and legal underpinnings surrounding that data. </p>
<h3 dir="ltr">Ethical Hacking</h3>
<p dir="ltr">Terms: Diverse representation, and normalization/de-otherization of an “ethical hacker”</p>
<p dir="ltr">The term implies an ethical responsibility on the part of the hacker which compels them to inform the maintainers of a particular system about any discovered security flaws or vulnerabilities. While the ethics of "ethical hacking" differ for each individual, ethical hackers traditionally practice their craft out of a moral imperative. Ethical hackers are also described as independent computer security professionals who evaluate the system’s security and report back to the owners with the vulnerabilities they found and instructions for how to remedy them.</p>
<h3 dir="ltr">Internet shutdowns</h3>
<p dir="ltr">An internet shutdown is an intentional disruption of internet or electronic communications, rendering them inaccessible or effectively unusable, for a specific population or within a location, often to exert control over the flow of information.</p>
<hr />
<p> </p>
<p><strong>The interactive version of the handbook can be accessed <a class="external-link" href="https://cis-india.github.io/cybersecurityvisuals/index">here.</a></strong><strong> The print versions of the handbook can be accessed at: <a class="external-link" href="https://drive.google.com/file/d/13Llq1vD5Eb-yo2YE3X6dRPaZ_WsMYhfa/view?usp=sharing">Single Scroll Printing</a>, <a class="external-link" href="https://drive.google.com/file/d/1mK_lxA0Eeb7GWxqZk4IM3cBxKdWakKS9/view?usp=sharing">Tiled-Paste Printing</a>. </strong></p>
<p> </p>
<p> </p>
<p> </p>
<p dir="ltr"> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/introducing-the-cybersecurity-visuals-media-handbook'>https://cis-india.org/internet-governance/blog/introducing-the-cybersecurity-visuals-media-handbook</a>
</p>
No publisherSaumyaa Naidu and Arindrajit BasuCybersecurityVisualizationHandbook2019-12-06T09:29:27ZBlog EntryCybersecurity Visuals Media Handbook: Launch Event
https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event
<b>6th December | 6 pm | Centre for Internet and Society, Bangalore</b>
<p> </p>
<p>The existing cybersecurity imagery in media publications has been observed to be limited in its communication of the discourse prevailing in cybersecurity policy circles, relying heavily on stereotypes such as hooded men, padlocks, and binary codes.</p>
<p><br />In order to enable a clearer, more nuanced representation of cybersecurity concepts, we, at CIS, along with <a class="external-link" href="http://designbeku.in/">Design Beku</a> are launching the Cybersecurity Visuals Media Handbook. This handbook has been conceived to be a concise guide for media publications to understand the specific concepts within cybersecurity and use it as a reference to create visuals that are more informative, relevant, and look beyond stereotypes.</p>
<p>We will be launching the interactive digital handbook on 6th December, 2019, at the Centre for Internet and Society, Bangalore, at 6 pm. The event would include a discussion on the purpose, process, and concepts behind this illustrated guide by CIS researchers and Design Beku.</p>
<p>The launch will be followed by a panel discussion on Digital Media Illustrations & the Politics of Technology. We will be joined by Padmini Ray Murray, Paulanthony George, and Kruthika N S in the panel. It will be moderated by Saumyaa Naidu.</p>
<p dir="ltr"><strong>Padmini Ray Murray</strong></p>
<p dir="ltr">Padmini founded the Design Beku collective in 2018 to help not-for-profit organisations explore their potential through research-led design and digital development. Trained as an academic researcher, Padmini currently as the head of communications at Obvious, a design studio. She regularly gives talks and publishes on the necessity of technology and design to be decolonial, local, and ethical. <strong><br /></strong></p>
<p dir="ltr"><strong>Paulanthony George</strong></p>
<p dir="ltr">Paulanthony hates writing bios in the third person.<br />My research focuses on the relationships between made objects, the maker and the behaviour of making, in the context of spreadable digital media (and behaviours stemming from it). I study internet memes inside and outside of India and phenomenon such as dissent, satire, free expression and ambivalent behaviour fostered by them. The research is at the intersection of digital ethnography, culture studies, human-computer interaction, humour studies and critical theory. I spend my time watching people. I draw them, the way they are, the way some people want to be and sometimes I have interesting conversations with them.</p>
<p><span id="gmail-docs-internal-guid-5cb9e515-7fff-777e-6b99-8a216379ee39">
</span></p>
<p dir="ltr"><strong>Kruthika N S</strong></p>
<p dir="ltr">Kruthika NS is a lawyer at LawNK and researcher at the Sports Law & Policy Centre, Bengaluru. She uses art as a medium to explore the intersections of the law and society, with gender justice featuring as the central theme of her work. Her art has included subjects such as the #MeToo movement in India, and the feminist principles of the internet, among several other doodles.</p>
<p dir="ltr"><strong>Saumyaa Naidu</strong></p>
<p dir="ltr">Saumyaa is a designer and researcher at the Centre for Internet and Society. <strong> </strong></p>
<p> </p>
<p><br /><strong>Agenda</strong><br />6:00 - 6:15 pm - Introduction <br />6:15 - 6:45 pm - Presentation on the Media Handbook by Paulanthony George<br />6:45 - 7:00 pm - Tea/ Coffee <br />7:00 - 8:00 pm - Panel discussion on Digital Media Illustrations & the Politics of Technology<br />8:00 - 8:30 pm - Tea/ Coffee and Snacks</p>
