<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/surveillance-industry-india.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/Brochures.zip"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/surveillance-industry-india.pdf">
    <title>The Surveillance Industry in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/surveillance-industry-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/surveillance-industry-india.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/surveillance-industry-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T03:20:42Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf">
    <title>Policy Recommendations for Surveillance Law in India and an Analysis of Legal Provisions on Surveillance in India and the Necessary &amp; Proportionate Principles</title>
    <link>http://editors.cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T03:08:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf">
    <title>Mutual Legal Assistance Treaties (MLATs) and Cross Border Sharing of Information in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:45:24Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf">
    <title>Security, Surveillance and Data Sharing Schemes and Bodies in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:35:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment">
    <title>  Right to Information (RTI) Requests to BSNL and MTNL Regarding Security Equipment</title>
    <link>http://editors.cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment</link>
    <description>
        &lt;b&gt;As part of research, on July 2, 2013, the Centre for Internet and Society (CIS) had sent Right to Information (RTI) requests to two of the largest internet service providers (ISPs) in India: Mahanagar Telephone Nigam Limited (MTNL) and Bharat Sanchar Nigam Limited (BSNL) requesting answers to some questions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Answers to the following questions were requested:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Please list the companies from which MTNL/BSNL has bought all its security equipment.&lt;/li&gt;
&lt;li&gt;What type of security equipment does MTNL/BSNL use to assist Indian law enforcement agencies in detecting and preventing crime, terrorism and all other illegal activity? Please provide the certification for all such equipment.&lt;/li&gt;
&lt;li&gt;What malware does MTNL/BSNL test for? What does MTNL/BSNL use for testing malware in its networks?&lt;/li&gt;
&lt;li&gt;Which proxy server does MTNL/BSNL use and is it used for filtering data? If so, what type of data is being filtered and for what purpose? Is authorisation required and if so, by whom?&lt;/li&gt;
&lt;li&gt;Does MTNL/BSNL use FinFly ISP? If so, who authorises its use and under what conditions?&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;M. K. Sheda, the appellate authority of MTNL, responded to the above questions on August 3, 2013 with the following answers:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;MTNL procures all its equipment through an open competitive bidding process and the details of all past tenders are available on the MTNL website. Equipment from multiple vendors are operational in GSM MTNL Packet-Core Network and specific 	names cannot be given due to security reasons.&lt;/li&gt;
&lt;li&gt;MTNL uses the security equipment by the Department of Telecommunications, Government of India, to assist Indian law enforcement agencies. The details 	cannot be disclosed as the information is classified as "secret" as per MTNL IT Policy Revision 2.0 and also comes under Section -8 (1) (a) and (d) of the 	RTI Act 2005.&lt;/li&gt;
&lt;li&gt;MTNL GSM Packet Core equipment for data access uses MTNL ISP as its interface with external entities. Thus information is pertaining to MTNL ISP and hence a reply may please be taken from the GM (Broadband) unit.&lt;/li&gt;
&lt;li&gt;Same answer as "3" above.&lt;/li&gt;
&lt;li&gt;Same answer as "3" above.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;BSNL has still not responded to the above questions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click below to download the respective files:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/bsnl-rti-application-2013.pdf" class="external-link"&gt;RTI Application to BSNL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/reply-from-mtnl-to-rti-application.pdf" class="external-link"&gt;Reply from MTNL&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment'&gt;http://editors.cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI Application</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-25T15:04:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies">
    <title>Spreadsheet data on sample of 50 security companies</title>
    <link>http://editors.cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies'&gt;http://editors.cis-india.org/internet-governance/blog/data-on-surveillance-technology-companies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-02-28T16:13:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state">
    <title>Big Democracy, Big Surveillance: India's Surveillance State</title>
    <link>http://editors.cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state</link>
    <description>
        &lt;b&gt;In India, surveillance is on the rise by the state to tackle crime and terrorism, and private companies are eager to meet the demand.&lt;/b&gt;
        &lt;p&gt;This article by Maria Xynou was&lt;a class="external-link" href="http://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state"&gt; published by OpenDemocracy&lt;/a&gt; on 10 February 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Worried about the secret, mass surveillance schemes being carried out by the NSA? While we should be, some of the surveillance schemes in the world's largest democracy, India, are arguably&lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt; in the same league&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="http://www.amazon.com/Globalization-Surveillance-Armand-Mattelart/dp/0745645119"&gt;Surveillance is being globalised&lt;/a&gt; to the extent that even India, a country with huge poverty issues, is investing millions of dollars in creating an &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;expansive surveillance regime&lt;/a&gt;. However, why would communications monitoring interest Indian authorities, when the majority of the population lives below the line of poverty and &lt;a href="http://wearesocial.net/tag/india/"&gt;only 17% of the population&lt;/a&gt;&lt;a href="http://wearesocial.net/tag/india/"&gt; has access to the Internet&lt;/a&gt;?