The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 11 to 25.
CIS Cybersecurity Series (Part 23) – Justin Searle
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle
<b>CIS interviews Justin Searle, security expert, as part of the Cybersecurity Series.</b>
<p><em>"I think that people here in India, just like everywhere else, are broadening the areas where security can be applied. We see elsewhere, like in the United States and in Europe, that a lot of security researchers are starting to get into not just control systems, but also embedded devices and hardware and wireless... And we are seeing the same trends here in India as well. It is fun to see that growth and continual development, and not only that, but we are seeing security projects and research coming out of India, that's unqiue and fresh and contributing back to what originally came more from the United States and Europe."</em></p>
<p>Centre for Internet and Society presents its twenty
third installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic. </p>
<p>Justin Searle is the managing partner for Utilisec.
Utisix provides security services to the energy sector. They also assist oil,
water, gas, and manufacturing companies. Justin specializes in security
assessments and finding vulnerabilities in systems. </p>
<iframe src="https://www.youtube.com/embed/ufOV8DXzQuA" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development
Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-15T14:44:38ZBlog EntryAmutha Arunachalam - Stand Shielded of Digital Rights (Delhi, May 05, 4 pm)
https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05
<b>We are proud to announce that Amutha Arunachalam will be the speaker at the May #FirstFriday event at the CIS Delhi office. Amutha is Principal Technical Officer in the Council Of Scientific and Industrial Research. The talk will be on digital signatures, traceability of time-stamps, and setting up an Indian Standard (Digital) Time. If you are joining us, please RSVP at the soonest as we have only limited space in our office.</b>
<p> </p>
<h3><strong>Amutha Arunachalam</strong></h3>
<h4>Principal Technical Officer, Council of Scientific and Industrial Research</h4>
<p> </p>
<p><img src="https://cis-india.org/internet-governance/files/amutha-arunachalam/image" alt="Amutha Arunachalam" class="image-inline" title="Amutha Arunachalam" /></p>
<p> </p>
<p>Amutha Arunachalam entered the Indian Government service as an Intelligence Officer in Ministry of Home Affairs in 1988 after working at the Indian Institute of Technology Madras in Fibre Optic communication Laboratory. She later moved to the Council of Scientific and Industrial Research in the field of Information Technology. She managed the IT infrastructure of the CSIR lab (Central Road Research Institute) till 2006 and moved to CSIR Head Quarters and contributed in the ICT refurbishment drive, mainly in the IT with a major contribution in establishing DATA Centre, implementing network security, linking CSIR HQ to the National Knowledge Network facility extended by National Information Centre(NIC) before joining UIDAI.</p>
<p>In UIDAI (National Identity Project) she managed the Data Center operations that includes critical CIDR (Central Identification Repository) and was responsible for setting up Infrastructure to roll out Disaster recovery centre, Aadhaar Enrolment Service, Benchmarking of UIDAI Enrolment , Authentication Applications and setting up of Backend infrastructure of the Authentication Service for Roll out to citizens. After the five year Deputation at UIDAI (Feb 2016), she is currently posted in the Council of Scientific and Industrial Research working in the Area of Policy in Cyber Security for CSIR, Enhancing Research with collaborative, networking and Building unified CSIR Ecosystem with Enterprise platform.</p>
<p> </p>
<h3><strong>RSVP</strong></h3>
<iframe src="https://docs.google.com/forms/d/e/1FAIpQLSfWGNDezfJOi3UU7GpAWkrKn0uOMlCsV2P_6QEHqPWCb6JSqA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="666" width="600">Loading...</iframe>
<p> </p>
<h3><strong>Location</strong></h3>
<iframe src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d876.157470894426!2d77.20553462919722!3d28.550842498903158!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x0%3A0x834072df81ffcb39!2sCentre+for+Internet+and+Society!5e0!3m2!1sen!2sin!4v1493818109951" frameborder="0" height="450" width="600"></iframe>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05'>https://cis-india.org/internet-governance/events/firstfridayatcis-amutha-arunachalam-stand-shielded-of-digital-rights-may-05</a>
</p>
No publishersumandroCybersecurityInternet GovernanceDigital India#FirstFridayAtCISE-Governance2017-05-03T13:30:32ZEventMapping of India’s Cyber Security-Related Bilateral Agreements
https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016
<b>With the rapid spread of cloud computing and the growth of cyber spaces, large masses of information are now easily transmittable transnationally, necessitating the ratification of new agreements and cooperation efforts amongst states in order to secure cyber spaces and regulate exchanges of information. In an attempt to understand the nature and extent of current international collaborative efforts in cyber security, we have compiled the following data regarding India’s cyber security-related bilateral agreements. The intention of this exercise is to offer a dynamic visualization that demonstrates which countries India has collaborated with on cyber security efforts and initiatives. This is an ongoing map that we will be updating as our research continues.</b>
<h4 style="text-align: justify; ">Download: <a class="external-link" href="http://cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf">Infographic</a> (PDF) and <a href="https://github.com/cis-india/website/raw/master/docs/CIS_IndiaCyberSecBilateralAgreementMap_Dec2016.xlsx">data</a> (XLSX)</h4>
<hr style="text-align: justify; " />
<p style="text-align: justify; "><br /> The data used for the info-graphic consists of India’s MLATs, cyber security-related MoUs and Joint Statements, and Cyber Frameworks. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws. A MoU (Memorandum of Understanding) is a nonbinding agreement between two or more states outlining the terms and details of an understanding, including each party’s requirements and responsibility; it is often the first stage in the formation of a formal contract. For the purpose of this research, we have grouped Joint Statements with MoUs, as they both generally entail the informal agreement between two states to strengthen cooperation on certain issues. Lastly, a Cyber Framework consists of standards, guidelines and practices to promote protection of critical infrastructure. The data accounts for agreements centered on cyber security as well as any agreements mentioning cooperation efforts in Cyber Security, information security or cybercrime.</p>
<p style="text-align: center; "><img src="https://cis-india.org/home-images/MLATAgreement.png/@@images/169c25c6-57a4-48c8-a33e-71aa36ea97ea.png" alt="MLAT Agreement" class="image-inline" title="MLAT Agreement" /></p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">The Mapping of India’s Cybersecurity-related bilateral agreement has been updated on April 12, 2017 with the following changes:</p>
<ol style="text-align: justify; ">
<li>A new MoU was signed between Australia and India in April 2017, focusing on combating terrorism and civil aviation security. Cybersecurity cooperation is mentioned in the MoU<a href="#_ftn1" name="_ftnref1">[1]</a>.</li>
<li>A new MoU was signed between Bangladesh and India in April 2017. The Indian Computer Emergency Response Team (CERT-In), Indian Ministry of Electronics and Information Technology and the ICT Division of Bangladesh are the signing parties of the MoU. The agreement focuses on Cooperation in the area of Cyber Security<a href="#_ftn2" name="_ftnref2">[2]</a>.</li>
<li>A preexisting MoU between France and India was added to the mapping, signed in January of 2016. Officials of both countries agreed to intensify cooperation between the Indian and French security forces in the fields of homeland security, cyber security, Special Forces and intelligence sharing to fight against criminal networks and tackle the common threat of terrorism<a href="#_ftn3" name="_ftnref3">[3]</a>.</li>
<li>A new MoU was signed between Indonesia and India in March 2017. It focuses on enhancing cooperation in cyber security and intelligence sharing<a href="#_ftn4" name="_ftnref4">[4]</a>.</li>
<li>A new MoU was signed between Kenya and India in January 2017, with “cyber security” mentioned as one of the key areas of cooperation<a href="#_ftn5" name="_ftnref5">[5]</a>.</li>
<li>A preexisting MoU between Malaysia and India was added to the mapping, signed in November of 2015. Both sides agreed to promote cooperation and the exchange of information regarding cyber security incident management, technology cooperation and cyber attacks, prevalent policies and best practices and mutual response to cyber security incidents<a href="#_ftn6" name="_ftnref6">[6]</a>.</li>
<li>A preexisting MoU between Mauritius and India, signed July 2016, was added to the mapping. This is a non-governmental MoU. Leading bourse BSE signed an agreement with Stock Exchange of Mauritius (SEM) for collaboration in areas including cyber security<a href="#_ftn7" name="_ftnref7">[7]</a>.</li>
<li>A new joint statement between India and Portugal was signed in March 2017. The two countries agreed to set up an institutional mechanism to collaborate in the areas of electronic manufacturing, ITeS, startups, cyber security and e-governance.<a href="#_ftn8" name="_ftnref8">[8]</a></li>
<li>A preexisting MoU, signed between Qatar and India in December of 2016, was added to the mapping. The agreement was regarding a protocol on technical cooperation in cyberspace and combatting cybercrime<a href="#_ftn9" name="_ftnref9">[9]</a>.</li>
<li>A new MoU was signed between Serbia and India in January 2017, focusing on cooperation in the field of IT, Electronics. The MoU itself does not explicitly mention cybersecurity. However, the MoU calls for cooperation and exchanges in capacity building institutions, which should entail cyber security strengthening<a href="#_ftn10" name="_ftnref10">[10]</a>.</li>
<li>A preexisting MoU between Singapore and India was added to the mapping. The MoU was signed in January 2016, focusing on the establishment of a formal framework for professional dialogue, CERT-CERT related cooperation for operational readiness and response, collaboration on cyber security technology and research related to smart technologies, exchange of best practices, and professional exchanges of human resource development<a href="#_ftn11" name="_ftnref11">[11]</a>.</li>
<li>A new joint statement was signed between UAE and India in January 2017, following up on their previous Technical Cooperation MoU signed in February 2016. To further deepen cooperation in this area, they agreed to set up joint Research & Development Centres of Excellence<a href="#_ftn12" name="_ftnref12">[12]</a>.</li>
<li>A preexisting MoU has been included in the mapping, signed in May of 2016. CERT-In agreed with the UK Ministry of Cabinet Office to promote close cooperation between both countries in the exchange in knowledge and experience in detection, resolution and prevention of security related incidents<a href="#_ftn13" name="_ftnref13">[13]</a>.</li>
<li>A new MoU between India and the US was signed in March 2017. CERT-In and CERT-US signed a MoU agreeing to promote closer co-operation and exchange of information pertaining to cyber security in accordance with relevant laws, rules and regulations and on the basis of equality, reciprocity and mutual benefit<a href="#_ftn14" name="_ftnref14">[14]</a>.</li>
<li>A new MoU was signed between Vietnam and India in January 2017, agreeing to promote closer cooperation for exchange of knowledge and experience in detection, resolution and prevention of cyber security incidents between both countries<a href="#_ftn15" name="_ftnref15">[15]</a>.</li>
</ol>
<p style="text-align: justify; ">NOTE: Some preexisting MoUs were added as we were initially only including the most recent agreements in the mapping. Upon adding newly signed MoUs, we decided to also keep the preexisting ones and revisit the other entries to include any preexisting MoUs that were initially excluded due to not being the most-recent. In this respect, the visualization will be adjusted to indicate the number of MoUs per country.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; "><a href="#_ftnref1" name="_ftn1">[1]</a><a href="http://www.dnaindia.com/india/report-india-australia-sign-mous-on-combating-terrorism-civil-aviation-security-2393843">http://www.dnaindia.com/india/report-india-australia-sign-mous-on-combating-terrorism-civil-aviation-security-2393843</a></p>
<p style="text-align: justify; "><a href="#_ftnref2" name="_ftn2">[2]</a><a href="http://www.theindependentbd.com/arcprint/details/89237/2017-04-09">http://www.theindependentbd.com/arcprint/details/89237/2017-04-09</a></p>
<p style="text-align: justify; "><a href="#_ftnref3" name="_ftn3">[3]</a><a href="http://www.thehindu.com/news/resources/Full-text-of-Joint-Statement-issued-by-India-France/article14019524.ece">http://www.thehindu.com/news/resources/Full-text-of-Joint-Statement-issued-by-India-France/article14019524.ece</a></p>
<p style="text-align: justify; "><a href="#_ftnref4" name="_ftn4">[4]</a><a href="http://indianexpress.com/article/india/indianhome-ministry-indonesian-ministry-of-security-and-coordination/">http://indianexpress.com/article/india/indianhome-ministry-indonesian-ministry-of-security-and-coordination/</a></p>
<p style="text-align: justify; "><a href="#_ftnref5" name="_ftn5">[5]</a><a href="https://telanganatoday.news/india-kenya-focus-defence-security-cooperation-pm">https://telanganatoday.news/india-kenya-focus-defence-security-cooperation-pm</a></p>
<p style="text-align: justify; "><a href="#_ftnref6" name="_ftn6">[6]</a><a href="http://economictimes.indiatimes.com/news/economy/foreign-trade/india-and-malaysia-sign-3-mous-including-cyber-security/articleshow/49891897.cms">http://economictimes.indiatimes.com/news/economy/foreign-trade/india-and-malaysia-sign-3-mous-including-cyber-security/articleshow/49891897.cms</a></p>
<p style="text-align: justify; "><a href="#_ftnref7" name="_ftn7">[7]</a><a href="http://indiatoday.intoday.in/story/bse-mauritius-stock-exchange-tie-up-to-promote-financial-mkts/1/723635.html">http://indiatoday.intoday.in/story/bse-mauritius-stock-exchange-tie-up-to-promote-financial-mkts/1/723635.html</a></p>
<p style="text-align: justify; "><a href="#_ftnref8" name="_ftn8">[8]</a><a href="http://www.tribuneindia.com/news/business/india-portugal-to-collaborate-in-ites-cyber-security/373666.html">http://www.tribuneindia.com/news/business/india-portugal-to-collaborate-in-ites-cyber-security/373666.html</a></p>
<p style="text-align: justify; "><a href="#_ftnref9" name="_ftn9">[9]</a><a href="http://naradanews.com/2016/12/india-qatar-sign-agreements-on-visa-cybersecurity-investments/">http://naradanews.com/2016/12/india-qatar-sign-agreements-on-visa-cybersecurity-investments/</a></p>
<p style="text-align: justify; "><a href="#_ftnref10" name="_ftn10">[10]</a><a href="http://ehub.newsforce.in/cabinet-approves-mou-india-serbia-cooperation-field-electronics/">http://ehub.newsforce.in/cabinet-approves-mou-india-serbia-cooperation-field-electronics/</a></p>
<p style="text-align: justify; "><a href="#_ftnref11" name="_ftn11">[11]</a><a href="http://www.businesstimes.com.sg/government-economy/singapore-and-india-strengthen-cooperation-on-cyber-security">http://www.businesstimes.com.sg/government-economy/singapore-and-india-strengthen-cooperation-on-cyber-security</a></p>
<p style="text-align: justify; "><a href="#_ftnref12" name="_ftn12">[12]</a><a href="http://mea.gov.in/bilateral-documents.htm?dtl/27969/India++UAE+Joint+Statement+during+State+visit+of+Crown+Prince+of+Abu+Dhabi+to+India+January+2426+2017">http://mea.gov.in/bilateral-documents.htm?dtl/27969/India++UAE+Joint+Statement+during+State+visit+of+Crown+Prince+of+Abu+Dhabi+to+India+January+2426+2017</a></p>
<p style="text-align: justify; "><a href="#_ftnref13" name="_ftn13">[13]</a><a href="http://www.bestcurrentaffairs.com/india-uk-mou-cyber-security/">http://www.bestcurrentaffairs.com/india-uk-mou-cyber-security/</a></p>
<p style="text-align: justify; "><a href="#_ftnref14" name="_ftn14">[14]</a><a href="http://www.dqindia.com/india-cert-signs-an-mou-with-us-cert/">http://www.dqindia.com/india-cert-signs-an-mou-with-us-cert/</a></p>
<p style="text-align: justify; "><a href="#_ftnref15" name="_ftn15">[15]</a><a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=157458">http://pib.nic.in/newsite/PrintRelease.aspx?relid=157458</a></p>
<hr style="text-align: justify; " />
<p style="text-align: justify; "> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016'>https://cis-india.org/internet-governance/blog/india-cyber-security-bilateral-agreements-map-dec-2016</a>
</p>
No publisherLeilah Elmokadem and Saumyaa NaiduInternational RelationsCybersecurityBilateral AgreementInternet GovernanceMLAT2017-04-27T15:14:55ZBlog EntryCIS Cybersecurity Series (Part 8) - Jeff Moss
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss
<b>CIS interviews Jeff Moss, Chief Security Officer for ICANN, as part of the Cybersecurity Series.</b>
<p><em>"Most consumers don't understand the privacy trade offs when they browse the web... the data that is being collected about them, the analytics that is being run against their buying behaviour, it is invisible... it is behind the scenes... and so it is very difficult for the consumer to make an informed decision." - Jeff Moss, Chief Security Officer, ICANN.</em></p>
<p>Centre for Internet and Society presents its eighth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS interviews Jeff Moss. Jeff is the chief security officer for ICANN. He founded Black Hat Briefings and DEF CON, two of the most influential information security conferences in the world. In 2009, Jeff was sworn in as a member of the U.S. Department of Homeland Security Advisory Council (DHS HSAC), providing advice and recommendations to the Secretary of the Department of Homeland Security on matters related to domestic security. </p>
<iframe src="//www.youtube.com/embed/VuarlhLqBII" frameborder="0" height="315" width="560"></iframe>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-30T09:25:44ZBlog EntryMapping of Sections in India’s MLAT Agreements
https://cis-india.org/internet-governance/blog/india-mlat-agreements-sections-map-dec-2016
<b>This set of infographics by Leilah Elmokadem and Saumyaa Naidu maps out and compares the various sections that exist in the 39 MLATs (mutual legal assistance treaty) between India and other countries. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws.
</b>
<p> </p>
<h4>Download: <a href="https://github.com/cis-india/website/raw/master/docs/CIS_IndiaMLATAgreementsSectionsMap_Dec2016.pdf">Infographic</a> (PDF) and <a href="https://github.com/cis-india/website/raw/master/docs/CIS_IndiaMLATAgreementsSectionsMap_Dec2016.xlsx">data</a> (XLSX)</h4>
<hr />
<p>We have found that India’s 39 MLAT documents are worded, formatted and sectioned differently. At the same time, many of the same sections exist across several MLATs. This diagram lists the sections found in the MLAT documents and
indicates the treaties in which they were included or not included. To keep the list of sections concise and to more easily pinpoint the key differences between the agreements, we have merged sections that are synonymous in meaning but
were worded slightly differently. For example: we would combine “Entry into force and termination” with “Ratification and termination” or “Expenses” with “Costs”.</p>
<p>At the same time, some sections that seemed quite similar and possible to merge were kept separate due to potential key differences that could be overlooked as a result. For example: “Limitation on use” vs. “Limitation on compliance” or “Serving of documents” vs. “Provision of (publicly available) documents/records/objects” remained separate for further analysis and comparison.</p>
<p>These differences in sectioning can be analysed to facilitate a thorough comparison between the effectiveness, efficiency, applicability and enforceability of the various provisions across the MLATs. The purpose of this initial mapping is to provide an overall picture of which sections exist in which MLAT documents. There will be further analysis of these sections to produce a more holistic content-based comparison of the MLATs.</p>
<p> </p>
<h2>Aggregated Analysis of Sections of MLAT Agreements</h2>
<img src="https://github.com/cis-india/website/raw/master/img/CIS_IndiaMLATAgreementsSectionsMap_Dec2016_Aggregate_01.png" alt="Aggregated analysis of sections of MLAT agreements by India" />
<img src="https://github.com/cis-india/website/raw/master/img/CIS_IndiaMLATAgreementsSectionsMap_Dec2016_Aggregate_02.png" alt="Aggregated analysis of sections of MLAT agreements by India" />
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/india-mlat-agreements-sections-map-dec-2016'>https://cis-india.org/internet-governance/blog/india-mlat-agreements-sections-map-dec-2016</a>
</p>
No publisherLeilah Elmokadem and Saumyaa NaiduInternational RelationsCybersecurityBilateral AgreementInternet GovernanceMLATCyber Security2016-12-31T06:52:46ZBlog EntryCIS Cybersecurity Series (Part 2) - Ram Mohan
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan
<b>CIS interviews Ram Mohan, a pioneer in the field of Internet security and internationalization, as part of the Cybersecurity Series</b>
<p><em>"In the Indian context, I think the government does have a significant responsibility to protect its citizenry from cybercrime. There is a greater need for the government to work with private industries as well as academic institutions to ensure a strong understanding of the threats unique to India. After all there are many threats that either originate in the context of the Indian sub-continent and are specific to India." - Ram Mohan, Executive Vice President, & Chief Technology </em><em>Officer of Afilias Limited.</em></p>
<p>Centre for Internet and Society presents its second installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS speaks to Ram Mohan, a pioneer in the field of Internet security and internationalization. Ram Mohan is Executive Vice President, & Chief Technology Officer of Afilias Limited. He also serves on the Board of Directors of the Internet Corporation for Assigned Names and Numbers (ICANN).</p>
<p> </p>
<p><iframe src="http://www.youtube.com/embed/Riub6EIwCgk" frameborder="0" height="315" width="560"></iframe></p>
<p> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<div><strong><em><br /></em></strong></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-12T10:27:26ZBlog EntryCIS Cybersecurity Series (Part 3) - Eva Galperin
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin
<b>CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).</b>
<p><i>"It is a vital tool for speaking truth to power. Unless you are able to speak anonymously, you are not really free to espouse unpopular ideas to people who have the power to do bad things to do... I think the value of anonymous speech vastly outweighs the difficulties that you can sometimes get into because people can speak anonymously. And on the whole, I think anonymity is worth protecting." - Eva Galperin, Global Policy Analyst at EFF. </i></p>
<p>Centre for Internet and Society presents its third installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS speaks to Eva Galperin, the Global Policy Analyst at the Electronic Frontier Foundation (EFF).She has worked for the EFF in various capacities for the last five years, applying the combination of her political science and technical background to organizing activism campaigns, and doing education and outreach on intellectual property, privacy, and security issues.</p>
<p>EFF homepage: <a href="https://www.eff.org/">https://www.eff.org/</a></p>
<div></div>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/BLtiuVX0nEM" width="560"></iframe></p>
<div></div>
<div>
<p><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></p>
</div>
<div><b><i><br /></i></b></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyberculturesCyber Security Interview2013-08-01T09:55:23ZBlog EntryCIS Cybersecurity Series (Part 4) - Marietje Schaake
https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake
<b>CIS interviews Marietje Schaake, member of the European parliament, as part of the Cybersecurity Series</b>
<div><em>"It is important that we don't confine solutions in military head quarters or in government meeting rooms but that consumers, internet users, NGOs, as well as businesses, together take responsibility to build a resilient society where we also don't forget what it is we are defending, and that is our freedoms... and we have learned hopefully from the war on terror, that there is a great risk to compromise freedom for alleged security and that is a mistake we should not make again." - Marietje Schaake, member of European parliament.</em></div>
<div><em><br /></em></div>
<div>Centre for Internet and Society presents its fourth installment of the CIS Cybersecurity Series.</div>
<div> </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</div>
<div> </div>
<div>In this installment, CIS interviews Marietje Schaake, member of the European Parliament for the Dutch Democratic Party (D66) with the Alliance of Liberals and Democrats for Europe (ALDE) political group. She serves on the Committee on Foreign Affairs, where she focuses on neighbourhood policy, Turkey in particular; human rights, with a specific focus on freedom of expression, Internet freedom, press freedom; and Iran. In the Committee on Culture, Media, Education, Youth and Sports, Marietje works on Europe’s Digital Agenda and the role of culture and new media in the EU´s external actions. In the Committee on International Trade, she focuses on intellectual property rights, the free flow of information and the relation between trade and foreign affairs.</div>
<div> </div>
<div>Marietje's website is: http://www.marietjeschaake.eu/</div>
<div> </div>
<p><iframe src="http://www.youtube.com/embed/F7IIHCu2D4g" frameborder="0" height="315" width="560"></iframe></p>
<p> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<p><strong><em><br /></em></strong></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake'>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-12T10:24:14ZBlog EntryCIS Cybersecurity Series (Part 5) - Amelia Andersdotter
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter
<b>CIS interviews Amelia Andersdotter, member of the European parliament, as part of the Cybersecurity Series</b>
<p><i>"Normally a good security policy will also provide privacy to the citizen that is encompassed by the security policy. So things like encryption, for instance, bring a more secure communication, more private communication, where you are able to interact with other people on equal terms and you don't have to fear outside interference. And that is obviously good for both the individual and for security. But then of course, security policies can be framed in different ways. It depends on who you are trying to protect with the security policy. Are you trying to create a secure situation for a copyright holder, or are you trying to create a secure situation for a law enforcement officer, or for a private citizen?" - Amelia Andersdotter, member of European parliament.</i></p>
<p>Centre for Internet and Society presents its fifth installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>Amelia Andersdotter is a Member of the European Parliament for the Pirate Party in Sweden. She works with industrial policy in the parliamentary committee of Industry, Research and Energy and is a substitute member of the committees for international trade, INTA, and budget control, CONT. Amelia is the Patron of the European Parliament Free Software User Group (EPFSUG), and also works in the delegations for the Andean community and Korean peninsula.</p>
<p>Amelia's website is: http://ameliaandersdotter.eu/</p>
<p> </p>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RPh7RF2dkcw" width="560"></iframe></p>
<div></div>
<div>
<p><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></p>
</div>
<div><b><i><br /></i></b></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyberculturesCyber Security Interview2013-08-01T09:54:14ZBlog EntryWSIS+10 High Level Event: A Bird's Eye Report
https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report
<b>The WSIS+10 High Level was organised by the ITU and collaborative UN entities on June 9-13, 2014. It aimed to evaluate the progress on implementation of WSIS Outcomes from Geneva 2003 and Tunis 2005, and to envision a post-2015 Development Agenda. Geetha Hariharan attended the event on CIS' behalf.</b>
<p style="text-align: justify; "><span>The World Summit on Information Society (WSIS) +10 </span><a href="http://www.itu.int/wsis/implementation/2014/forum/">High Level Event</a><span> (HLE) was hosted at the ITU Headquarters in Geneva, from June 9-13, 2014. The HLE aimed to review the implementation and progress made on information and communication technology (ICT) across the globe, in light of WSIS outcomes (</span><a href="http://www.itu.int/wsis/index-p1.html">Geneva 2003</a><span> and </span><a href="http://www.itu.int/wsis/index-p2.html">Tunis 2005</a><span>). Organised in three parallel tracks, the HLE sought to take stock of progress in ICTs in the last decade (High Level track), initiate High Level Dialogues to formulate the post-2015 development agenda, as well as host thematic workshops for participants (Forum track).</span><span> </span></p>
<h3 style="text-align: justify; ">The High Level Track:</h3>
<p style="text-align: justify; "><img src="https://cis-india.org/internet-governance/blog/copy2_of_HighLevelTrack.jpg/@@images/be5f993c-3553-4d63-bb66-7cd16f8407dc.jpeg" alt="High Level Track" class="image-inline" title="High Level Track" /></p>
<p style="text-align: justify; "><i>Opening Ceremony, WSIS+10 High Level Event </i>(<a class="external-link" href="https://twitter.com/ITU/status/334587247556960256/photo/1">Source</a>)</p>
<p style="text-align: justify; ">The High Level track opened officially on June 10, 2014, and culminated with the endorsement by acclamation (as is ITU tradition) of two <a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf">Outcome Documents</a>. These were: (1) WSIS+10 Statement on the Implementation of WSIS Outcomes, taking stock of ICT developments since the WSIS summits, (2) WSIS+10 Vision for WSIS Beyond 2015, aiming to develop a vision for the post-2015 global information society. These documents were the result of the WSIS+10 <a href="http://www.itu.int/wsis/review/mpp/">Multi-stakeholder Preparatory Platform</a> (MPP), which involved WSIS stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations).</p>
<p style="text-align: justify; ">The <strong>MPP</strong> met in six phases, convened as an open, inclusive consultation among WSIS stakeholders. It was not without its misadventures. While ITU Secretary General Dr. Hamadoun I. Touré consistently lauded the multi-stakeholder process, and Ambassador Janis Karklins urged all parties, especially governments, to “<i>let the UN General Assembly know that the multi-stakeholder model works for Internet governance at all levels</i>”, participants in the process shared stories of discomfort, disagreement and discord amongst stakeholders on various IG issues, not least human rights on the Internet, surveillance and privacy, and multi-stakeholderism. Richard Hill of the Association for Proper Internet Governance (<a href="http://www.apig.ch/">APIG</a>) and the Just Net Coalition writes that like NETmundial, the MPP was rich in a diversity of views and knowledge exchange, but stakeholders <a href="http://www.ip-watch.org/2014/06/16/what-questions-did-the-wsis10-high-level-event-answer/">failed to reach consensus</a> on crucial issues. Indeed, Prof. Vlamidir Minkin, Chairman of the MPP, expressed his dismay at the lack of consensus over action line C9. A compromise was agreed upon in relation to C9 later.<span> </span></p>
<p style="text-align: justify; ">Some members of civil society expressed their satisfaction with the extensive references to human rights and rights-centred development in the Outcome Documents. While governmental opposition was seen as frustrating, they felt that the <strong><span style="text-decoration: underline;">MPP had sought and achieved a common understanding</span></strong>, a sentiment <a href="https://twitter.com/covertlight/status/476748168051580928">echoed</a> by the ITU Secretary General. Indeed, even Iran, a state that had expressed major reservations during the MPP and felt itself unable to agree with the text, <a href="https://twitter.com/covertlight/status/476748723750711297">agreed</a> that the MPP had worked hard to draft a document beneficial to all.</p>
<p style="text-align: justify; ">Concerns around the MPP did not affect the <strong><span style="text-decoration: underline;">review of ICT developments</span></strong> over the last decade. High Level Panels with Ministers of ICT from states such as Uganda, Bangladesh, Sweden, Nigeria, Saudi Arabia and others, heads of the UN Development Programme, UNCTAD, Food and Agriculture Organisation, UN-WOMEN and others spoke at length of rapid advances in ICTs. The focus was largely on ICT access and affordability in developing states. John E. Davies of Intel repeatedly drew attention to innovative uses of ICTs in Africa and Asia, which have helped bridge divides of affordability, gender, education and capacity-building. Public-private partnerships were the best solution, he said, to affordability and access. At a ceremony evaluating implementation of WSIS action-lines, the Centre for Development of Advanced Computing (C-DAC), India, <a href="https://twitter.com/covertlight/status/476748723750711297">won an award</a> for its e-health application MOTHER.</p>
<p style="text-align: justify; "><span>The Outcome Documents themselves shall be analysed in a separate post. But in sum, the dialogue around Internet governance at the HLE centred around the success of the MPP. Most participants on panels and in the audience felt this was a crucial achievement within the realm of the UN, where the Tunis Summit had delineated strict roles for stakeholders in paragraph 35 of the </span><a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html">Tunis Agenda</a><span>. Indeed, there was palpable relief in Conference Room 1 at the </span><a href="http://www.cicg.ch/en/">CICG</a><span>, Geneva, when on June 11, Dr. Touré announced that the Outcome Documents would be adopted without a vote, in keeping with ITU tradition, even if consensus was achieved by compromise.</span></p>
<h3 style="text-align: justify; ">The High Level Dialogues:</h3>
<p style="text-align: justify; "><img src="https://cis-india.org/internet-governance/blog/HighLevelDialogues.jpg/@@images/3c30d94f-7a65-4912-bb42-2ccd3b85a18d.jpeg" alt="High Level Dialogues" class="image-inline" title="High Level Dialogues" /></p>
<p style="text-align: justify; "><i>Prof. Vladimir Minkin delivers a statement.</i> (<a class="external-link" href="https://twitter.com/JaroslawPONDER/status/476288845013843968/photo/1">Source</a>)</p>
<p style="text-align: justify; ">The High Level Dialogues on developing a post-2015 Development Agenda, based on WSIS action lines, were active on June 12. Introducing the Dialogue, Dr. Touré lamented the Millennium Development Goals as a “<i>lost opportunity</i>”, emphasizing the need to alert the UN General Assembly and its committees as to the importance of ICTs for development.</p>
<p style="text-align: justify; ">As on previous panels, there was <strong><span style="text-decoration: underline;">intense focus on access, affordability and reach in developing countries</span></strong>, with Rwanda and Bangladesh expounding upon their successes in implementing ICT innovations domestically. The world is more connected than it was in 2005, and the ITU in 2014 is no longer what it was in 2003, said speakers. But we lack data on ICT deployment across the globe, said Minister Knutssen of Sweden, recalling the gathering to the need to engage all stakeholders in this task. Speakers on multiple panels, including the Rwandan Minister for CIT, Marilyn Cade of ICANN and Petra Lantz of the UNDP, emphasized the need for ‘smart engagement’ and capacity-building for ICT development and deployment.</p>
<p style="text-align: justify; ">A crucial session on cybersecurity saw Dr. Touré envision a global peace treaty accommodating multiple stakeholders. On the panel were Minister Omobola Johnson of Nigeria, Prof. Udo Helmbrecht of the European Union Agency for Network and Information Security (ENISA), Prof. A.A. Wahab of Cybersecurity Malaysia and Simon Muller of Facebook. The focus was primarily on building laws and regulations for secure communication and business, while child protection was equally considered.<span> </span></p>
<p style="text-align: justify; ">The lack of laws/regulations for cybersecurity (child pornography and jurisdictional issues, for instance), or other legal protections (privacy, data protection, freedom of speech) in rapidly connecting developing states was noted. But the <strong><span style="text-decoration: underline;">question of cross-border surveillance and wanton violations of privacy went unaddressed</span></strong> except for the customary, unavoidable mention. This was expected. Debates in Internet governance have, in the past year, been silently and invisibly driven by the Snowden revelations. So too, at WSIS+10 Cybersecurity, speakers emphasized open data, information exchange, data ownership and control (the <a href="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties">right to be forgotten</a>), but did not openly address surveillance. Indeed, Simon Muller of Facebook called upon governments to publish their own transparency reports: A laudable suggestion, even accounting for Facebook’s own undetailed and truncated reports.</p>
<p style="text-align: justify; ">In a nutshell, the post-2015 Development Agenda dialogues repeatedly emphasized the importance of ICTs in global connectivity, and their impact on GDP growth and socio-cultural change and progress. The focus was on taking this message to the UN General Assembly, engaging all stakeholders and creating an achievable set of action lines post-2015.</p>
<h3 style="text-align: justify; ">The Forum Track:</h3>
<p><img src="https://cis-india.org/internet-governance/blog/copy_of_ForumTrack.jpg/@@images/dfcce68a-18d7-4f1e-897b-7208bb60abc9.jpeg" alt="Forum Track" class="image-inline" title="Forum Track" /></p>
<p><i>Participants at the UNESCO session on its Comprehensive Study on Internet-related Issues</i> (<a class="external-link" href="https://twitter.com/leakaspar/status/476690921644646400/photo/1">Source</a>)</p>
<p style="text-align: justify; ">The HLE was organized as an extended version of the WSIS Forum, which hosts thematic workshops and networking opportunities, much like any other conference. Running in parallel sessions over 5 days, the WSIS Forum hosted sessions by the ITU, UNESCO, UNDP, ICANN, ISOC, APIG, etc., on issues as diverse as the WSIS Action Lines, the future of Internet governance, the successes and failures of <a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/">WCIT-2012</a>, UNESCO’s <a href="http://www.unesco.org/new/internetstudy">Comprehensive Study on Internet-related Issues</a>, spam and a taxonomy of Internet governance.<span> </span></p>
<p style="text-align: justify; ">Detailed explanation of each session I attended is beyond the scope of this report, so I will limit myself to the interesting issues raised.<span> </span></p>
<p style="text-align: justify; ">At ICANN’s session on its own future (June 9), Ms. Marilyn Cade emphasized the <strong><span style="text-decoration: underline;">importance of national and regional IGFs</span></strong> for both issue-awareness and capacity-building. Mr. Nigel Hickson spoke of engagement at multiple Internet governance fora: “<i>Internet governance is not shaped by individual events</i>”. In light of <a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/">criticism</a> of ICANN’s apparent monopoly over IANA stewardship transition, this has been ICANN’s continual <a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en">response</a> (often repeated at the HLE itself). Also widely discussed was the <strong><span style="text-decoration: underline;">role of stakeholders in Internet governance</span></strong>, given the delineation of roles and responsibilities in the Tunis Agenda, and governments’ preference for policy-monopoly (At WSIS+10, Indian Ambassador Dilip Sinha seemed wistful that multilateralism is a “<i>distant dream</i>”).<span> </span></p>
<p style="text-align: justify; ">This discussion bore greater fruit in a session on Internet governance ‘taxonomy’. The session saw <a href="https://www.icann.org/profiles/george-sadowsky">Mr. George Sadowsky</a>, <a href="http://www.diplomacy.edu/courses/faculty/kurbalija">Dr. Jovan Kurbalija</a>, <a href="http://www.williamdrake.org/">Mr. William Drake</a> and <a href="http://www.itu.int/wsis/implementation/2014/forum/agenda/session_docs/170/ThoughtsOnIG.pdf">Mr. Eliot Lear</a> (there is surprisingly no official profile-page on Mr. Lear) expound on dense structures of Internet governance, involving multiple methods of classification of Internet infrastructure, CIRs, public policy issues, etc. across a spectrum of ‘baskets’ – socio-cultural, economic, legal, technical. Such studies, though each attempting clarity in Internet governance studies, indicate that the closer you get to IG, the more diverse and interconnected the eco-system gets. David Souter’s diagrams almost capture the flux of dynamic debate in this area (please see pages 9 and 22 of <a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf">this ISOC study</a>).</p>
<p style="text-align: justify; ">There were, for most part, insightful interventions from session participants. Mr. Sadowsky questioned the effectiveness of the Tunis Agenda delineation of stakeholder-roles, while Mr. Lear pleaded that techies be let to do their jobs without interference. <a href="http://internetdemocracy.in/">Ms. Anja Kovacs</a> raised pertinent concerns about <strong><span style="text-decoration: underline;">including voiceless minorities in a ‘rough consensus’ model</span></strong>. Across sessions, <strong><span style="text-decoration: underline;">questions of mass surveillance, privacy and data ownership rose</span></strong> from participants. The protection of human rights on the Internet – especially freedom of expression and privacy – made continual appearance, across issues like spam (<a href="http://www.itu.int/ITU-D/CDS/sg/rgqlist.asp?lg=1&sp=2010&rgq=D10-RGQ22.1.1&stg=1">Question 22-1/1</a> of ITU-D Study Group 1) and cybersecurity.</p>
<h3 style="text-align: justify; ">Conclusion:</h3>
<p style="text-align: justify; ">The HLE was widely attended by participants across WSIS stakeholder-groups. At the event, a great many relevant questions such as the future of ICTs, inclusions in the post-2015 Development Agenda, the value of muti-stakeholder models, and human rights such as free speech and privacy were raised across the board. Not only were these raised, but cognizance was taken of them by Ministers, members of the ITU and other collaborative UN bodies, private sector entities such as ICANN, technical community such as the ISOC and IETF, as well as (obviously) civil society.<span> </span></p>
<p style="text-align: justify; ">Substantively, the HLE did not address mass surveillance and privacy, nor of expanding roles of WSIS stakeholders and beyond. Processually, the MPP failed to reach consensus on several issues comfortably, and a compromise had to be brokered.</p>
<p style="text-align: justify; "><span>But perhaps a big change at the HLE was the positive attitude to multi-stakeholder models from many quarters, not least the ITU Secretary General Dr. Hamadoun Touré. His repeated calls for acceptance of multi-stakeholderism left many members of civil society surprised and tentatively pleased. Going forward, it will be interesting to track the ITU and the rest of UN’s (and of course, member states’) stances on multi-stakeholderism at the ITU Plenipot, the WSIS+10 Review and the UN General Assembly session, at the least.</span></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report'>https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report</a>
</p>
No publishergeethaWSIS+10PrivacyCybersecurityHuman Rights OnlineSurveillanceFreedom of Speech and ExpressionInternet GovernanceFacebookData ProtectionMulti-stakeholderICANNInternet AccessITUInternet StudiesE-GovernanceICT2014-06-20T15:57:32ZBlog EntryCall for Comments: Model Security Standards for the Indian Fintech Industry
https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry
<b></b>
<p>The Centre for Internet and Society is pleased to make available the Draft document of Model Security Standards for the Indian Fintech Industry, for feedback and comments from all stakeholders. The objective of this document which was first published in November 2019, is to ensure that the data of users is dealt with in a secure and safe manner by the Fintech Industry, and that smaller businesses in the Fintech industry have a specific standard to look at in order to limit their liabilities for any future breaches. <br /><br />We invite any parties interested in the field of technology policy, including but not limited to lawyers, policy researchers, and engineers, to send in your feedback/comments on the draft document by the 16th of January 2020. We intend to publish our final draft by the end of January 2020. We look forward to receiving your contributions to make this document more comprehensive and effective. Please find a copy of the draft document <a href="https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india" class="internal-link" title="Security Standards for the Financial Technology Sector in India">here</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry'>https://cis-india.org/internet-governance/call-for-comments-model-security-standards-for-the-indian-fintech-industry</a>
</p>
No publisherpranavFinancial TechnologyCybersecurityinternet governanceInternet GovernanceCyber Security2019-12-16T13:16:25ZBlog EntryAutomated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns
https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns
<b>Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? </b>
<p> </p>
<p> </p>
<p>The Supreme Court of India, in <a href="https://indiankanoon.org/doc/91938676/">Puttaswamy I</a><em> </em>recognized<em> </em>that
the right to privacy is not surrendered merely because the individual
is in a public place. Privacy is linked to the individual as it is an
essential facet of human dignity. Justice Chelameswar further clarified
that privacy is contextual. Even in a public setting, people trying to
converse in whispers would signal a claim to the right to privacy.
Speaking on a loudspeaker would naturally not signal the same claim.</p>
<p>The Supreme Court of Canada has also affirmed the notion of
contextual privacy. As recently as on 7 March, 2019, the Supreme Court
of Canada <a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/" rel="noreferrer noopener" target="_blank">in a landmark decision</a> defined privacy rights in public areas implicitly applying <a href="https://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf">Helena Nissenbaum’s theory of contextual integrity</a>.
Helena Nissenbaum explains that the extent to which the right to
privacy is eroded in public spaces with the help of her theory of
contextual integrity.</p>
<p>Nissenbaum suggests that labelling information as exclusively public
or private fails to take into account the context which rationalises the
desire of the individual to exercise her privacy in public. To explain
this with an illustration, there exists a reasonable expectation of
privacy in the restroom of a restaurant, even though it is in a public
space.</p>
<p>In <a href="http://www.thecourt.ca/r-v-jarvis-carving-out-a-contextual-approach-to-privacy/"><em>R v Jarvis</em></a> (Jarvis), the Court overruled a Court of Appeal for Ontario <a href="https://www.canlii.org/en/on/onca/doc/2017/2017onca778/2017onca778.pdf">decision</a>
to hold that people can have a reasonable expectation of privacy even
in public spaces. In this case, Jarvis was charged with the offence of
voyeurism for secretly recording his students. The primary issue that
the Supreme Court of Canada was concerned with was whether the students
filmed by Mr. Jarvis enjoyed a reasonable expectation of privacy at
their school.</p>
<p>The Court in this case unanimously held that students did indeed have
a reasonable expectation of privacy. The Court concluded nine
contextual factors relevant in determining whether a person has a
reasonable expectation to privacy would arise. The listed factors were:</p>
<p>“1. The location the person was in when he or she was observed or recorded,</p>
<p>2. The nature of the impugned conduct (whether it consisted of observation or recording),</p>
<p>3. Awareness of or consent to potential observation or recording,</p>
<p>4. The manner in which the observation or recording was done,</p>
<p>5. The subject matter or content of the observation or recording,</p>
<p>6. Any rules, regulations or policies that governed the observation or recording in question,</p>
<p>7. The relationship between the person who was observed or recorded and the person who did the observing or recording,</p>
<p>8. The purpose for which the observation or recording was done, and</p>
<p>9. The personal attributes of the person who was observed or recorded.” (paragraph 29 of the judgement).</p>
<p>The Court emphasized that the factors are not an exhaustive list, but
rather were meant to be a guiding tool in determining whether a
reasonable expectation of privacy existed in a given context. It is not
necessary that each of these factors is present in a given situation to
give rise to an expectation of privacy.</p>
<p>Compared to the above-mentioned factors in Jarvis, the Indian Supreme Court in <a href="https://indiankanoon.org/doc/127517806/">Justice K.S Puttaswamy (Retd.) v. Union of India</a>: Justice Sikri (Puttaswamy II) <strong>—</strong>
the case which upheld the constitutionality of the Aadhaar project
relied on the following factors to determine a reasonable expectation of
privacy in a given context:</p>
<p>“(i) What is the context in which a privacy claim is set up?</p>
<p>(ii) Does the claim relate to private or family life, or a confidential relationship?</p>
<p>(iii) Is the claim a serious one or is it trivial?</p>
<p>(iv) Is the disclosure likely to result in any serious or significant injury and the nature and extent of disclosure?</p>
<p>(v) Is disclosure relates to personal and sensitive information of an identified person?</p>
<p>(vi) Does disclosure relate to information already disclosed publicly? If so, its implication?”</p>
<p>These factors (acknowledged in Puttaswamy II in paragraph 292) seem
to be very similar to the ones laid down in Jarvis, i.e., there is a
strong reliance on the context in both cases. While there is no explicit
mention of individual attributes of the individual claiming a
reasonable expectation, the holding that children should be given an opt
out indicates that the Court implicitly takes into account personal
attributes (e.g. age) as well.</p>
<p>The Court in Jarvis further (in paragraph 39) took the example of a
woman in a communal change room at a public pool. She may expect other
users to incidentally observe her undress but she would continue to
expect only other women in the change room to observe her and reserve
her rights against the general public. She would also expect not to be
video recorded or photographed while undressing, both from other users
of the pool and by the general public. </p>
<p>If it is later found out that the change room had a one-way glass
which allowed the pool staff to view the users change — or if there was a
concealed camera recording persons while they were changing, she could
claim a breach of her reasonable expectation of privacy under such
circumstances and it would constitute an invasion of privacy.</p>
<p><strong>So, in the context of an AFRS, an individual walking down a
public road may still signal that they wish to avail of their right to
privacy. In such contexts, a concerted surveillance mechanism may come
up against constitutional roadblocks.</strong></p>
<p><strong>What is the nature of information being collected?</strong></p>
<p>The second big question <strong>—</strong> the nature of information
which is being collected plays a role in determining the extent to which
a person can exercise their reasonable expectation of privacy.
Puttaswamy II laid down that collection of core biometric information
such as fingerprints, iris scans in the context of the Aadhaar-Based
Biometric Authentication (‘ABBA’) is constitutionally permissible. The
basis of this conclusion is that the Aadhaar Act does not deal with the
individual’s intimate or private sphere.</p>
<p>The judgement of the Supreme Court in Puttaswamy II is in a very
specific context (i.e. the ABBA). It does not explain or identify the
contextual factors which determine the extent to which privacy may be
reasonably expected over biometrics generally. In this judgment, the
Court observed that demographic information and photographs do not raise
a reasonable expectation of privacy under Article 21 unless there exist
special circumstances such as the disclosure of juveniles in conflict
of law or a rape victim’s identity.</p>
<p><strong>Most importantly, the Court held that face photographs for
the purpose of identification are not covered by a reasonable
expectation of privacy. The Court distinguished face photographs from
intimate photographs or those photographs which concern confidential
situations. </strong></p>
<p><strong>Face photographs, according to the Court, are shared by
individuals in the ordinary course of conduct for the purpose of
obtaining a driving </strong>l<strong>icense, voter id, passport,
examination admit cards, employment cards, and so on. Face photographs
by themselves reveal no information.</strong></p>
<p>Naturally, this pronouncement of the Apex Court is a huge boost for the introduction of AFRS in India.</p>
<p>Abroad, however, on 4 September 2019, in <a href="https://www.judiciary.uk/wp-content/uploads/2019/09/bridges-swp-judgment-Final03-09-19-1.pdf">Edward Bridges v. Chief Constable of South Wales Police</a>, a Division Bench of the High Court in England and Wales heard a challenge against an AFRS introduced by law enforcement (<em>see</em>
Endnote 1). The High Court rejected a claim for judicial review holding
that the AFRS in question does not violate inter alia the right to
privacy under Article 8 of the European Convention of Human Rights
(‘ECHR’).</p>
<p>According to the Court, the AFRS was used for specific and limited
purposes, i.e., only when the image of the public matched a person on an
existing watchlist. The use of the AFRS was therefore considered a
lawful and fair restriction.</p>
<p>The Court, however, acknowledged that extracting biometric data
through AFRS is “well beyond the expected and unsurprising”. This seems
to be a departure from the Indian Supreme Court’s observation in
Puttaswamy II that there is no reasonable expectation of privacy over
biometric data in the context of ABBA, and may be a wiser approach for
the Indian courts to adopt.</p>
<h6><strong>Endnote </strong></h6>
<p>1. The challenge was put forth by Edward Bridges, a civil liberties
campaigner from Cardiff for being caught on camera in two particular
deployments of the AFRS a) when he was at Queen Street, a busy shopping
area in Cardiff and b) when he was at the Defence Procurement, Research,
Technology and Exportability Exhibition held at the Motorpoint Arena.</p>
<p> </p>
<p>This was published by <a class="external-link" href="https://aipolicyexchange.org/2019/12/28/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns/">AI Policy Exchange</a>.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns'>https://cis-india.org/internet-governance/automated-facial-recognition-systems-afrs-responding-to-related-privacy-concerns</a>
</p>
No publisherArindrajit Basu, Siddharth SonkarCybersecurityCyber Securityinternet governanceInternet Governance2020-01-02T14:09:14ZBlog EntryAutomated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward
https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward
<b> Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems? </b>
<p> </p>
<p><strong>The Mosaic Theory of Privacy</strong></p>
<p>Whether the data collected by the AFRS should be treated similar to
face photographs taken for the purposes of ABBA is not clear in the
absence of judicial opinion. The AFRS would ordinarily collect
significantly more data than facial photographs during authentication.
This can be explained with the help of the <em><a href="https://www.lawfareblog.com/defense-mosaic-theory" rel="noreferrer noopener" target="_blank">mosaic theory of privacy</a></em>.</p>
<p>The mosaic theory of privacy suggests that data collected for long
durations of an individual can be qualitatively different from single
instances of observation. It argues that aggregating data from different
instances can create a picture of an individual which affects her
reasonable expectation of privacy. This is because a mere slice of
information reveals a lot less if the same is contextualised in a broad
pattern — a mosaic. </p>
<p>The mosaic theory of privacy does not find explicit reference in
Puttaswamy II. The petitioners had argued that seeding of Aadhaar data
into existing databases would bridge information across silos so as to
make real time surveillance possible. This is because information when
integrated from different silos becomes more than the sum of its parts.</p>
<p>The Court, however, dismissed this argument, accepting UIDAI’s
submission that the data collected remains in different silos and
merging is not permitted within the Aadhaar framework. Therefore, the
Court did not examine whether it is constitutionally permissible to
integrate data from different silos; it simply rejected the possibility
of surveillance as a result of Aadhaar authentication.</p>
<p>Jurisprudence in other jurisdictions is more advanced. In <em>United States v. Jones</em>,
the United States Supreme Court had observed that the insertion of a
global positioning system into Antoine Jones’ Jeep in the absence of a
warrant and without his consent invaded his privacy, entitling him to
Fourth Amendment Protection. In this case, the movement of Jones’
vehicle was monitored for a period of twenty-eight days. Five concurring
opinions in Jones acknowledges that aggregated and extensive
surveillance is capable of violating the reasonable expectation of
privacy irrespective of whether or not surveillance has taken place in
public.</p>
<p>The Court distinguished between prolonged surveillance and short term
surveillance. Surveillance in the short run does not reveal what a
person repeatedly does, as opposed to sustained surveillance which can
reveal significantly more about a person. The Court takes the example of
how a sequence of trips to a bar, a bookie, a gym or a church can tell a
lot more about a person than the story of any single visit viewed in
isolation.</p>
<p>Most recently, in<a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" rel="noreferrer noopener" target="_blank"> <em>Carpenter v. United States</em></a>,
the Supreme Court of the United States held that the collection of
historical cell data by the government exposes the physical movements
of an individual to potential surveillance, and an individual holds a
reasonable expectation of privacy against such collection. The Court
admitted that historical-cell site information allows the government to
go back in time in order to retract the exact whereabouts of a person.</p>
<p>Judicial decisions have not addressed specifically whether facial
recognition through law enforcement constitutes a search under the
Fourth Amendment or a “mere visual observation”.</p>
<p>The common thread linking CCTV footages and cellular data is the
unique ability to track the movement of an individual from one place to
another, enabling extreme forms of surveillance. It is perhaps this
crucial link that would make ARFS-enabled CCTVs prejudicial to
individual privacy.</p>
<p> The mosaic theory as understood in <em>Carpenter</em> helps one
understand the extent to which an AFRS can augment the capacities of law
enforcement in India. This in turn can help in understanding whether it
is constitutionally permissible to install such systems across the
country.</p>
<p>AFRS enabled-CCTV footages from different CCTVs. if viewed in
conjunction could reveal a sequence of movements of an individual,
enabling long-term surveillance of a nature that is qualitatively
distinct from isolated observances observed across unrelated CCTV
footages.</p>
<p>Subsequent to <em>Carpenter</em>, <a href="https://www.lawfareblog.com/four-months-later-how-are-courts-interpreting-carpenter" rel="noreferrer noopener" target="_blank">federal district courts</a>
in the United States have declined to apply Carpenter to video
surveillance cases since the judgement did not “call into question
conventional surveillance techniques and tools, such as security
cameras.”</p>
<p>The extent of processing that an AFRS-enabled CCTV exposes an
individual to would be significantly greater. This is because every time
an individual is in the zone of a AFRS-enabled CCTV, the facial image
will be compared to a common database. Snippets from different CCTVs
capturing the individual’s physical presence in two different locations
may not be meaningful per se. When observed together, the AFRS will make
it possible to identify the individual’s movement from one place to
another.</p>
<p>For instance, the AFRS will be able to identify the person when they
are on Street A at a particular time and when they are Street B in the
immediately subsequent hour recorded by respective CCTV cameras,
indicating the person’s physical movement from A to B. While a CCTV
camera only records movement of an individual in video format, AFRS
translates that digital information into individualised data with the
help of a comparison of facial features with a pre-existing database.</p>
<p>Through data aggregation, which appears to be the aim of the Indian
government in their tender that links three databases, it is apparent
that the right to privacy is in danger. Yet, at present, there does not
exist any case law or legislation that can render such efforts illegal
at this juncture.</p>
<p><strong>Conclusions and The Way Forward</strong></p>
<p>Despite a lack of judicial recognition of the potential
unconstitutionality of deploying AFRS, it is clear that the introduction
of these systems pose a clear and present danger to civil rights and
human dignity. Algorithmic surveillance alters a human being’s life in
ways that even the subject of this surveillance cannot fully comprehend.
As an individual’s data is manipulated and aggregated to derive a
pattern about that individual’s world, the individual or his data no
longer exists for itself<sup> </sup>but are massaged into various categories.</p>
<p>Louis Amoore terms this a ‘<a href="https://journals.sagepub.com/doi/abs/10.1177/0263276411417430?journalCode=tcsa" rel="noreferrer noopener" target="_blank">data-derivative</a>’,
which is an abstract conglomeration of data that continuously shapes
our futures without us having a say in their framing. The branding of an
individual as a criminal and then aggregating their data causes
emotional distress as individuals move about in fear of the state gaze
and their association with activities that are branded as potentially
dangerous — thereby suppressing a right to dissent — as exemplified by
their use reported use during the recent protests in Hong Kong.</p>
<p>Case law both in India and abroad has clearly suggested that a right
to privacy is contextual and is not surrendered merely because an
individual is in a public place. However, the jurisprudence protecting
public photography or videography under the umbrella of privacy remains
less clear globally and non-existent in India.</p>
<p>The mosaic theory of privacy is useful in this regard as it prevents
mass ‘data-veillance’ of individual behaviour and accurately identifies
the unique power that the volume, velocity and variety of Big Data
provides to the state. Therefore, it is imperative that the judiciary
recognise safeguards from data aggregation as an essential component of a
reasonable expectation of privacy. At the same time, legislation could
also provide the required safeguards.</p>
<p>In the US, Senators Coons and Lee recently introduced a draft Bill titled ‘<a href="https://www.coons.senate.gov/imo/media/doc/ALB19A70.pdf" rel="noreferrer noopener" target="_blank">The Facial Recognition Technology Warrant Act of 2019’</a>.
The Bill aims to impose reasonable restrictions on the use of facial
recognition technology by law enforcement. The Bill creates safeguards
against sustained tracking of physical movements of an individual in
public spaces. The Bill terms such tracking ‘ongoing surveillance’ when
it occurs for over a period of 72 hours in real time or through
application of technology to historical records. The Bill requires that
ongoing surveillance only be conducted for law enforcement purposes <em>and</em> in pursuance of a Court Order (unless it is impractical to do so).</p>
<p>While the Bill has its textual problems, it is definitely worth
considering as a model going forward and ensure that AFR systems are
deployed in line with a rights-respecting reading of a reasonable
expectation of privacy. <a href="http://datagovernance.org/report/adoption-and-regulation-of-facial-recognition-technologies-in-india" rel="noreferrer noopener" target="_blank">Parsheera</a>
suggests that the legislation should narrow tailoring of the objects
and purposes for deployment of AFRS, restrictions on the person whose
images may be scanned from the databases, judicial approval for its use
on a case by case basis and effective mechanisms of oversight, analysis
and verification.</p>
<p>Appropriate legal intervention is crucial. A failure to implement
this effectively jeopardizes the expression of our true selves and the
core tenets of our democracy.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward'>https://cis-india.org/internet-governance/automated-facial-recognition-systems-and-the-mosaic-theory-of-privacy-the-way-forward</a>
</p>
No publisherArindrajit Basu, Siddharth SonkarCybersecurityCyber Securityinternet governanceInternet Governance2020-01-02T14:12:38ZBlog EntryCryptocurrency Regulation in India – A brief history
https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history
<b>In March 2020, the Supreme Court of India quashed the RBI order passed in 2018 that banned financial services firms from trading in virtual currency or cryptocurrency.
Keeping this policy window in mind, the Centre for Internet & Society will be releasing a series of blog posts and policy briefs on cryptocurrency regulation in India
</b>
<p id="docs-internal-guid-18286fb9-7fff-c656-6a5b-a01a2e2b3682" style="text-align: justify;" dir="ltr"> </p>
<p style="text-align: justify;" dir="ltr">The story of cryptocurrencies
started in 2008 when a paper titled “Bitcoin: A Peer to Peer Electronic
Cash System” was published by a single or group of pseudonymous
developer(s) by the name of Satoshi Nakamoto. The actual network took
some time to start with the first transactions taking place only in
January 2009. The first actual sale of an item using Bitcoin took place a
year later with a user swapping 10,000 Bitcoin for two pizzas in 2010,
which attached a cash value to the cryptocurrency for the first time. By
2011 other cryptocurrencies began to emerge, with Litecoin, Namecoin
and Swiftcoin all making their debut. Meanwhile, Bitcoin the
cryptocurrency that started it all started getting criticised after
claims emerged that it was being used on the so-called “dark web”,
particularly on sites such as Silk Road as a means of payment for
illegal transactions. Over the next five years cryptocurrencies steadily
gained traction with increased number of transactions and the price of
Bitcoin, the most popular cryptocurrency shot up from around 5 Dollars
in the beginning of 2012 to almost 1000 Dollars at the end of 2017.</p>
<p style="text-align: justify;" dir="ltr">Riding on the back of this
wave of popularity, a number of cryptocurrency exchanges started
operating in India between 2012 and 2017 providing much needed depth and
volume to the Indian cryptocurrency market. These included popular
exchanges such as Zebpay, Coinsecure, Unocoin, Koinex, Pocket Bits and
Bitxoxo. With the price of cryptocurrencies shooting up and because of
its increased popularity and adoption by users outside of its
traditional cult following, regulators worldwide began to take notice of
this new technology; in India the RBI issued a Press Release cautioning
the public against dealing in virtual currencies including Bitcoin way
back in 2013. However, the transaction volumes and adoption of
cryptocurrencies in India really picked up in earnest only after the
demonetisation of high value currency notes in November of 2016, with
the government’s emphasis on digital payments leading to alternatives to
traditional online banking such as cryptocurrencies forcing their way
into the public consciousness. Indian cryptocurrency exchanges started
acquiring users at a much higher pace which drove up volume for
cryptocurrency transactions on all Indian exchanges. The growing
popularity of cryptocurrencies and its adoption by large numbers of
Indian users forced the RBI to issue another Press Release in February
2017 reiterating its concerns regarding cryptocurrencies raised in its
earlier Press Release of 2013. </p>
<p style="text-align: justify;" dir="ltr">In October and November, 2017
two Public Interest Petitions were filed in the Supreme Court of India,
one by Siddharth Dalmia and another by Dwaipayan Bhowmick, the former
asking the Supreme Court to restrict the sale and purchase of
cryptocurrencies in India, and the latter asking for cryptocurrencies in
India to be regulated. Both the petitions are currently pending in the
Supreme Court.</p>
<p style="text-align: justify;" dir="ltr">In November, 2017 the
Government of India constituted a high level Inter-ministerial Committee
under the chairmanship of Shri Subhash Chandra Garg, Secretary,
Department of Economic Affairs, Ministry of Finance and comprising of
Shri Ajay Prakash Sawhney (Secretary, Ministry of Electronics and
Information Technology), Shri Ajay Tyagi (Chairman, Securities and
Exchange Board of India) and Shri B.P. Kanungo (Deputy Governor, Reserve
Bank of India). The mandate of the Committee was to study various
issues pertaining to Virtual Currencies and to propose specific actions
that may be taken in relation thereto. This Committee submitted its
report in July of 2019 recommending a ban on private cryptocurrencies in
India.</p>
<p style="text-align: justify;" dir="ltr">In December 2017 both the RBI
as well as the Ministry of Finance issued Press releases cautioning the
general public about the dangers and risks associated with
cryptocurrencies, with the Ministry of Finance Press Release saying that
cryptocurrencies are like ponzi schemes and also declaring that they
are not currencies or coins. It should be mentioned here that till the
end of March 2018, the RBI and the Finance Ministry had issued various
Press Releases on cryptocurrencies cautioning people against their
risks, however none of them ever took any legal action or gave any
enforceable directions against cryptocurrencies. All of this changed
with the RBI circular dated April 6, 2018 whereby the RBI prevented
Commercial and Co-operative Banks, Payments Banks, Small Finance Banks,
NBFCs, and Payment System Providers not only from dealing in virtual
currencies themselves but also directing them to stop providing services
to all entities which deal with virtual currencies.</p>
<p style="text-align: justify;" dir="ltr">The effect of the circular was
that cryptocurrency exchanges, which relied on normal banking channels
for sending and receiving money to and from their users, could not
access any banking services within India. This essentially crippled
their business operations since converting cash to cryptocurrencies and
vice versa was an essential part of their operations. Even pure
cryptocurrency exchanges which did not deal in fiat currency, were
unable to carry out their regular operations such as paying for office
space, staff salaries, server space, vendor payments, etc. without
access to banking services. </p>
<p>As a the operations of cryptocurrency exchanges took a severe hit and
the number of transactions on these exchanges reduced substantially.
People who had bought cryptocurrencies on these exchanges as an
investment were forced to sell their crypto assets and cash out before
they lost access to banking facilities. The cryptocurrency exchanges
themselves found it hard to sustain operations in the face of the dual
hit of reduced transaction volumes and loss of access banking services.
Faced with such an existential threat, a number of exchanges who were
members of the Internet and Mobile Association of India (IMAI), filed a
writ petition in the Supreme Court on May 15, 2018 titled Internet and
Mobile Association of India v. Reserve Bank of India, the final
arguments in which were heard by the Supreme Court of India in January,
2020 and the judgment is awaited. If the Supreme Court agrees with the
arguments of the petitioners, then cryptocurrency exchanges would be
able to restart operations in India; as a result the cryptocurrency
ecosystem in India may be revived and cryptocurrencies may become a
viable investment alternative again.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history'>https://cis-india.org/internet-governance/blog/cryptocurrency-regulation-in-india-2013-a-brief-history</a>
</p>
No publishervipulCybersecurityinternet governanceBitcoinInternet GovernanceCryptocurrenciesCyber Security2020-03-05T18:36:09ZBlog EntryCIS Cybersecurity Series (Part 6) - Lhadon Tethong
https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong
<b>CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series</b>
<p><i>"In authoritarian states, and in this case, in Tibet, I think that every person that we can teach and pass knowledge to, that can help them stay out of jail, stay in the streets, for one, two, three days longer, one week longer, that is a valuable time of time and resources. And I think we cannot rely on only tools and technology solutions to protect people. I think we can't just rely on government policies at the highest levels, and on export controls... the approach to digital security has to be comprehensive and we have to engage citizens. And not just in cases like the Tibetans or for activists or for people living under repression, but for people in free and open societies too." - Lhadon Tethong, Tibetan human rights activist.</i></p>
<p>Centre for Internet and Society presents its sixth installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS interviews Lhadon Tethong, Tibetan human rights activist. Lhadon is the Director of the Tibet Action Institute, where she leads a team of technologists and human rights advocates in developing and advancing open-source communication technologies, nonviolent strategies and innovative training programs for Tibetans and other groups facing heavy repression and human rights abuses.</p>
<p>Link for Tibet Action Institute: <a href="https://tibetaction.net/">https://tibetaction.net/</a></p>
<p> </p>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RzlvdY_DAe8" width="560"></iframe></p>
<p><b><i><br /></i></b></p>
<p><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></p>
<div><b><i><br /></i></b></div>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong'>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong</a>
</p>
No publisherpurbaCybersecurityInternet GovernanceCyberculturesCyber SecurityCyber Security Interview2013-08-01T09:54:46ZBlog Entry