Posts

by Sumandro Chattapadhyay last modified Mar 30, 2016 11:09 AM

Response to GCSC on Request for Consultation: Norm Package Singapore

by Arindrajit Basu, Gurshabad Grover and Elonnai Hickok — last modified Jan 27, 2019 03:43 PM

The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.

Response to GCSC on Request for Consultation: Norm Package Singapore - Read More…

India should reconsider its proposed regulation of online content

by Gurshabad Grover — last modified Jan 24, 2019 04:59 PM

The lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.

India should reconsider its proposed regulation of online content - Read More…

The DNA Bill has a sequence of problems that need to be resolved

by Shweta Mohandas and Elonnai Hickok — last modified Jan 15, 2019 02:36 AM

In its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.

The DNA Bill has a sequence of problems that need to be resolved - Read More…

How to make EVMs hack-proof, and elections more trustworthy

by Pranesh Prakash — last modified Jan 14, 2019 03:34 PM
January 14, 2019

Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didn’t let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?

How to make EVMs hack-proof, and elections more trustworthy - Read More…

Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services

by Gurshabad Grover — last modified Jan 11, 2019 04:01 PM
January 10, 2019

This submission presents a response to the Telecom Regulatory Authority of India’s Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services.

Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services - Read More…

Registering for Aadhaar in 2019

by Sunil Abraham — last modified Jan 03, 2019 02:59 PM
January 03, 2019

It is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.

Registering for Aadhaar in 2019 - Read More…

Economics of Cybersecurity: Literature Review Compendium

by Natalia Khaniejo — last modified Dec 31, 2018 01:57 AM
December 31, 2018

The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.

Economics of Cybersecurity: Literature Review Compendium - Read More…

Is the new ‘interception’ order old wine in a new bottle?

Is the new ‘interception’ order old wine in a new bottle?

by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare — last modified Dec 29, 2018 04:02 PM

The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.

Is the new ‘interception’ order old wine in a new bottle? - Read More…

Private-public partnership for cyber security

Private-public partnership for cyber security

by Arindrajit Basu — last modified Dec 26, 2018 03:02 PM
December 26, 2018

Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.

Private-public partnership for cyber security - Read More…

Mapping cybersecurity in India: An infographic

by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah — last modified Dec 23, 2018 04:57 PM
December 23, 2018

This infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue through our cybersecurity work at CIS.

Mapping cybersecurity in India: An infographic - Read More…

Document Actions