<p>The interactive version of handbook can be accessed <a class="external-link" href="http://cis-india.github.io/cybersecurityvisuals/index">here</a>. The print versions of the handbook can be accessed at: <a class="external-link" href="https://drive.google.com/file/d/13Llq1vD5Eb-yo2YE3X6dRPaZ_WsMYhfa/view?usp=sharing">Single Scroll Printing</a>, <a class="external-link" href="https://drive.google.com/file/d/1mK_lxA0Eeb7GWxqZk4IM3cBxKdWakKS9/view?usp=sharing">Tiled-Paste Printing</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event'>https://cis-india.org/internet-governance/blog/cybersecurity-visuals-media-handbook-launch-event</a>
</p>
No publishersaumyaaCybersecurityCyber SecurityEventInternet Governance2019-12-06T09:27:37ZEventExtra-Territorial Surveillance and the Incapacitation of Human Rights
https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights
<b>This paper was published in Volume 12 (2) of the NUJS Law Review. </b>
<div> </div>
<div>Our
networked data trails dictate, define, and modulate societies in hitherto
inconceivable ways. The ability to access and manipulate that data is a
product of stark power asymmetry in geo-politics, leading to a dynamic
that privileges the interests of a few over the right to privacy and
dignity of the many. I argue that the persistent de facto violation of
human rights norms through extraterritorial surveillance conducted by
western intelligence agencies, compounded by the failure of judicial
intervention in the West has lead to the incapacitation of international
human rights law. Despite robust jurisprudence including case law,
comments by the United Nations, and widespread state practice on the
right to privacy and the application of human rights obligations to
extraterritorial stakeholders, extraterritorial surveillance continues
with aplomb. Procedural safeguards and proportionality tests regularly
sway towards a ‘ritual incantation’ of national security even in
scenarios where a less intrusive option is available. The vulnerable
citizen abroad is unable to challenge these processes and becomes an
unwitting victim of nefarious surveillance practices that further widens
global power asymmetry and entrenches geo-political fissures.</div>
<div><br />The full article can be found <a href="https://cis-india.org/internet-governance/extraterritorial-algorithmic-surveillance-and-the-incapacitation-of-international-human-rights-law" class="internal-link" title="EXTRATERRITORIAL ALGORITHMIC SURVEILLANCE AND THE INCAPACITATION OF INTERNATIONAL HUMAN RIGHTS LAW">here</a>.</div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights'>https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights</a>
</p>
No publisherArindrajit BasuCybersecurityCyber SecurityInternet Governance2020-01-02T11:02:26ZBlog EntryDecrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns
https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns
<b>Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?</b>
<p> </p>
<p> </p>
<p>The use of aggregated Big Data by governments has the potential to
exacerbate power asymmetries and erode civil liberties like few
technologies of the past. In order to guard against the aggressive
aggregation and manipulation of the data generated by individuals who
are branded as suspect, it is critical that our firmly established
constitutional rights protect human dignity in the face of this
potential erosion.</p>
<p>The increasing ubiquity of Automated Facial Recognition Systems
(AFRS) serve as a prime example of the rising desire of governments to
push fundamental rights to the brink. With AFRS, the core fundamental
right in question is privacy, although questions have been posed
regarding the potential violation of other related rights, such as the
Right to Equality and the Right to Free Speech and Expression, as well.</p>
<p>There is a rich corpus of literature, (see <a href="https://indianexpress.com/article/opinion/columns/digital-identification-facial-recognition-system-ncrb-5859072/" rel="noreferrer noopener" target="_blank">here</a>, <a href="http://www.unswlawjournal.unsw.edu.au/wp-content/uploads/2017/09/40-1-11.pdf" rel="noreferrer noopener" target="_blank">here</a> and an excellent recent paper by Smriti Parsheera <a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank">here)</a>
from a diverse coterie of scholars that call out the challenges posed
by AFRS, particularly with respect to its proportionality as a
restriction over the right to privacy. Our contribution to this
discourse focuses on a very specific question around a ‘reasonable
expectation of privacy’ — the standard identified for the protection of
privacy in public spaces across jurisdictions, including in India. This
is because at this juncture, the precise nature of the AFRS which will
eventually be used and the regulations it will be subject to are not
clear. </p>
<p>In <a href="https://indiankanoon.org/doc/91938676/'">Retd. K.S </a><a href="https://indiankanoon.org/doc/91938676/" rel="noreferrer noopener" target="_blank">Puttaswamy (Retd.) v. Union of India</a>:
Justice Chandrachud (Puttaswamy I), the Indian Supreme Court was
concerned with the question whether there exists a fundamental right to
privacy under the Indian Constitution. A nine-judge bench of the Court
recognized that the right to privacy is a fundamental right implicit
inter alia in the right to life within Article 21 of the Constitution.</p>
<p>The right to privacy protects people and not places. Every person is
entitled, however, to a reasonable expectation of privacy. The
expectation of privacy must be twofold. First, the person must prove
that the alleged act could inflict some harm. Such harm must be real and
not be speculative or imaginary. Second, society must recognize this
expectation as reasonable. The test of reasonable expectations is
contextual, i.e., the extent to which it safeguards privacy depends on
the place at which the individual is.</p>
<p>In order to pass any constitutional test, therefore, AFRS must
satisfy the ‘reasonable expectation’ test articulated in Puttaswamy.