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The official political motivation behind surveillance in India appears to be the government's &lt;a href="http://digitaljournal.com/article/268467"&gt;determination to tackle terrorism&lt;/a&gt; in the country. The &lt;a href="http://edition.cnn.com/2013/09/18/world/asia/mumbai-terror-attacks/"&gt;2008 Mumbai terrorist attacks&lt;/a&gt; were arguably a similar landmark to the 9/11 terrorist attacks in the US, and both governments officially announced their intention to carry out surveillance as a counter-terrorism measure. However, unlike in the west, terrorist attacks in India are much more common, and the National Security Adviser reported in 2008 that 800 terrorist cells were operational in the country. With India’s history of &lt;a href="http://www.thenews.com.pk/Todays-News-2-210676-Major-terror-attacks-in-India-during-last-25-years"&gt;major terror attacks in India over the last 25 years&lt;/a&gt;, it's easy for one to be persuaded that terrorism is actually a major threat to national security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance schemes&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India’s surveillance programs mostly started following the 2008 Mumbai terror attacks. That was when the Ministry of Home Affairs first proposed the creation of a &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;National Intelligence Grid (NATGRID)&lt;/a&gt;, which will give &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;11 intelligence and investigative agencies real-time access to 21 citizen data sources&lt;/a&gt; to track terror activities. These citizen data sources will be provided by various ministries and departments, otherwise called “provider agencies”, and will include &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;bank account details, telephone records, passport data and vehicle registration details&lt;/a&gt;, among other types of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Home Affairs has &lt;a href="http://www.deccanherald.com/content/181065/mha-seeks-over-rs-3400.html"&gt;sought over Rs. 3,400 crore&lt;/a&gt; (around USD 540 million!) for the implementation of NATGRID, which aims to create comprehensive patterns of intelligence by collecting sensitive information from databases of departments like the police, banks, tax and telecoms to supposedly track any terror suspect and incident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But NATGRID is far from India's only data sharing scheme. In 2009 the Cabinet Committee on Economic Affairs approved the creation and implementation of the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Crime and Criminal Tracking Network &amp;amp; &lt;/a&gt;&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Systems&lt;/a&gt; (CCTNS), which would facilitate the sharing of databases among &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;14,000 police stations across all 35 states and Union Territories&lt;/a&gt; of India, excluding 6,000 police offices which are high in the police hierarchy. &lt;a href="http://www.thehindu.com/news/national/govt-launches-crime-tracking-pilot-project/article4272857.ece"&gt;Rs. 2,000 crore&lt;/a&gt; (around USD 320 million) have been allocated for the CCTNS, which is being implemented by the National Crime Records Bureau under the national e-governance scheme. The CCTNS not only increases transparency by automating the function of police stations, but also &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;provides the civil police with tools, technology and information&lt;/a&gt; to facilitate the investigation of crime and detection of criminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But apparently, sharing data and linking databases is not enough to track criminals and terrorists. As such, in the aftermath of the 2008 Mumbai terror attacks, the Indian government also implemented various interception systems. In September 2013&lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt; it was reported&lt;/a&gt; that the Indian government has been operating Lawful Intercept &amp;amp; Monitoring (LIM) systems, widely in secret. In particular, &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;mobile operators in India have deployed their own LIM systems&lt;/a&gt; allowing for the so-called “lawful interception” of calls by the government. And possibly to enable this, mobile operators are required to provide &lt;a href="http://telecomtalk.info/dot-tightens-norms-no-mobile-connection-without-physical-verification/102120/"&gt;subscriber verification&lt;/a&gt; to the Telecom Enforcement, Resource and Monitoring (TERM) cells of the Department of Telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Internet traffic, the LIM systems are deployed at the &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;international gateways of large Internet Service Providers (ISPs) &lt;/a&gt;and expand to a broad search across all Internet traffic using “keywords” and “key-phrases”. In other words, security agencies using LIM systems are capable of launching a search for suspicious words, resulting in the indiscriminate monitoring of all Internet traffic, possibly without court oversight and without the knowledge of ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has also automated and centralized the interception of communications through the &lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System (CMS)&lt;/a&gt;. This project was initially envisioned in 2009, following the 2008 Mumbai terror attacks and was approved in 2011.  The CMS intercepts all telecommunications in India and &lt;a href="http://editors.cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about"&gt;centrally stores the data in national and regional databases&lt;/a&gt;. The CMS will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. &lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Agencies&lt;/a&gt; which will have access to the CMS include the Intelligence Bureau (IB), the Central Bureau of Investigation (CBI), the Directorate of Revenue Intelligence (DRI), the Research and Analysis Wing (RAW) and the National Investigation Agency (NIA).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike mainstream interception, where service providers are required to intercept communications and provision interception requests to law enforcement agencies, the Central Monitoring System will automate the entire process of interception. This means that the CMS authority will have centralized access to all intercepted data and that the authority can also bypass service providers in gaining such access. Once security agencies have access to this data, they are equipped with &lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Direct Electronic Provisioning, filters and alerts on the target numbers&lt;/a&gt;, as well as with Call Details Records (CDR) analysis and data mining tools to identify the personal information of target numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that roughly &lt;a href="http://wearesocial.net/tag/india/"&gt;73% of India's population uses mobile phones&lt;/a&gt;, this means that the Central Monitoring System can potentially affect about 893 million people, more than double the population of the United States! However, how is it even possible for Indian authorities to mine the data of literally millions of people? Who supplies Indian authorities with the technology to do this and what type of technology is actually being used?&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance industry&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has the world's second largest population, consisting of more than a billion people and an expanding middle class. Undoubtedly, India is a big market and many international companies aspire in investing in the country. Unfortunately though, along with everything else being imported into India, surveillance technologies are no exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the biggest and most notorious surveillance technology companies in the world, such as ZTE, Utimaco and Verint, have offices in India. Even &lt;a href="https://citizenlab.org/2013/04/for-their-eyes-only-2/"&gt;FinFisher command and control servers&lt;/a&gt; have been found in India. However, in addition to allowing foreign surveillance technology companies to create offices and to sell their products and solutions in the country, local companies selling controversial spyware appear to be on the rise too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kommlabs Dezign is an Indian company which loves to show off its Internet monitoring solutions at&lt;a href="http://www.kommlabs.com/events.asp"&gt; various ISS trade shows&lt;/a&gt;, otherwise known as &lt;a href="http://www.wired.com/beyond_the_beyond/2011/12/at-the-wiretappers-ball/"&gt;“the Wiretapper's Ball”&lt;/a&gt;. In particular, Kommlabs Dezign sells VerbaNET, an Internet Interception Solution, as well as VerbaCENTRE, which is a Unified Monitoring Centre that can even detect cognitive and emotional stress in voice calls and flag them! In other words, Kommlabs Dezign makes a point that not only should we worry about what we text and say over our phones, but that we should also worry about what we sound like when on the phone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vehere is another Indian company which sells various surveillance solutions and notably sells vCRIMES, which is a Call Details Records (CDR) analysis system. VCRIMES is used to analyse and gather intelligence and to unveil hidden interconnections and relations through communications. This system also includes a tool for detecting sleeper cells through advanced statistical analysis and &lt;a href="http://www.veheretech.com/products/vcrimes/"&gt;can analyse more than 40 billion records in less than 3 seconds&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.paladion.net/"&gt;Paladion Networks&lt;/a&gt; is headquartered in Bangalore, India and sells various Internet Monitoring Systems, Telecom Operator Interception Systems, SSL Interception and Decryption Systems and Cyber Cafe Monitoring Systems to law enforcement agencies in India and abroad. In fact, Paladion Networks even states in its website that its &lt;a href="http://www.paladion.net/client_list.html"&gt;customers include India's Ministry of Information Technology and the U.S Department of Justice&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail Technologies is yet another Indian company which not only &lt;a href="http://www.issworldtraining.com/iss_europe/sponsors.html"&gt;sponsors global surveillance trade shows&lt;/a&gt; but also sells a wide range of monitoring solutions to law enforcement agencies in India and abroad. ComTrail is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;centralised mass interception and monitoring of voice and data networks&lt;/a&gt;, including Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls. Furthermore, ComTrail is equipped to handle millions of communications per day, correlating identities across multiple networks, and can instantly analyse data across thousands of terabytes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail also sells xTrail, which is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;targeted interception, decoding and analysis of data traffic over IP networks&lt;/a&gt; and which enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. Interestingly, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apparently, some the biggest challenges that law enforcement agencies face when monitoring communications include cases when targets operate from public Internet networks and/or use encryption. However, it turns out that ClearTrail's QuickTrail solution is designed to &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;gather intelligence from public Internet networks&lt;/a&gt;, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. This device can remotely deploy spyware into a target's computer and supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, QuickTrail can identify a target machine on the basis of metadata, such as an IP address, and can monitor Ethernet LANs in real time, as well as monitor Gmail, Yahoo and all other HTTPS-based communications. ClearTrail's mTrail is designed for the passive &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;'off-the-air' interception of GSM communications&lt;/a&gt;, including the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information. MTrail also identifies a target's location by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation of so-called “lawfully intercepted” calls in near real-time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, it looks like India is reaching the top league when it comes to surveillance technologies, especially since many of its companies and their products appear to be just as scary as some of the most sophisticated spying gear sold by the West. India may be the world's largest (by population) democracy, but that means that it has a huge population with way too many opinions...and apparently, the private and public sectors in India appear to be joining forces to do something about it.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So do Indians have nothing to hide?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A very popular rhetoric in both India and the west is that citizens should &lt;i&gt;not&lt;/i&gt; be concerned about surveillance because, after all, if they are not terrorists, they should have nothing to hide. However, privacy advocate &lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;Caspar Bowden&lt;/a&gt; has rightfully stated that this rhetoric is fundamentally flawed and that we should all indeed “have something to hide”. But is privacy just about “having something to hide”? &lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;Jacob Appelbaum&lt;/a&gt; has stated that this rhetoric is merely a psychological copying mechanism when dealing with security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's probably rather comforting and reassuring to think that we are not special or important enough for surveillance to affect us personally. But is that really up to us to decide? Unfortunately not. The very point of data mining is to match patterns, create profiles of individuals and to unveil hidden interconnections and relations. A data analyst can uncover more information about us than what we are even aware of and it is they who decide if our data is “incriminating” or not. Or even worse: in many cases it's up to &lt;i&gt;data mining software&lt;/i&gt; to decide how “special” or “important” we are. And unfortunately, technology is &lt;i&gt;not&lt;/i&gt; infallible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The world's largest democracy, which is also &lt;a href="http://www.hindustantimes.com/india-news/india-less-corrupt-than-pakistan-ranks-94th-in-world-survey/article1-1158513.aspx"&gt;one of the most corrupt countries in the world&lt;/a&gt;, is implementing many controversial surveillance schemes which lack transparency, accountability and adequate legal backing, and which are largely being carried out in secret. And to make matters worse, India lacks privacy legislation. Over a billion people in a democratic regime are exposed to inadequately regulated surveillance schemes, while a local surveillance industry is thriving without any checks or balances whatsoever. What will this mean for the global future of democracy?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state'&gt;http://editors.cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-02-28T10:35:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about">
    <title>India's Central Monitoring System (CMS): Something to Worry About?</title>
    <link>http://editors.cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou presents new information about India's controversial Central Monitoring System (CMS) based on official documents which were shared with the Centre for Internet and Society (CIS). Read this article and gain an insight on how the CMS actually works!&lt;/b&gt;
        
&lt;p style="text-align: justify; "&gt;The idea of a Panoptikon, of monitoring all communications in India and centrally storing such data is not new. It was first envisioned in 2009, following the 2008 Mumbai terrorist attacks. As such, the Central Monitoring System (CMS) started off as &lt;span class="internal-link"&gt;a project run by the Centre for Communication Security Research and Monitoring (CCSRM)&lt;/span&gt;, along with the Telecom Testing and Security Certification (TTSC) project.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Central Monitoring System (CMS), which was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/"&gt;largely covered by the media in 2013&lt;/a&gt;, was actually &lt;span class="internal-link"&gt;approved by the Cabinet Committee on Security (CCS) on 16th June 2011&lt;/span&gt; and the pilot project was completed by 30th September 2011. Ever since, the CMS has been operated by India's Telecom Enforcement Resource and Monitoring (TERM) cells, and has been implemented by the Centre for Development of Telematics (C-DOT), which is an Indian Government owned telecommunications technology development centre. The CMS has been implemented in three phases, each one taking about 13-14 months. As of June 2013, &lt;span class="internal-link"&gt;government funding of the CMS has reached at least Rs. 450 crore&lt;/span&gt; (around $72 million).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In order to require Telecom Service Providers (TSPs) to intercept all telecommunications in India as part of the CMS, &lt;a href="http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment" class="internal-link"&gt;clause 41.10 of the Unified Access Services (UAS) License Agreement was amended&lt;/a&gt; in June 2013. In particular, the amended clause includes the following:&lt;/p&gt;
&lt;blockquote class="italized"&gt;“&lt;i&gt;But, in case of Centralized Monitoring System (CMS), Licensee shall provide the connectivity upto the nearest point of presence of MPLS (Multi Protocol Label Switching) network of the CMS at its own cost in the form of dark fibre with redundancy. If dark fibre connectivity is not readily available, the connectivity may be extended in the form of 10 Mbps bandwidth upgradeable upto 45 Mbps or higher as conveyed by the Governemnt, till such time the dark fibre connectivity is established. However, LICENSEE shall endeavor to establish connectivity by dark optical fibre at the earilest. From the point of presence of MPLS network of CMS onwards traffic will be handled by the Government at its own cost.”&lt;/i&gt;&lt;/blockquote&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, &lt;span class="internal-link"&gt;draft Rule 419B&lt;/span&gt; under Section 5(2) of the Indian Telegraph Act, 1885, allows for the disclosure of “message related information” / Call Data Records (CDR) to Indian authorities. &lt;a class="external-link" href="http://books.google.gr/books?id=dO2wCCB7w9sC&amp;amp;pg=PA111&amp;amp;dq=%22Call+detail+record%22&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ei=s-iUUO6gHseX0QGXzoGADw&amp;amp;redir_esc=y#v=onepage&amp;amp;q=%22Call%20detail%20record%22&amp;amp;f=false"&gt;Call Data Records&lt;/a&gt;, otherwise known as Call Detail Records, contain metadata (data about data) that describe a telecomunication transaction, but not the content of that transaction. In other words, Call Data Records include data such as the phone numbers of the calling and called parties, the duration of the call, the time and date of the call, and other such information, while excluding the content of what was said during such calls. According to &lt;span class="internal-link"&gt;draft Rule 419B&lt;/span&gt;, directions for the disclosure of Call Data Records can only be issued on a national level through orders by the Secretary to the Government of India in the Ministry of Home Affairs, while on the state level, orders can only be issued by the Secretary to the State Government in charge of the Home Department.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Other than this draft Rule and the &lt;a href="http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment" class="internal-link"&gt;amendment to clause 41.10 of the UAS License Agreement&lt;/a&gt;, no law exists which mandates or regulates the Central Monitoring System  (CMS). This mass surveillance system is merely regulated under Section 5(2) of the &lt;a class="external-link" href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian Telegraph Act, 1885&lt;/a&gt;, which empowers the Indian Government to intercept communications on the occurence of any “public emergency” or in the interest of “public safety”, when it is deemed “necessary or expedient” to do so in the following instances:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;the interests of the 	sovereignty and integrity of India&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;the security of the 	State&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;friendly relations 	with foreign states&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;public order&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;for preventing 	incitement to the commission of an offense&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;However, Section 5(2) of the Indian Telegraph Act, 1885, appears to be rather broad and vague, and fails to explicitly regulate the details of how the Central Monitoring System (CMS) should function.  As such, the CMS appears to be inadequately regulated, which raises many questions with regards to its potential misuse and subsequent violation of Indian's right to privacy and other human rights.&lt;/p&gt;

&lt;h2&gt;&lt;b&gt;So how does the Central Monitoring System (CMS) actually work?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;We have known for quite a while now that the Central Monitoring System (CMS) gives India's security agencies and income tax officials centralized &lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system" class="external-link"&gt;access to the country's telecommunications network&lt;/a&gt;. The question, though, is how.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Well, prior to the CMS, all service providers in India were required to have &lt;a class="external-link" href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;Lawful Interception Systems&lt;/a&gt; installed at their premises in order to carry out targeted surveillance of individuals by monitoring communications running through their networks. Now, in the CMS era, all TSPs in India are &lt;span class="internal-link"&gt;required to integrate Interception Store &amp;amp; Forward (ISF) servers with their pre-existing Lawful Interception Systems&lt;/span&gt;. Once ISF servers are installed in the premises of TSPs in India and integrated with Lawful Interception Systems, they are then connected to the Regional Monitoring Centres (RMC) of the CMS. Each Regional Monitoring Centre (RMC) in India is connected to the Central Monitoring System (CMS). In short, the CMS involves the collection and storage of data intercepted by TSPs in central and regional databases.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In other words, all data intercepted by TSPs is automatically transmitted to Regional Monitoring Centres, and subsequently automatically transmitted to the Central Monitoring System. This means that not only can the CMS authority have centralized access to all data intercepted by TSPs all over India, but that &lt;a href="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2" class="internal-link"&gt;the authority can also bypass service providers in gaining such access&lt;/a&gt;. This is due to the fact that, unlike in the case of so-called “lawful interception” where the nodal officers of TSPs   are notified about interception requests, the CMS allows for data to be automatically transmitted to its datacentre, without the involvement of TSPs.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The above is illustrated in the following chart:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;img src="http://editors.cis-india.org/chart_11.png" title="CMS chart" height="372" width="689" alt="CMS chart" class="image-inline" /&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The interface testing of TSPs and their Lawful Interception Systems has already been completed and, as of June 2013, &lt;span class="internal-link"&gt;70 ISF servers have been purchased for six License Service Areas&lt;/span&gt; and are being integrated with the Lawful Interception Systems of TSPs. The Centre for Development of Telematics has already fully installed and integrated two ISF servers in the premises of two of India's largest service providers: MTNL and Tata Communications Limited.  In Delhi, ISF servers which connect with the CMS have been installed for all TSPs and testing has been completed. In Haryana, three ISF servers have already been installed in the premises of TSPs and the rest of currently being installed. In Chennai, five ISF servers have been installed so far, while in Karnataka, ISF servers are currently being integrated with the Lawful Interception Systems of the TSPs in the region.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Centre for Development of Telematics plans to &lt;span class="internal-link"&gt;integrate ISF servers which connect with the CMS in the premises of service providers &lt;/span&gt;in the following regions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Delhi&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Maharashtra&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Kolkata&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Uttar Pradesh (West)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Andhra Pradesh&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Uttar Pradesh (East)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Kerala&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Gujarat&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Madhya Pradesh&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Punjab&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Haryana&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;With regards to the UAS License Agreement that TSPs are required to comply with, &lt;a href="http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment" class="internal-link"&gt;amended clause 41.10&lt;/a&gt; specifies certain details about how the CMS functions. In particular, the amended clause mandates that TSPs in India will provide connectivity upto the nearest point of presence of MPLS (Multi Protocol Label Switching) network of the CMS at their own cost and in the form of dark optical fibre. From the MPLS network of the CMS onwards, traffic will be handled by the Government at its own cost. It is noteworthy that a &lt;span class="internal-link"&gt;Memorandum of Understanding (MoU) for MPLS connectivity&lt;/span&gt; has been signed with one of India's largest ISPs/TSPs: BSNL. In fact, &lt;span class="internal-link"&gt;Rs. 4.8 crore have been given to BSNL&lt;/span&gt; for interconnecting 81 CMS locations of the following License Service Areas:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Delhi&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Mumbai&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Haryana&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Rajasthan&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Kolkata&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Karnataka&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Chennai&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Punjab&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment" class="internal-link"&gt;Clause 41.10 of the UAS License Agreement&lt;/a&gt; also mandates that the hardware and software required for monitoring calls will be engineered, provided, installed and maintained by the TSPs at their own cost. This implies that TSP customers in India will likely have to pay for more expensive services, supposedly to “increase their safety”. Moreover, this clause mandates that TSPs are required to monitor &lt;i&gt;at least 30 simultaneous calls&lt;/i&gt; for each of the nine designated law enforcement agencies. In addition to monitored calls, clause 41.10 of the UAS License Agreement also requires service providers to make the following records available to Indian law enforcement agencies:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Called/calling party 	mobile/PSTN numbers&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Time/date and 	duration of interception&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Location of target 	subscribers (Cell ID &amp;amp; GPS)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Data records for 	failed call attempts&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;CDR (Call Data 	Records) of Roaming Subscriber&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Forwarded telephone 	numbers by target subscriber&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Interception requests from law enforcement agencies are provisioned by the CMS authority, which has access to the intercepted data by all TSPs in India and which is stored in a central database. As of June 2013, &lt;span class="internal-link"&gt;80% of the CMS Physical Data Centre has been built so far&lt;/span&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, the CMS replaces the existing manual system of interception and monitoring to an automated system, which is operated by TERM cells and implemented by the Centre for Development of Telematics. &lt;span class="internal-link"&gt;Training has been imparted to the following law enforcement agencies&lt;/span&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Intelligence Bureau 	(IB)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Central Bureau of 	Investigation (CBI)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Directorate of 	Revenue Intelligence (DRI)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Research &amp;amp; 	Analysis Wing (RAW)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;National 	Investigation Agency (NIA)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Delhi Police&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;&lt;b&gt;And should we even be worried about the Central Monitoring System?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Well, according to the &lt;a href="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2" class="internal-link"&gt;brief material for the Honourable MOC and IT Press Briefing&lt;/a&gt; on 16th July 2013, we should &lt;i&gt;not&lt;/i&gt; be worried about the Central Monitoring System. Over the last year, &lt;a class="external-link" href="http://www.livemint.com/Politics/pR5zc8hCD1sn3NWQwa7cQJ/The-new-surveillance-state.html"&gt;media reports&lt;/a&gt; have expressed fear that the Central Monitoring System will infringe upon citizen's right to privacy and other human rights. However,&lt;a href="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2" class="internal-link"&gt; Indian authorities have argued that the Central Monitoring System will &lt;i&gt;better protect&lt;/i&gt; the privacy of individuals &lt;/a&gt;and maintain their security due to the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The CMS will &lt;i&gt;just 	automate&lt;/i&gt; the existing process of interception and monitoring, 	and all the existing safeguards will continue to exist&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The interception and 	monitoring of communications will continue to be in accordance with 	Section 5(2) of the Indian Telegraph Act, 1885, read with Rule 419A&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The CMS will enhance 	the privacy of citizens, because it will no longer be necessary to 	take authorisation from the nodal officer of the Telecom Service 	Providers (TSPs) – who comes to know whose and which phone is 	being intercepted&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The CMS authority 	will provision the interception requests from law enforcement 	agencies and hence, a complete check and balance will be ensured, 	since the provisioning entity and the requesting entity will be 	different and the CMS authority will not have access to content data&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="JUSTIFY"&gt;A non-erasable 	command log of all provisioning activities will be maintained by the 	system, which can be examined anytime for misuse and which provides 	an additional safeguard&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p align="JUSTIFY"&gt;While some of these arguments may potentially allow for better protections, I personally fundamentally disagree with the notion that a centralised monitoring system is something not to worry about. But let's start-off by having a look at the above arguments.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The first argument appears to imply that the pre-existing process of interception and monitoring was  privacy-friendly or at least “a good thing” and that existing safeguards are adequate. As such, it is emphasised that the process of interception and monitoring will &lt;i&gt;“just” &lt;/i&gt;be automated, while posing no real threat. I fundamentally disagree with this argument due to several reasons. First of all, the pre-existing regime of interception and monitoring appears to be rather problematic because India lacks privacy legislation which could safeguard citizens from potential abuse. Secondly, the very interception which is enabled through various sections of the &lt;a class="external-link" href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information Technology (Amendment) Act, 2008&lt;/a&gt;, and the &lt;a class="external-link" href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian Telegraph Act, 1885&lt;/a&gt;, potentially &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?283149"&gt;infringe upon individual's right to privacy&lt;/a&gt; and other human rights.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;May I remind you of &lt;a class="external-link" href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Section 69 of the Information Technology (Amendment) Act, 2008&lt;/a&gt;, which allows for the interception of all information transmitted through a computer resource and which requires users to assist authorities with the decryption of their data, if they are asked to do so, or  face a jail sentence of up to seven years. The debate on the constitutionality of the various sections of the law which allow for the interception of communications in India is still unsettled, which means that the pre-existing interception and monitoring of communications remains an &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_php=true&amp;amp;_type=blogs&amp;amp;_r=0"&gt;ambiguous matter&lt;/a&gt;. And so, while the interception of communications in general is rather concerning due to dracodian sections of the law and due to the absence of privacy legislation, automating the process of interception does not appear reassuring at all. On the contrary, it seems like something in the lines of: “We have already been spying on you. Now we will just be doing it quicker and more efficiently.”&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The second argument appears inadequate too. &lt;a class="external-link" href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Section 5(2) of the Indian Telegraph Act, 1885&lt;/a&gt;, states that the interception of communications can be carried out on the occurence of a “public emergency” or in the interest of “public safety” when it is deemed “necessary or expedient” to do so under certain conditions which were previously mentioned. However, this section of the law does not mandate the establishment of the Central Monitoring System, nor does it regulate how and under what conditions this surveillance system will function. On the contrary, Section 5(2) of the Indian Telegraph Act, 1885, clearly mandates &lt;i&gt;targeted&lt;/i&gt; surveillance, while the Central Monitoring System could potentially undertake &lt;i&gt;mass&lt;/i&gt; surveillance. Since the process of interception is automated and, under clause 41.16 of the &lt;a class="external-link" href="http://www.dot.gov.in/sites/default/files/DOC270613-013.pdf"&gt;Unified License (Access Services) Agreement&lt;/a&gt;, service providers are required to provision at least 3,000 calls for monitoring to nine law enforcement agencies, it is likely that the CMS undertakes mass surveillance. Thus, it is unclear if the very nature of the CMS falls under Section 5(2) of the Indian Telegraph Act, 1885, which mandates targeted surveillance, nor is it clear that such surveillance is being carried out on the occurence of a specific “public emergency” or in the interest of “public safety”. As such, the vagueness revolving around the question of whether the CMS undertakes targeted or mass surveillance means that its legality remains an equivocal matter.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;As for the third argument, it is not clear how &lt;a href="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2" class="internal-link"&gt;bypassing the nodal officers of TSPs&lt;/a&gt; will enhance citizen's right to privacy. While it may potentially be a good thing that nodal officers will not always be aware of whose information is being intercepted, that does not guarantee that those who do have access to such data will not abuse it. After all, the CMS appears to be largely unregulated and India lacks privacy legislation and all other adequate legal safeguards. Moreover, by bypassing the nodal officers of TSPs, the opportunity for unauthorised requests to be rejected will seize to exist. It also implies an increased centralisation of intercepted data which can potentially create a centralised point for cyber attacks. Thus, the argument that the CMS authority will monopolise the control over intercepted data does not appear reassuring at all. After all, who will watch the watchmen?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While the fourth argument makes a point about &lt;a href="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2" class="internal-link"&gt;differentiating the provisioning and requesting entities&lt;/a&gt; with regards to interception requests, it does not necessarily ensure a complete check and balance, nor does it completely eliminate the potential for abuse. The CMS lacks adequate legal backing, as well as a framework which would ensure that unauthorised requests are not provisioned.  Thus, the recommended chain of custody of issuing interception requests does not necessarily guarantee privacy protections, especially since a legal mechanism for ensuring checks and balances is not in place.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, this argument states that the &lt;a href="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2" class="internal-link"&gt;CMS authority will not have access to content data&lt;/a&gt;, but does not specify if it will have access to metadata. What's concerning is that &lt;a href="http://editors.cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata" class="external-link"&gt;metadata can potentially be more useful for tracking individuals than content data&lt;/a&gt;, since it is ideally suited to automated analysis by a computer and, unlike content data which shows what an individuals says (which may or may not be true), metadata shows what an individual does. As such, metadata can potentially be more “harmful” than content data, since it can potentially provide concrete patterns of an individual's interests, behaviour and interactions. Thus, the fact that the CMS authority might potentially have access to metadata appears to tackle the argument that the provisioning and requesting entities will be seperate and therefore protect individual's privacy.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The final argument appears to provide some promise, since &lt;a href="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2" class="internal-link"&gt;the maintenance of a command log of all provisioning activities&lt;/a&gt; could potentially ensure some transparency. However, it remains unclear who will maintain such a log, who will have access to it, who will be responsible for ensuring that unlawful requests have not been provisioned and what penalties will be enforced in cases of breaches. Without an independent body to oversee the process and without laws which predefine strict penalties for instances of misuse, maintaining a command log does not necessarily safeguard anything at all. In short, the above arguments in favour of the CMS and which support the notion that it enhances individual's right to privacy appear to be inadequate, to say the least.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In contemporary democracies, most people would agree that freedom is a fundamental human right.  The right to privacy should be equally fundamental, since it &lt;a class="external-link" href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;protects individuals from abuse by those in power&lt;/a&gt; and is integral in ensuring individual liberty. India may literally be the largest democracy in the world, but it lacks privacy legislation which establishes the right to privacy, which guarantees data protection and which safeguards individuals from the potentially unlawful interception of their communications. And as if that is not enough, India is also carrying out a surveillance scheme which is largely unregulated. As such, it is highly recommended that India establishes a privacy law now.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;If we do the math, here is what we have: a country with extremely high levels of corruption, no privacy law and an unregulated surveillance scheme which lacks public and parliamentary debate prior to its implementation. All of this makes it almost impossible to believe that we are talking about a democracy, let alone the world's largest (by population) democracy! Therefore, if Indian authorities are interested in preserving the democratic regime they claim to be a part of, I think it would be highly necessary to halt the Central Monitoring System and to engage the public and the parliament in a debate about it.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;After all, along with our right to privacy, freedom of expression and other human rights...our right to freedom from suspicion appears to be at stake.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;i&gt;How can we not be worried about the Central Monitoring System?&lt;/i&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Centre for Internet and Society (CIS) is in possession of the documents which include the information on the Central Monitoring System (CMS) as analysed in this article, as well as of the draft Rule 419B under the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about'&gt;http://editors.cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2014-02-22T13:50:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment">
    <title>UAS License Agreement Amendment regarding the Central Monitoring System (CMS)</title>
    <link>http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment'&gt;http://editors.cis-india.org/internet-governance/blog/uas-license-agreement-amendment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2014-01-30T12:43:56Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2">
    <title>New Document on India's Central Monitoring System (CMS) - 2</title>
    <link>http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2'&gt;http://editors.cis-india.org/internet-governance/blog/new-cms-doc-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2014-01-30T12:40:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign">
    <title>Interview with Mathew Thomas from the Say No to UID campaign - UID Court Cases</title>
    <link>http://editors.cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) recently interviewed Mathew Thomas from the Say No to UID campaign about his ongoing efforts to challenge the UID scheme legally in the Bangalore High Court and Supreme Court of India. Read this interview and gain an interesting insight on recent legal developments with regards to the UID!&lt;/b&gt;
        
&lt;h3&gt;&lt;b&gt;Hi Mathew! We've heard that you've been in court a lot over the last few years with regards to the UID scheme. Could you please tell us about the UID case you have filed?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;In early 2012, I filed a civil suit at the Bangalore Court to declare the UID scheme illegal and to stop further biometric enrollments. I alleged that foreign agencies are involved in the process of biometric enrollment, and that cases of corruption have occurred with regards to the companies contracted by the UID Authority of India (UIDAI). Many dubious companies have been empanelled  for biometric enrollments by the UIDAI and many cases of corruption have been noted, especially with regards to the preparation of biometric databases for below poverty line (BPL) ration cards in Karnataka.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;In 2010, according to a government audit report, COMAT Technologies Private Limited had a contract with the Karnataka Government and was required to undertake a door-to-door survey and to set up biometric devices. COMAT Technologies Private Limited was paid ₹ 542.3 million for this purpose, but it turns out that the company did not comply with the terms of the contract and did not fullfill its obligations under the contract. Even though COMAT Technologies Private Limited had been contracted and had been paid ₹ 542.3 million, the company did not hand over any biometric device to the Karnataka Government. Instead, when the company got questioned, it walked away from the contract in 2010, even though it had been paid for a service it did not deliver.&lt;/p&gt;

&lt;p style="text-align: justify; "&gt;In the same year, 2010, COMAT Technologies was empanelled as an Enrolling Agency of the UIDAI. COMAT Technologies also carries out enrollments in Mysore and a TV  channel sting operation revealed that fake IDs were being issued in the  Mysore enrollment center. After much persuasion, the e-Government department of Karnataka informed me that they have filed an FIR. And this is just one case of a corrupt company empanelled as an enrollement agency with the UIDAI. Many similar cases with other companies have occurred in other cities in India, such as Mumbai, where the empanelled agencies have committed fraud and police complaints have been filed. But unfortunately, there is no publicly available information on the state of the investigations.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;As such, I filed a case at the Bangalore Court and stated that the whole UID system is insecure, that it will not achieve the objective of preventing leakages of welfare subsidies and that, therefore, it is a waste of public funds, which also affects individuals' right to privacy and right to life. In my complaint in the civil court I made allegations of corruption and dangers to national security backed by documentary evidence. According to Order 8 of the Civil Procedure Code (CPC), defendants are required to specifically deny each of the allegations against them and if they don't, the court is required to accept the allegations as accurate. According to law, vague, bald denials are not acceptable in courts. Interestingly enough, the defendants in this court case did &lt;i&gt;not&lt;/i&gt; deny any of the allegations, but instead stated that they (allegations) are “trivial” and requested the judge to dismiss the case without a trial. The judge requested the defendants to file a written application, asking for the suit to be dismissed under Order 7, Rule 11, of the Civil Procedure Code. Nonetheless, in May 2012, the judge observed that this is a serious case which should not be dismissed and that he would like to have a daily hearing of the case, especially since the case was grounded on the allegation that thousands of crores of rupees of public money are spent every day.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;However, one month later in June 2012, the judge dismissed the case by stating that I did not have a “cause of action” and that the case is not of civil nature under Section 9 of the Code of Civil Procedure. I argued that tax payers have a right to know where their money is going and that we all have a right to privacy and that therefore, I &lt;i&gt;did&lt;/i&gt; have a cause for action. I quoted the Supreme Court case setting out the law relating to the meaning of “civil nature”. The Apex court said, “Anything which is not of criminal nature is of civil nature”. I also quoted several court precedents which explained conditions under which complaints could be dismissed under Order VII Rule 11. Unfortunately though, the judge dismissed all of this and  suggested that I should take this case to the High Court or to the Supreme Court, since the Bangalore Court did not have the authority to address the violation of fundamental human rights. In my opinion, the fallacy in this judgement was that, on the one hand, the judge stated in his order that there was “no cause for action”, but on the other hand, he said that I should take the case to the High Court or to the Supreme Court! And on top of that, the judge stated that my case was frivolous and levied on me a Rs. 25, 000 fine, because apparently I was “wasting the court's time” !&lt;/p&gt;
&lt;p align="JUSTIFY" class="western"&gt;In addition to all of this, the judge made a very intriguing statement in his order: he claimed that the biometric enrollment with the UIDAI is voluntary and that therefore I need not enrol. I argued that although the UID is voluntary in theory, it is actually mandatory on many levels, especially since access to many governmental services require enrollment with the UIDAI. Nonetheless, the judge insisted that the UID is purely voluntary and that if I am not happy with the UID, then I should just “stay at home”.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;And how did the case continue thereafter?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;In October 2012 I appealed against this to the High Court by stating that there was a misapplication of Order 7, Rule 11, of the Civil Procedure Code and requested the High Court to send the suit back for trial at the Bangalore Court.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Now, when you appeal in India, the Court has to issue notices to the opposite party, which are usually sent by registered post. However, nothing was happening, so I filed a number of applications to hear the case. The registrar’s office filed a number of trivial “objections” with which I needed to comply and this took three months, until January 2013. For example, one “objection” was that the lower court order stated the date of the order as "03-07-12", whereas I had mentioned the date as 3 July 2012.  Then they would argue that the acknowledgement of the receipt of the notice from the respondents was not received. The High Court is located next to the head post office (GPO) in Bangalore and normally it would be sent there, then directly to the GPO in Delhi and from there to the Planning Commission or to the UIDAI. Yet, the procedure was delayed because apparently the notices weren't sent. In one hearing, the court clerk said that the address of the defendant was wrong and that the address of the Planning Commission should also be included. All in all, it seemed to me like there was some deliberate attempt to delay the procedure and the dismissal of the case by the Bangalore Court seemed very questionable. As a result, in January 2013, I asked the High Court to permit me to personally hand over my appeal to the Government Council. And finally, on 17th December 2013, my appeal was heard by the Bangalore High Court!&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Over the last three months, the defendants have not filed any counter affidavit. Instead, the Government Council came to the High Court and stated that I have not filed a “paper book” (which includes depositions and evidence, among other things). However, the judge stated that this is not a case which requires a “paper book”, since my appeal was about the misapplication of Order 7, Rule 11, of the Civil Procedure Code. Then the Government Council asked for more time to review the appeal and it is has been postponed.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Have there been any other recent court cases against the UID?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;Yes. While all of this was going on, retired judge, Justice Puttaswamy, filed a petition in the Supreme Court, stating that the UID scheme is illegal, since it violates article 73 of the Constitution. