<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/icomm-2012-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/exploring-the-internals-of-mobile-devices"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/001ChartforBlog.png"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules">
    <title>Indian Telegraph Act, 1885, 419A Rules and IT (Amendment) Act, 2008, 69 Rules</title>
    <link>https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the 419A Rules of the Indian Telegraph Act, 1885 and the 69 Rules under Section 69 of the Information Technology (Amendment) Act, 2008 in order to better understand how the two are similar and how they differ. Though they are from different Acts entirely, the Rules are very similar. Notes have been included on some changes we deemed to be important. &lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy4_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Though they are from different Acts entirely, the 419A Rules from the Indian Telegraph Act of 1885 and the 69 Rules from the Information Technology (Amended) Act, 2008 are very similar. In fact, much of the language that appears in the official 69 rules is very close, if not the same in many places, as the language found in the 419A rules. The majority of the change in language between the 419A Rules and the equivalent 69 Rules acts to clarify statements or wordings that may appear vague in the former. Aside from this, it appears that many of the 69 Rules have been cut-and-pasted from the 419A Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arguably the most important change between the two sets of rules takes place between Clause (3) of the 419A Rules and Clause (8) of the 69 Rules, where the phrase “while issuing directions [...] the officer shall consider possibility of acquiring the necessary information by other means” has been changed to “the competent authority shall, &lt;i&gt;before issuing&lt;/i&gt; any direction under Rule (3), consider possibility of acquiring the necessary information by other means”. This is an important distinction, as the latter requires other options to be looked at before issuing the order for any interception or monitoring or decryption of any information, whereas the former could possibly allow the interception of messages while other options to gather the “necessary” information are being considered. It seems unreasonable that the state and various state-approved agencies could possibly be intercepting the personal messages of Indian citizens in order to gather “necessary” information without having first established that interception was a last resort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another potentially significant change between the rules can be found between Clause (15) of the 419A Rules, which states, in the context of punishment of a service provider, the action taken shall include “not only fine but also suspension or revocation of their licenses”, whereas Clause (21) of the 69 Rules states that the punishment of an intermediary or person in-charge of computer resources “shall be liable for any action under the relevant provisions of the time being in force”. This is an interesting distinction, possibly made to avoid issues with legal arbitrariness associated with assigning punishments that differ for those punishments for the same activities laid out under the Indian Penal Code. Either way, the punishments for a violation of the maintenance of secrecy and confidentiality as well as unauthorized interception (or monitoring or decryption) could potentially be much harsher under the 69 Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the same vein, the most significant clarification through a change in language takes place between Clause (10) of the 419A and Clause (14) of the 69 Rules: “the service providers shall designate &lt;i&gt;two senior executives&lt;/i&gt; of the company” from the 419A Rules appears as “every intermediary or person in-charge of computer resource shall designate &lt;i&gt;an officer to receive requisition, and another officer to handle such requisition&lt;/i&gt;” in the 69 Rules. This may be an actual difference between the two sets of Rules, but either way, it appears to be the most significant change between the equivalent Clauses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The addition of certain clauses in the 69 Rules can also give us some interesting insights about what was of concern when the 419A rules were being written. To begin, the 419A rules provide no definitions for any of the specific terms used in the Rules, whereas the 69 Rules include a list of definitions in Clause (2). Clause (4) of 69 Rules, which deals which the authorisation of an agency of the Government to perform interception, monitoring and decryption, is sorely lacking in the 419A rules, which alludes to “authorised security [agencies]” without ever providing any framework as to how these agencies become authorised or who should be doing the authorising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 69 Rules also include Clause (5), which deals with how a state should go about obtaining authorisation to issue directions for interception, monitoring and/or decryption in territories outside of its jurisdiction, which is never mentioned in 419A rules, lamely sentencing states to carry out the interception of messages only within their own jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, Clause (24), which deals with the prohibition of interception, monitoring and/or decryption of information without authorisation, and Clause (25), which deals with the prohibition of the disclosure of intercepted, monitored and/or decrypted information, have fortunately been added to the 69 Rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules'&gt;https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T10:04:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/icomm-2012-report">
    <title>ICOMM2012: International Communications and Electronics Fair</title>
    <link>https://cis-india.org/a2k/blogs/icomm-2012-report</link>
    <description>
        &lt;b&gt;The seventh India International Communications and Electronics Fair (ICOMM2012) organized by CMAI Association of India was held at the NSIC Expo Grounds in New Delhi from September 14 to 15, 2012. Jadine Lannon attended the event, and shares us with some interesting and exciting new developments in ICT.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For the last seven years, the ICOMM event has been conducted by the Communication Multimedia Applications Infrastructure (CMAI) Association of India.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Since its first installment in 2006, ICOMM has grown to be a significant international tradeshow that showcases the latest products and technologies from a wide array of Asian mobile, tablets and consumer electronics manufacturers. Over the years, the event has also grown to include various participants from related industries, like service providers, application and software designers, and producers of equipment, components, parts and accessories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While past ICOMM events had a strict B2B (business to business) structure, ICOMM2012 was the first year that the tradeshow was open to the public, making it India’s first consumer mobile and tablet exhibition. This B2B/C2B strategy appeared to be largely successful—the event received a high amount of traffic, especially from young people, and plans for the 8th ICOMM in 2013 involve an increase in event scale through integration with the India Telecom 2013 tradeshow.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main themes of ICOMM2012 were mobiles, tablets, and consumer electronics, though applications, accessories, and various related technologies and industries were also featured. The event hosted a large diversity of participants, from leading Indian brands like Micromax, Lava International, Karbonn and Maxx Mobile to smaller Indian and international brands such as GlobyTalky, Skymobiles, Gionee, Ivio, Belphone and Signal. A huge array of devices and innovations were featured at ICOMM2012, many of which are still prototypes. Here are some of the innovations and booths that caught my eye:&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ubslife.png" alt="null" class="image-inline" title="Datawind" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Datawind Ltd. occupied a popular booth with the release of four new 7-inch UbiSlate tablets&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; UbiSlate 7Ci, 7C+, 7Ri and 7R+. These sophisticated Android devices function as both tablets and smartphones, support WiFi and GPRS connections, and are the only Android devices on the Indian market to feature Datawind’sUbiSurfer browser. The UbiSlate 7+ devices can now be pre-ordered for between Rs. 3,499 and Rs. 4,799.&lt;/p&gt;
&lt;p&gt;I was able to interview Mr. Jasjit Singh, the Executive Vice President of Datawind, on the UbiSlate tablets. A link to this interview will be provided in the near future.&lt;/p&gt;
&lt;p&gt;ICOMM2012 actually saw the launch of fair number of new devices onto the Indian market. One of the most prominent launches was SMSInfosys’&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; new product line of mobile, tablet, and computer devices under the brand GlobyTalky.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; This “GlobyTalky” brand originally began as a mobile application called “GlobyTalky – Connected Life”, a multi-platform RCSe application that boasts multiple communication and sharing features. The application, brand and devices are the brainchildren of Imtiaz Ahmed, the founder of SMSInfosys.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The GlobyTalky launch was distinguished by the wide array of devices that were released. The brand features a good selection of feature phones, smartphones and tablets, as well as two laptops (I was unable to get a picture of the laptops). Each of the GlobyTalky mobile and tablet devices feature the GlobyTalky – Connected Life application. Two phones are of particular interest in the photo below—the thin light blue phone with the long blue strap and the dark blue candy bar-style phone on the right.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/LightBlue.png" alt="null" class="image-inline" title="Light Blue" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;The light blue phone is about the size of a credit card and 5.6 mm thick. It was advertised as a “back-up” phone that one could keep in their wallet and use when their main phone failed, and was priced at Rs. 1000-1200. The dark blue phone, called the G-Aqua, is completely waterproof—it can function perfectly while submerged in water, and can survive submersion of up to 1.5 meters without taking any damage. It can even receive calls, play music, and take pictures while underwater. It can be seen again in white in the picture below.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Whitephone.png" alt="null" class="image-inline" title="White Phone" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;According to Mr. Ahmed, 60 per cent of the mobile devices that are brought into services centers in India have water damage, which is what motivated him to create a completely waterproof phone for the Indian market. He estimates that it will be priced between Rs. 4,200 and Rs. 4,500.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;GlobyTalky was not the only participant that showcased a waterproof phone, though. IVIO, a mobile brand owned by the Indonesian company PT. Intersys, was also giving demonstrations on their waterproof smartphone, the &lt;a href="https://cis-india.org/home-images/water.png" class="internal-link"&gt;DG68&lt;/a&gt;. With its sleek design, 4.1-inch high-resolution screen, 3G and Wifi capabilities, capacitate touch and Android 4.0 OS, the DG68 is a much more sophisticated phone than the G-Aqua. However, IVIO has yet to release any of its devices onto the Indian market, and the DG68 is still a prototype.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ShenZhen BLEPHONE Technology Co., Ltd., the company that owns the popular mobile brands Lesun and Lephone (the latter of which is available on the Indian market), also had a popular booth. Aside from their large presentation of feature phones and smartphones, BLEPHONE also showcased some interesting innovations and accessories. In particular, I was quite impressed by their Lephone mobile USB charging devices, called the CooMax, and their Lesun digital recorder-cum-mobile phone, the Gift I.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/lephone.png" alt="null" class="image-inline" title="Lephone" /&gt;&lt;/th&gt; &lt;th&gt;&lt;img src="https://cis-india.org/home-images/Lesun.png" alt="null" class="image-inline" title="Lesun" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;ICOMM2012 was a hugely successful exhibition. Aside from showcasing many of the most interesting and significant innovations and actors in the Asian ICT sectors, and possibly the wider world, the event was able to attract more than 21,500 delegates over a two-day period.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Further, according to NK Goyal, the president of the CMAI Association of India, the fair was able to generate business leads worth USD 154 million.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; I highly encourage anyone interested in the exciting and ever-changing world of ICT to attend ICOMM2013, as it is sure to continue to grow and attract more and more exciting and fascinating technologies and devices.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Given below is a gallery of the photos taken at the event and of various other booths and devices.&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="400" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/15447679" width="476"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The CMAI Association of India is a prominent trade association that works to promote growth in the Indian IT and telecom sector domestically and internationally through activities such as investing in industry services and promotion, education, training and market research. Through consultation, events, advocacy, research and promotion, the CMAI now boasts a substantial amount of members and international partners, as well as multiple international offices. More information can be found on the CMAI Association of India at &lt;a class="external-link" href="http://www.cmai.asia/association.php"&gt;http://www.cmai.asia/association.php&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See: “7th ICOMM 2012 Held Successfully.” &lt;i&gt;EFYTimes.com&lt;/i&gt;, EFY Enterprises Pvt. Ltd., September 17th, 2012, &lt;a href="http://www.efytimes.com/e1/fullnews.asp?edid=90770"&gt;http://www.efytimes.com/e1/fullnews.asp?edid=90770&lt;/a&gt;. Last accessed on October 30th, 2012.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. The UbiSlate tablet is the commercial version of Datawind Ltd.’s Aakask tablet, a high-functioning low-cost tablet device that was developed in collaboration with the Indian government as part of the country’s endeavor to supply Indian college and university students with a low-cost computer device. This project was part of the government’s aim to provide an e-learning service to 25,000 colleges and 500 universities across India (this figure was retrieved from &lt;a href="http://www.bbc.co.uk/news/world-south-asia-10740817"&gt;http://www.bbc.co.uk/news/world-south-asia-10740817&lt;/a&gt;). More data on this device can be found at: &lt;a class="external-link" href="http://www.akashtablet.com/"&gt;http://www.akashtablet.com/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. SMSInfosys is a mobile phone testing company with offices in India, Hong Kong and China. They perform quality assurance/quality control inspection, certification verification and IMEI services to mobile phone producers. More information about the company can be found here: &lt;a class="external-link" href="http://smsinfosys.com/"&gt;http://smsinfosys.com/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. More information on this brand and product line can be found here: &lt;a class="external-link" href="http://globytalky.com/"&gt;http://globytalky.com/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].See: “7th ICOMM 2012 Held Successfully.” &lt;i&gt;EFYTimes.com&lt;/i&gt;, EFY Enterprises Pvt. Ltd., September 17th, 2012, &lt;a href="http://www.efytimes.com/e1/fullnews.asp?edid=90770"&gt;http://www.efytimes.com/e1/fullnews.asp?edid=90770&lt;/a&gt;. Last accessed on October 30th, 2012.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. See: “7th ICOMM 2012 Held Successfully.” &lt;i&gt;EFYTimes.com&lt;/i&gt;, EFY Enterprises Pvt. Ltd., September 17th, 2012, &lt;a href="http://www.efytimes.com/e1/fullnews.asp?edid=90770"&gt;http://www.efytimes.com/e1/fullnews.asp?edid=90770&lt;/a&gt;. Last accessed on October 30th, 2012.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/icomm-2012-report'&gt;https://cis-india.org/a2k/blogs/icomm-2012-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-12-04T06:37:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/exploring-the-internals-of-mobile-devices">
    <title>Exploring the Internals of Mobile Devices — Report from a One-day Workshop at  TERI</title>
    <link>https://cis-india.org/a2k/blogs/exploring-the-internals-of-mobile-devices</link>
    <description>
        &lt;b&gt;On October 27, 2012, the Centre for Internet &amp; Society (CIS) organised a one-day workshop on exploring the internals of mobile technologies at the TERI Southern Regional Centre in Bangalore. The workshop received more than 140 registrants, of which approximately 40 attended. In this post, Jadine Lannon explores the discussions and the developments that took place at the workshop.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event brought together professional and non-professional individuals and communities interested in exploring mobile technologies. The aim of the workshop was the provide participants with the knowledge and tools to better understand the internals of mobile technologies as well as familiarize the attendees with CIS's "Pervasive Technologies" research project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anil Kumar Pugalia, Sudar Muthu and Pankaj Bharadiya were the expert speakers. The event was supported by the well-established online security, hardware and software domain communities NULL, SecurityXploaded, Computer Club India and Bangalore Android User Group.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sudar Muthu: Capabilities of Arduino&lt;/h3&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="356" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/14911204" width="427"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;div style="text-align: center; "&gt;&lt;b&gt;&lt;a href="http://www.slideshare.net/Sudar/capabilities-of-arduino-including-due" target="_blank" title="Capabilities of Arduino (including Due)"&gt;Capabilities of Arduino (including Due)&lt;/a&gt; from &lt;a href="http://www.slideshare.net/Sudar" target="_blank"&gt;Sudar Muthu&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Sudar Muthu began the workshop with a talk on the capabilities of  Arduino and the ways in which Arduino can be used to interface with  different external devices.&lt;/p&gt;
&lt;p&gt;He discussed with us different types of  Arduino, the technical specifications of Arduino, the ways that Arduino  can be used to interface with external boards and the interfacing that  he has been able to accomplish using Arduino and various devices.&lt;/p&gt;
&lt;p&gt;The slides from his Powerpoint presentation are viewable on the left.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Anil Kumar Pugalia: Mobile Hacking using Linux Drivers&lt;/h3&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Anil Kumar Pugalia followed Sudar's presentation with an exploration of methods of mobile hacking using Linux drivers.&lt;/p&gt;
&lt;p&gt;He discussed various Linux kernel hacking techniques as well as tools that can be used to perform reverse-engineering on a mobile device.&lt;/p&gt;
&lt;p&gt;The slides from Anil's presentation can be accessed on the right.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="356" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/14917053" width="427"&gt; &lt;/iframe&gt;
&lt;div style="text-align: center; "&gt;&lt;b&gt;&lt;a href="http://www.slideshare.net/anil_pugalia/mobile-hacking" target="_blank" title="Mobile Hacking using Linux Drivers"&gt;Mobile Hacking using Linux Drivers&lt;/a&gt; from &lt;a href="http://www.slideshare.net/anil_pugalia" target="_blank"&gt;Anil Kumar Pugalia&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The following two talks were delivered by Pankaj Bharadiya from Texas Instruments. In his first presentation, he explored hardware hacking and board/chips capabilities. His second talk was on porting open software on hardware. In addition to his discussions, he also covered porting Android on open hardware. The slides from his presentations will be posted shortly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After all the presentations, the participants were invited to handle and open up the 12 mobile devices that CIS purchased for our Pervasive Mobile Technologies research project. The participants worked in teams of two to five members to open up the mobile devices and observe their internals. We asked the participants to record any information about the internals of the mobiles that they were able to find, including the make, model, and serial numbers of the components. Pictures from this part of the workshop will be posted shortly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All of the collected information was recorded and distributed among the participants so that the group could continue to work on identifying the mobile internals and the various data sheets associated with each component. This data will be added to the specifications of each mobile device as it is collected. CIS hopes to continue to collaborate with the individuals and communities who participated in this workshop as well as other interested individuals who may have been unable to attend the one-day workshop to proceed with this process of identification. We also hope to hold a second event, a one- to two-day hackathon, sometime in December to continue the exploration of our mobile devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS would like to thank Anil Kumar Pagalia, Sudar Muthu, Pankaj Bharadiya, Khasim Syed Mohammed, Akash Mahajan (NULL representative), Amit Malik (SecurityXploaded representative), the NULL, SecurityXploaded, Bangalore Android User Group and Computer Club India communities, and all of the participants for making the workshop a huge success and aiding us in our ongoing research project!&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;You can reach participating communities at following links:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/11uCKM"&gt;http://bit.ly/11uCKM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/dByU6N"&gt;http://bit.ly/dByU6N&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For any further information on the past workshop or future events, please connect with us:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Jadine Lannon (&lt;a href="mailto:jadine@cis-india.org"&gt;jadine@cis-india.org&lt;/a&gt;), research intern for the A2K programme&lt;/li&gt;
&lt;li&gt;Amarjit Singh (&lt;a href="mailto:amarjitlife@gmail.com"&gt;amarjitlife@gmail.com&lt;/a&gt;), the Workshop Manager.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;i&gt;Click below for a slideshow of the pictures from the workshop&lt;/i&gt;:&lt;/p&gt;
&lt;ol&gt; 
&lt;hr /&gt;
&lt;p&gt;Photos&lt;iframe frameborder="0" height="400" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/15437161" width="476"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/exploring-the-internals-of-mobile-devices'&gt;https://cis-india.org/a2k/blogs/exploring-the-internals-of-mobile-devices&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2012-12-01T05:57:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1">
    <title>A Workshop on "Exploring the Internals of Mobile Technologies"</title>
    <link>https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society invites all individuals interested in investigating and exploring the internal of the Mobile/Hardware Technologies and understanding of capabilities of mobile phones to join our workshop on Saturday, October 27, 2012, at the TERI Southern Regional Centre.&lt;/b&gt;
        &lt;p&gt;&lt;b id="internal-source-marker_0.38347873743623495"&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="internal-source-marker_0.38347873743623495"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Objective:&lt;/b&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Bringing together the technical/hacker community and individuals interested in mobile devices to explore mobile devices internals and capabilities&lt;/p&gt;
&lt;h3&gt;Scope of Conference and Workshop:&lt;/h3&gt;
&lt;div&gt;Our proposed topics/areas which we hope to have discussions on are:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Hardware Hacking (Board/Chips Capabilities)&lt;/li&gt;
&lt;li&gt;Operating System Internals (Hardware/OS Interfacing)&lt;/li&gt;
&lt;li&gt;Software Development Kit (MRE, etc.)&lt;/li&gt;
&lt;li&gt;Forensic Analysis&lt;/li&gt;
&lt;li&gt;Understanding of Mobile as Telecommunication Device (2G/3G, etc.)&lt;/li&gt;
&lt;li&gt;Understanding Mobile/Devices Internals&lt;/li&gt;
&lt;li&gt;Working with JTAG/UART Ports&lt;/li&gt;
&lt;li&gt;Porting Open Softwares on Mobiles/Hardwares&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Expected outcomes:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Understanding of mobile devices internals and capabilities&lt;/li&gt;
&lt;li&gt;Documenting mobile devices capabilities and internals&lt;/li&gt;
&lt;li&gt;Publishing of blogs on knowledge generated&lt;/li&gt;
&lt;li&gt;Exploration/Speculation on research/development avenues&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Agenda &lt;/b&gt;&lt;/h3&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: left; "&gt;&lt;b&gt;I. Core Talks&lt;/b&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tea/Coffee: &lt;br /&gt;Time: 9:00 - 9:30 a.m.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;1. Arduino Board Capabilities and Playing Around It!&lt;/b&gt;&lt;br /&gt;Objective: Understanding Arduino board capabilities and playing with it&lt;br /&gt;Speaker: Sudar Muthu&lt;br /&gt;Level: Introduction&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 9:30 - 10:30 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;2. Initiatives@CIS&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Discussing the research initiative that has led CIS to become interested in mobile device internals and capabilities&lt;br /&gt;Speaker: Jadine Lannon&lt;br /&gt;Level: Introduction&lt;br /&gt;Duration: 10-15 Minutes&lt;br /&gt;Time: 10:30 - 10:45 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;3. Mobile Hacking Through Linux Drivers&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Understanding the Linux kernel &amp;amp; driver internals from the perspective of reverse engineering&lt;br /&gt;Speaker: Anil Kumar Pugalia&lt;br /&gt;Level: Intermediate to Advanced&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 10:45 - 11:45 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;4. Hardware Hacking (Board/Chips Capabilities)&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Discuss and explore key areas of mobile hardware&lt;br /&gt;(power, clock, pin multiplexing, peripherals, etc.)&lt;br /&gt;Speaker: Khasim Syed Mohammed&lt;br /&gt;Level: Introductory to Advanced&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 11:45 - 12:45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lunch Time&lt;br /&gt;Time: 12:45 - 1:30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;5. Porting Open Software on Hardware&lt;/b&gt;&lt;br /&gt;Objective:&lt;br /&gt;Cover porting examples for each type of peripherals&lt;br /&gt;Cover Android and Linux bringup as an example&lt;br /&gt;Speaker: Khasim Syed Mohammed&lt;br /&gt;Level: Intermediate to Advance&lt;br /&gt; Duration: 2 Hours&lt;br /&gt;Time: 1:30 - 3:30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th style="text-align: left; "&gt;&lt;b&gt;II.&lt;/b&gt;&lt;b&gt;Community Knowledge Sharing/Hacking! &lt;/b&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Time: 3.30 to 5.30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;5. Free Slot&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;6. Free Slot&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tea/Coffee Time&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;7. Free Slot&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;8. Free Slot&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;p dir="ltr"&gt;&lt;span class="Apple-tab-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;We are inviting community members to take up &lt;b&gt;Free Slots &lt;/b&gt;to share their knowledge in this section. In this section, any person can propose a talk, workshop, or speculation about any device for a duration 30 minutes to 1 hour, as long as the topic falls within broader scope of the focus areas described at the in the “Scope of the Conference and Workshop” section of the workshop objectives.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Venue, Dates and Logistics&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The event will take place on Saturday, October 27, 2012, at the following address:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="internal-source-marker_0.6882451646961272" style="text-align: start; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;TERI Southern Regional Centre&lt;br /&gt;4th Main, Domlur II Stage &lt;br /&gt;Bangalore - 560 071 &lt;br /&gt;Karnataka&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The event will be begin at 9 a.m. on Saturday and end in the evening around 5 p.m. Lunch and snacks will be provided by CIS.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Available Resources:&lt;br /&gt;&lt;/b&gt;CIS has purchased 12 gray-market mobile phones with the intent to document as much information about the life-cycles, hardware, software and content of each phone as possible. We request that the producers, make and model of each device be kept anonymous in discussions/publications that take place outside of the workshop.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 class="normal" style="text-align: justify; "&gt;The Speakers&lt;/h3&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;1. Anil Kumar Pugalia&lt;/b&gt;&lt;br /&gt;The author is a freelance trainer in Linux internals, Linux device drivers, embedded Linux &amp;amp; related topics. Prior to this, he was at Intel and Nvidia. He has been working with Linux since 1994. A gold medallist from IISc, Linux &amp;amp; knowledge sharing are two of his many passions. Creating and playing with open source hardware is one of his hobbies, which he materializes through his company eSrijan, which can be accessed at:&lt;a href="http://profession.sarika-pugs.com/"&gt;&lt;br /&gt;Website: &lt;/a&gt;&lt;a href="http://profession.sarika-pugs.com/"&gt;http://profession.sarika-pugs.com/&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt; 2. Jadine Lannon&lt;/b&gt;&lt;br /&gt;Jadine is a research intern at the Centre for Internet and Society. She is currently working on the “Pervasive Technologies: Access to Knowledge in the Marketplace” research project. More information on the research project can be found here: &lt;a href="https://cis-india.org/a2k/pervasive-technologies-access-to-knowledge-in-the-market-place"&gt;http://cis-india.org/a2k/pervasive-technologies-access-to-knowledge-in-the-market-place&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;3. Khasim Syed Mohammed&lt;/b&gt;&lt;br /&gt;Khasim leads Open Hardware and Software Initiatives at Texas Instruments. Blog: &lt;a href="http://www.khasim.in/"&gt;http://www.khasim.in/&lt;/a&gt;; &lt;a href="http://khasim.blogspot.in/"&gt;http://khasim.blogspot.in/&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;4. Sudar Muthu&lt;/b&gt;&lt;br /&gt;Sudar does open hardware as hobby; Arudino is his playground. He is passionate about programming (particularly web-based) and loves to design and build web sites/services from scratch. AJAX, Web2.0, Semantic Web, Comet, RDF or any of those latest buzz-field jargons.&lt;/p&gt;
&lt;p class="normal"&gt;Blog: &lt;a href="http://sudarmuthu.com/"&gt;http://SudarMuthu.com&lt;/a&gt;; &lt;a href="http://hardwarefun.com/"&gt;http://hardwarefun.com&lt;/a&gt;; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;b&gt;Supporting Communities:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;NULL: &lt;a href="http://null.co.in/"&gt;http://null.co.in/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;SecurityXploaded: &lt;a href="http://securityxploded.com/"&gt;http://securityxploded.com/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Computer Club India: &lt;a href="http://computerclub.in/Main_Page"&gt;http://computerclub.in/Main_Page&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="normal"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;b&gt;Register at:&lt;/b&gt;&lt;a href="https://docs.google.com/spreadsheet/viewform?fromEmail=true&amp;amp;formkey=dG1UcHBYR2xRLWhPZ0QwVWlaaEg0SXc6MQ"&gt; https://docs.google.com/spreadsheet/viewform?fromEmail=true&amp;amp;formkey=dG1UcHBYR2xRLWhPZ0QwVWlaaEg0SXc6MQ&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1'&gt;https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-10-25T06:52:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/001ChartforBlog.png">
    <title>001 Specifications Chart</title>
    <link>https://cis-india.org/a2k/blogs/001ChartforBlog.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/001ChartforBlog.png'&gt;https://cis-india.org/a2k/blogs/001ChartforBlog.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-11-27T04:25:34Z</dc:date>
   <dc:type>Image</dc:type>
   </item>




</rdf:RDF>