However, in this context, the test itself has multiple contours. Do we
have a right to privacy in a public place? Is AFRS collecting any data
that specifically violates a right to privacy? Is the aggregation of
that data a potential violation?</p>
<p>After providing a brief introduction to the use cases of AFRS in
India and across the world, we embark upon answering all these
questions.</p>
<p><strong>Primer on Automated Facial Recognition Systems (AFRS)</strong></p>
<p>Facial recognition is a biometric technology that utilises cameras to
match stored or live footage of individuals (including both stills and
moving footage) with images or video from an existing database. Some
systems might also be used to analyze broader demographic trends or
conduct sentiment analysis through crowd scanning.</p>
<p>While the use of photographs and video footage have been core
components of police investigation, the use of algorithms to process
vast tracts of Big Data (characterized by ‘Volume, Velocity, and
Variety), and compare disparate and discrete data points allows for the
derivation of hitherto unfeasible insights on the subjects of Big Data.</p>
<p>The utilisation of AFRS for law enforcement is rapidly spreading around the world. <a href="https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847" rel="noreferrer noopener" target="_blank">A Global AI Surveillance Index</a>
compiled by the Carnegie Endowment for International Peace found that
at least sixty-four countries are incorporating facial recognition
systems into their AI surveillance programs.</p>
<p>Chinese technology company Yitu has entered into a partnership with
security forces in Malaysia to equip police officers with facial
recognition body cameras that, powered by enabling technologies, would
allow a comparison of images caught by the live body cameras with images
from several central databases.</p>
<p>In <a href="https://news.sky.com/story/met-polices-facial-recognition-tech-has-81-error-rate-independent-report-says-11755941" rel="noreferrer noopener" target="_blank">England and Wales</a>,
London Metropolitan Police, South Wales Police, and Leicestershire
Police are all in the process of developing technologies that allow for
the identification and comparison of live images with those stored in a
database.</p>
<p>The technology is being developed by Japanese firm NEC and the police
force has limited ability to oversee or modify the software, given its
proprietary nature. The Deputy Chief of South Wales Police stated that
“the tech is given to [them] as a sealed box… [and the police force
themselves] have no input – whatever it does, it does what it does.”</p>
<p>In the US, <a href="https://www.americanbar.org/groups/criminal_justice/publications/criminal-justice-magazine/2019/spring/facial-recognition-technology/" rel="noreferrer noopener" target="_blank">Baltimore’s police</a>
set up facial recognition cameras to track and arrest protestors — a
system that reached its zenith during the 2018 riots in the city. </p>
<p>It is suspected that authorities in <a href="https://www.japantimes.co.jp/news/2019/10/23/asia-pacific/hong-kong-protests-ai-facial-recognition-tech/#.Xf1Fs_zhVPY" rel="noreferrer noopener" target="_blank">Hong Kong</a> are also using AFRS to clamp down on the ongoing pro-democracy protests.</p>
<p>In India, the Ministry of Home Affairs, through the National Crime Records Bureau put out a <a href="http://ncrb.gov.in/TENDERS/AFRS/RFP_NAFRS.pdf" rel="noreferrer noopener" target="_blank">tender for a new AFRS</a>,
whose stated objective is to “act as a foundation for national level
searchable platform of facial images.” The AFRS will pull facial image
data from CCTV feeds and compare these with existing records across
databases including the Crime and Criminal Tracking Networks and Systems
(CCTNS), Inter-operable Criminal Justice System (or ICJS), Immigration
Visa Foreigner Registration Tracking (IVFRT), Passport, Prisons and
state police records.</p>
<p>Plans are also afoot to integrate this with the yet to be deployed
National Automated Fingerprint Identification System (NAFIS), thereby
creating a multi-faceted surveillance system.</p>
<p>Despite raising eyeballs due to its potential all-pervasive scope,
this tender is not the first instance of AFRS being used by Indian
authorities. Punjab Police, <a href="https://www.livemint.com/AI/DIh6fmR6croUJps6x7JW5K/Meet-Staqu-a-startup-helping-Indian-law-enforcement-agencie.html" rel="noreferrer noopener" target="_blank">in partnership with Gurugram-based start-up Staqu</a>
has launched and commenced implementation of the Punjab Artificial
Intelligence System (PAIS) which uses digitised criminal records and
automated facial recognition to retrieve information on a suspected
criminal and essentially tracks their public whereabouts, which poses
potential constitutional questions.</p>
<p> </p>
<p>This was published by <a class="external-link" href="https://aipolicyexchange.org/2019/12/26/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns/">AI Policy Exchange</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns'>https://cis-india.org/internet-governance/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns</a>
</p>
No publisherArindrajit Basu, Siddharth SonkarCybersecurityCyber Securityinternet governanceInternet Governance2020-01-02T14:01:48ZBlog EntryRBI Ban on Cryptocurrencies not backed by any data or statistics
https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics
<b>In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency.
Keeping this policy window in mind, the Centre for Internet & Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
</b>
<p id="docs-internal-guid-9ddef591-7fff-b8f5-3c20-c4a78d53d066" style="text-align: justify;" dir="ltr"> </p>
<p style="text-align: justify;" dir="ltr">On April 6, 2018 <a href="https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11243&Mode=0">the RBI issued a circular</a> preventing all Commercial and Co-operative Banks, Payments Banks, Small Finance Banks, NBFCs, and Payment System Providers not only from dealing in virtual currencies themselves but also directing them to stop providing services to all entities which deal with virtual currencies. The RBI had issued a Press Release cautioning the public against dealing in virtual currencies including Bitcoin in 2013. However, the growing popularity of cryptocurrencies and its adoption by large numbers of Indian users, may have been the reason which forced the RBI to issue another Press Release in February 2017 reiterating its earlier concerns regarding cryptocurrencies raised in its earlier circular of 2013. In December 2017 both the RBI as well as the Ministry of Finance issued Press Releases cautioning the general public about the dangers and risks associated with cryptocurrencies, finally culminating in the circular dated April 6, 2018 banning financial institutions from dealing with cryptocurrency traders. As a result of this circular the operations of cryptocurrency exchanges took a severe hit and the number of transactions on these exchanges reduced substantially. The cryptocurrency market in India all but disappeared with only a few extremely determined enthusiasts still dealing in cryptocurrencies, at the risk of potentially depriving themselves of banking services altogether.</p>
<p style="text-align: justify;" dir="ltr">The RBI circular was challenged in the Supreme Court by the Internet and Mobile Association of India; final arguments in the case were concluded only in the last week of January, 2020 with the judgment of the Supreme Court being awaited. Generally speaking, whenever such policy decisions of the executive branch are challenged in the courts, a well accepted defense for the executive authorities, specifically in highly complicated fields such as finance, etc. is that the decision was taken by an expert body using its expertise in the field. The basic rationale underlying this argument is that the authority has relied on verifiable data and used its expertise to analyse the same in order to arrive at its decision.</p>
<p style="text-align: justify;" dir="ltr">However, it appears from the response by the RBI to an RTI query by Centre for Internet and Society, that requested the RBI for a copy of all reports, papers, opinions and advice that was relied upon for issuing the April 6, 2018 circular, that the RBI has not relied upon any such data to come to a conclusion that banking services should be denied to all those entities dealing in cryptocurrencies. It appears from the response to the RTI query that it was the RBI’s own previous circulars and press releases which formed the basis for the April 6, 2018 circular. This response completely undermines the argument that the decision by the RBI was taken after an analysis of all the facts and statistics concerned with cryptocurrency trading.</p>
<p style="text-align: justify;" dir="ltr">Not only does the RTI response weaken the commonly accepted defense of an expert body making a well-reasoned decision, but it also strengthens another legal ground for challenging the decision of the RBI, viz. arbitrariness. One of the grounds on which executive decisions can be challenged is that the decision was made without taking into account relevant material and without the application of mind. The admission by the RBI in its RTI response that there is no material relied upon by the RBI, except its own previous Press Releases, only strengthens the argument that the decision was made in an arbitrary manner.</p>
<p style="text-align: justify;" dir="ltr">Such an admission by the RBI regarding the process followed before issuing the April 6, 2018 circular reduces the credibility of the decision itself. However it remains to be seen whether the Supreme Court of India agrees with the arguments of the petitioners challenging the April 6, 2018 circular, even though the petitioners may not have been able to produce this RTI response from the RBI to further bolster their case.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics'>https://cis-india.org/internet-governance/blog/rbi-ban-on-cryptocurrencies-not-backed-by-any-data-or-statistics</a>
</p>
No publishervipulCybersecurityinternet governanceBitcoinInternet GovernanceCryptocurrenciesCyber Security2020-03-05T18:35:48ZBlog EntryCIS Cybersecurity Series (Part 22) - Anonymous
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous
<b>CIS interviews a Tibetan security researcher and information activist, as part of the Cybersecurity Series. He prefers to remain anonymous.</b>
<p><em>"I
don't know technology but I am aware of the information people share with me.
So yes, they can track you down through your mobile phone. The last time I was
in Nepal, I met a westerner. We went to this restaurant and she asked me to
take the battery out of the phone. That was the first time I had heard of this
and so when I asked why she said that it is possible that people had followed
us and it has happened to other Tibetans in Nepal..."</em></p>
<p>Centre for Internet and Society presents its twenty second installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.</p>
<p><iframe src="https://www.youtube.com/embed/glsAFfj7tV4" frameborder="0" height="315" width="560"></iframe></p>
<p><em>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.</em></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-13T13:40:42ZBlog EntryCIS Cybersecurity Series (Part 23) – Justin Searle
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle
<b>CIS interviews Justin Searle, security expert, as part of the Cybersecurity Series.</b>
<p><em>"I think that people here in India, just like everywhere else, are broadening the areas where security can be applied. We see elsewhere, like in the United States and in Europe, that a lot of security researchers are starting to get into not just control systems, but also embedded devices and hardware and wireless... And we are seeing the same trends here in India as well. It is fun to see that growth and continual development, and not only that, but we are seeing security projects and research coming out of India, that's unqiue and fresh and contributing back to what originally came more from the United States and Europe."</em></p>
<p>Centre for Internet and Society presents its twenty
third installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic. </p>
<p>Justin Searle is the managing partner for Utilisec.
Utisix provides security services to the energy sector. They also assist oil,
water, gas, and manufacturing companies. Justin specializes in security
assessments and finding vulnerabilities in systems. </p>
<iframe src="https://www.youtube.com/embed/ufOV8DXzQuA" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development
Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-15T14:44:38ZBlog EntryAmutha Arunachalam - Stand Shielded of Digital Rights (Delhi, May 05, 4 pm)
https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05
<b>We are proud to announce that Amutha Arunachalam will be the speaker at the May #FirstFriday event at the CIS Delhi office. Amutha is Principal Technical Officer in the Council Of Scientific and Industrial Research. The talk will be on digital signatures, traceability of time-stamps, and setting up an Indian Standard (Digital) Time. If you are joining us, please RSVP at the soonest as we have only limited space in our office.</b>
<p> </p>
<h3><strong>Amutha Arunachalam</strong></h3>
<h4>Principal Technical Officer, Council of Scientific and Industrial Research</h4>
<p> </p>
<p><img src="https://cis-india.org/internet-governance/files/amutha-arunachalam/image" alt="Amutha Arunachalam" class="image-inline" title="Amutha Arunachalam" /></p>
<p> </p>
<p>Amutha Arunachalam entered the Indian Government service as an Intelligence Officer in Ministry of Home Affairs in 1988 after working at the Indian Institute of Technology Madras in Fibre Optic communication Laboratory. She later moved to the Council of Scientific and Industrial Research in the field of Information Technology. She managed the IT infrastructure of the CSIR lab (Central Road Research Institute) till 2006 and moved to CSIR Head Quarters and contributed in the ICT refurbishment drive, mainly in the IT with a major contribution in establishing DATA Centre, implementing network security, linking CSIR HQ to the National Knowledge Network facility extended by National Information Centre(NIC) before joining UIDAI.</p>
<p>In UIDAI (National Identity Project) she managed the Data Center operations that includes critical CIDR (Central Identification Repository) and was responsible for setting up Infrastructure to roll out Disaster recovery centre, Aadhaar Enrolment Service, Benchmarking of UIDAI Enrolment , Authentication Applications and setting up of Backend infrastructure of the Authentication Service for Roll out to citizens. After the five year Deputation at UIDAI (Feb 2016), she is currently posted in the Council of Scientific and Industrial Research working in the Area of Policy in Cyber Security for CSIR, Enhancing Research with collaborative, networking and Building unified CSIR Ecosystem with Enterprise platform.</p>
<p> </p>
<h3><strong>RSVP</strong></h3>
<iframe src="https://docs.google.com/forms/d/e/1FAIpQLSfWGNDezfJOi3UU7GpAWkrKn0uOMlCsV2P_6QEHqPWCb6JSqA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="666" width="600">Loading...</iframe>
<p> </p>
<h3><strong>Location</strong></h3>
<iframe src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d876.157470894426!2d77.20553462919722!3d28.550842498903158!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x0%3A0x834072df81ffcb39!2sCentre+for+Internet+and+Society!5e0!3m2!1sen!2sin!4v1493818109951" frameborder="0" height="450" width="600"></iframe>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05'>https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05</a>
</p>
No publishersumandroCybersecurityInternet GovernanceDigital India#FirstFridayAtCISE-Governance2017-05-03T13:30:32ZEventMapping of India’s Cyber Security-Related Bilateral Agreements
https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016
<b>With the rapid spread of cloud computing and the growth of cyber spaces, large masses of information are now easily transmittable transnationally, necessitating the ratification of new agreements and cooperation efforts amongst states in order to secure cyber spaces and regulate exchanges of information. In an attempt to understand the nature and extent of current international collaborative efforts in cyber security, we have compiled the following data regarding India’s cyber security-related bilateral agreements. The intention of this exercise is to offer a dynamic visualization that demonstrates which countries India has collaborated with on cyber security efforts and initiatives. This is an ongoing map that we will be updating as our research continues.</b>
<h4 style="text-align: justify; ">Download: <a class="external-link" href="http://cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf">Infographic</a> (PDF) and <a href="https://github.com/cis-india/website/raw/master/docs/CIS_IndiaCyberSecBilateralAgreementMap_Dec2016.xlsx">data</a> (XLSX)</h4>
<hr style="text-align: justify; " />
<p style="text-align: justify; "><br /> The data used for the info-graphic consists of India’s MLATs, cyber security-related MoUs and Joint Statements, and Cyber Frameworks. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws. A MoU (Memorandum of Understanding) is a nonbinding agreement between two or more states outlining the terms and details of an understanding, including each party’s requirements and responsibility; it is often the first stage in the formation of a formal contract. For the purpose of this research, we have grouped Joint Statements with MoUs, as they both generally entail the informal agreement between two states to strengthen cooperation on certain issues. Lastly, a Cyber Framework consists of standards, guidelines and practices to promote protection of critical infrastructure. The data accounts for agreements centered on cyber security as well as any agreements mentioning cooperation efforts in Cyber Security, information security or cybercrime.</p>
<p style="text-align: center; "><img src="https://cis-india.org/home-images/MLATAgreement.png/@@images/169c25c6-57a4-48c8-a33e-71aa36ea97ea.png" alt="MLAT Agreement" class="image-inline" title="MLAT Agreement" /></p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">The Mapping of India’s Cybersecurity-related bilateral agreement has been updated on April 12, 2017 with the following changes:</p>
<ol style="text-align: justify; ">
<li>A new MoU was signed between Australia and India in April 2017, focusing on combating terrorism and civil aviation security. Cybersecurity cooperation is mentioned in the MoU<a href="#_ftn1" name="_ftnref1">[1]</a>.</li>
<li>A new MoU was signed between Bangladesh and India in April 2017. The Indian Computer Emergency Response Team (CERT-In), Indian Ministry of Electronics and Information Technology and the ICT Division of Bangladesh are the signing parties of the MoU. The agreement focuses on Cooperation in the area of Cyber Security<a href="#_ftn2" name="_ftnref2">[2]</a>.</li>
<li>A preexisting MoU between France and India was added to the mapping, signed in January of 2016. Officials of both countries agreed to intensify cooperation between the Indian and French security forces in the fields of homeland security, cyber security, Special Forces and intelligence sharing to fight against criminal networks and tackle the common threat of terrorism<a href="#_ftn3" name="_ftnref3">[3]</a>.</li>
<li>A new MoU was signed between Indonesia and India in March 2017. It focuses on enhancing cooperation in cyber security and intelligence sharing<a href="#_ftn4" name="_ftnref4">[4]</a>.</li>
<li>A new MoU was signed between Kenya and India in January 2017, with “cyber security” mentioned as one of the key areas of cooperation<a href="#_ftn5" name="_ftnref5">[5]</a>.</li>
<li>A preexisting MoU between Malaysia and India was added to the mapping, signed in November of 2015. Both sides agreed to promote cooperation and the exchange of information regarding cyber security incident management, technology cooperation and cyber attacks, prevalent policies and best practices and mutual response to cyber security incidents<a href="#_ftn6" name="_ftnref6">[6]</a>.</li>
<li>A preexisting MoU between Mauritius and India, signed July 2016, was added to the mapping. This is a non-governmental MoU. Leading bourse BSE signed an agreement with Stock Exchange of Mauritius (SEM) for collaboration in areas including cyber security<a href="#_ftn7" name="_ftnref7">[7]</a>.</li>
<li>A new joint statement between India and Portugal was signed in March 2017. The two countries agreed to set up an institutional mechanism to collaborate in the areas of electronic manufacturing, ITeS, startups, cyber security and e-governance.<a href="#_ftn8" name="_ftnref8">[8]</a></li>
<li>A preexisting MoU, signed between Qatar and India in December of 2016, was added to the mapping. The agreement was regarding a protocol on technical cooperation in cyberspace and combatting cybercrime<a href="#_ftn9" name="_ftnref9">[9]</a>.</li>
<li>A new MoU was signed between Serbia and India in January 2017, focusing on cooperation in the field of IT, Electronics. The MoU itself does not explicitly mention cybersecurity. However, the MoU calls for cooperation and exchanges in capacity building institutions, which should entail cyber security strengthening<a href="#_ftn10" name="_ftnref10">[10]</a>.</li>
<li>A preexisting MoU between Singapore and India was added to the mapping. The MoU was signed in January 2016, focusing on the establishment of a formal framework for professional dialogue, CERT-CERT related cooperation for operational readiness and response, collaboration on cyber security technology and research related to smart technologies, exchange of best practices, and professional exchanges of human resource development<a href="#_ftn11" name="_ftnref11">[11]</a>.</li>
<li>A new joint statement was signed between UAE and India in January 2017, following up on their previous Technical Cooperation MoU signed in February 2016. To further deepen cooperation in this area, they agreed to set up joint Research & Development Centres of Excellence<a href="#_ftn12" name="_ftnref12">[12]</a>.</li>
<li>A preexisting MoU has been included in the mapping, signed in May of 2016. CERT-In agreed with the UK Ministry of Cabinet Office to promote close cooperation between both countries in the exchange in knowledge and experience in detection, resolution and prevention of security related incidents<a href="#_ftn13" name="_ftnref13">[13]</a>.</li>
<li>A new MoU between India and the US was signed in March 2017. CERT-In and CERT-US signed a MoU agreeing to promote closer co-operation and exchange of information pertaining to cyber security in accordance with relevant laws, rules and regulations and on the basis of equality, reciprocity and mutual benefit<a href="#_ftn14" name="_ftnref14">[14]</a>.</li>
<li>A new MoU was signed between Vietnam and India in January 2017, agreeing to promote closer cooperation for exchange of knowledge and experience in detection, resolution and prevention of cyber security incidents between both countries<a href="#_ftn15" name="_ftnref15">[15]</a>.</li>
</ol>
<p style="text-align: justify; ">NOTE: Some preexisting MoUs were added as we were initially only including the most recent agreements in the mapping. Upon adding newly signed MoUs, we decided to also keep the preexisting ones and revisit the other entries to include any preexisting MoUs that were initially excluded due to not being the most-recent. In this respect, the visualization will be adjusted to indicate the number of MoUs per country.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; "><a href="#_ftnref1" name="_ftn1">[1]</a><a href="http://www.dnaindia.com/india/report-india-australia-sign-mous-on-combating-terrorism-civil-aviation-security-2393843">http://www.dnaindia.com/india/report-india-australia-sign-mous-on-combating-terrorism-civil-aviation-security-2393843</a></p>
<p style="text-align: justify; "><a href="#_ftnref2" name="_ftn2">[2]</a><a href="http://www.theindependentbd.com/arcprint/details/89237/2017-04-09">http://www.theindependentbd.com/arcprint/details/89237/2017-04-09</a></p>
<p style="text-align: justify; "><a href="#_ftnref3" name="_ftn3">[3]</a><a href="http://www.thehindu.com/news/resources/Full-text-of-Joint-Statement-issued-by-India-France/article14019524.ece">http://www.thehindu.com/news/resources/Full-text-of-Joint-Statement-issued-by-India-France/article14019524.ece</a></p>
<p style="text-align: justify; "><a href="#_ftnref4" name="_ftn4">[4]</a><a href="http://indianexpress.com/article/india/indianhome-ministry-indonesian-ministry-of-security-and-coordination/">http://indianexpress.com/article/india/indianhome-ministry-indonesian-ministry-of-security-and-coordination/</a></p>
<p style="text-align: justify; "><a href="#_ftnref5" name="_ftn5">[5]</a><a href="https://telanganatoday.news/india-kenya-focus-defence-security-cooperation-pm">https://telanganatoday.news/india-kenya-focus-defence-security-cooperation-pm</a></p>
<p style="text-align: justify; "><a href="#_ftnref6" name="_ftn6">[6]</a><a href="http://economictimes.indiatimes.com/news/economy/foreign-trade/india-and-malaysia-sign-3-mous-including-cyber-security/articleshow/49891897.cms">http://economictimes.indiatimes.com/news/economy/foreign-trade/india-and-malaysia-sign-3-mous-including-cyber-security/articleshow/49891897.cms</a></p>
<p style="text-align: justify; "><a href="#_ftnref7" name="_ftn7">[7]</a><a href="http://indiatoday.intoday.in/story/bse-mauritius-stock-exchange-tie-up-to-promote-financial-mkts/1/723635.html">http://indiatoday.intoday.in/story/bse-mauritius-stock-exchange-tie-up-to-promote-financial-mkts/1/723635.html</a></p>
<p style="text-align: justify; "><a href="#_ftnref8" name="_ftn8">[8]</a><a href="http://www.tribuneindia.com/news/business/india-portugal-to-collaborate-in-ites-cyber-security/373666.html">http://www.tribuneindia.com/news/business/india-portugal-to-collaborate-in-ites-cyber-security/373666.html</a></p>
<p style="text-align: justify; "><a href="#_ftnref9" name="_ftn9">[9]</a><a href="http://naradanews.com/2016/12/india-qatar-sign-agreements-on-visa-cybersecurity-investments/">http://naradanews.com/2016/12/india-qatar-sign-agreements-on-visa-cybersecurity-investments/</a></p>
<p style="text-align: justify; "><a href="#_ftnref10" name="_ftn10">[10]</a><a href="http://ehub.newsforce.in/cabinet-approves-mou-india-serbia-cooperation-field-electronics/">http://ehub.newsforce.in/cabinet-approves-mou-india-serbia-cooperation-field-electronics/</a></p>
<p style="text-align: justify; "><a href="#_ftnref11" name="_ftn11">[11]</a><a href="http://www.businesstimes.com.sg/government-economy/singapore-and-india-strengthen-cooperation-on-cyber-security">http://www.businesstimes.com.sg/government-economy/singapore-and-india-strengthen-cooperation-on-cyber-security</a></p>
<p style="text-align: justify; "><a href="#_ftnref12" name="_ftn12">[12]</a><a href="http://mea.gov.in/bilateral-documents.htm?dtl/27969/India++UAE+Joint+Statement+during+State+visit+of+Crown+Prince+of+Abu+Dhabi+to+India+January+2426+2017">http://mea.gov.in/bilateral-documents.htm?dtl/27969/India++UAE+Joint+Statement+during+State+visit+of+Crown+Prince+of+Abu+Dhabi+to+India+January+2426+2017</a></p>
<p style="text-align: justify; "><a href="#_ftnref13" name="_ftn13">[13]</a><a href="http://www.bestcurrentaffairs.com/india-uk-mou-cyber-security/">http://www.bestcurrentaffairs.com/india-uk-mou-cyber-security/</a></p>
<p style="text-align: justify; "><a href="#_ftnref14" name="_ftn14">[14]</a><a href="http://www.dqindia.com/india-cert-signs-an-mou-with-us-cert/">http://www.dqindia.com/india-cert-signs-an-mou-with-us-cert/</a></p>
<p style="text-align: justify; "><a href="#_ftnref15" name="_ftn15">[15]</a><a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=157458">http://pib.nic.in/newsite/PrintRelease.aspx?relid=157458</a></p>
<hr style="text-align: justify; " />
<p style="text-align: justify; "> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016'>https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016</a>
</p>
No publisherLeilah Elmokadem and Saumyaa NaiduInternational RelationsCybersecurityBilateral AgreementInternet GovernanceMLAT2017-04-27T15:14:55ZBlog EntryCIS Cybersecurity Series (Part 8) - Jeff Moss
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss
<b>CIS interviews Jeff Moss, Chief Security Officer for ICANN, as part of the Cybersecurity Series.</b>
<p><em>"Most consumers don't understand the privacy trade offs when they browse the web... the data that is being collected about them, the analytics that is being run against their buying behaviour, it is invisible... it is behind the scenes... and so it is very difficult for the consumer to make an informed decision." - Jeff Moss, Chief Security Officer, ICANN.</em></p>
<p>Centre for Internet and Society presents its eighth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS interviews Jeff Moss. Jeff is the chief security officer for ICANN. He founded Black Hat Briefings and DEF CON, two of the most influential information security conferences in the world. In 2009, Jeff was sworn in as a member of the U.S. Department of Homeland Security Advisory Council (DHS HSAC), providing advice and recommendations to the Secretary of the Department of Homeland Security on matters related to domestic security. </p>
<iframe src="//www.youtube.com/embed/VuarlhLqBII" frameborder="0" height="315" width="560"></iframe>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-30T09:25:44ZBlog EntryMapping of Sections in India’s MLAT Agreements
https://cis-india.org/internet-governance/blog/india-mlat-agreements-sections-map-dec-2016
<b>This set of infographics by Leilah Elmokadem and Saumyaa Naidu maps out and compares the various sections that exist in the 39 MLATs (mutual legal assistance treaty) between India and other countries. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws.
</b>
<p> </p>
<h4>Download: <a href="https://github.com/cis-india/website/raw/master/docs/CIS_IndiaMLATAgreementsSectionsMap_Dec2016.pdf">Infographic</a> (PDF) and <a href="https://github.com/cis-india/website/raw/master/docs/CIS_IndiaMLATAgreementsSectionsMap_Dec2016.xlsx">data</a> (XLSX)</h4>
<hr />
<p>We have found that India’s 39 MLAT documents are worded, formatted and sectioned differently. At the same time, many of the same sections exist across several MLATs. This diagram lists the sections found in the MLAT documents and
indicates the treaties in which they were included or not included. To keep the list of sections concise and to more easily pinpoint the key differences between the agreements, we have merged sections that are synonymous in meaning but
were worded slightly differently. For example: we would combine “Entry into force and termination” with “Ratification and termination” or “Expenses” with “Costs”.</p>
<p>At the same time, some sections that seemed quite similar and possible to merge were kept separate due to potential key differences that could be overlooked as a result. For example: “Limitation on use” vs. “Limitation on compliance” or “Serving of documents” vs. “Provision of (publicly available) documents/records/objects” remained separate for further analysis and comparison.</p>
<p>These differences in sectioning can be analysed to facilitate a thorough comparison between the effectiveness, efficiency, applicability and enforceability of the various provisions across the MLATs. The purpose of this initial mapping is to provide an overall picture of which sections exist in which MLAT documents. There will be further analysis of these sections to produce a more holistic content-based comparison of the MLATs.</p>
<p> </p>
<h2>Aggregated Analysis of Sections of MLAT Agreements</h2>
<img src="https://github.com/cis-india/website/raw/master/img/CIS_IndiaMLATAgreementsSectionsMap_Dec2016_Aggregate_01.png" alt="Aggregated analysis of sections of MLAT agreements by India" />
<img src="https://github.com/cis-india/website/raw/master/img/CIS_IndiaMLATAgreementsSectionsMap_Dec2016_Aggregate_02.png" alt="Aggregated analysis of sections of MLAT agreements by India" />
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/india-mlat-agreements-sections-map-dec-2016'>https://cis-india.org/internet-governance/blog/india-mlat-agreements-sections-map-dec-2016</a>
</p>
No publisherLeilah Elmokadem and Saumyaa NaiduInternational RelationsCybersecurityBilateral AgreementInternet GovernanceMLATCyber Security2016-12-31T06:52:46ZBlog Entry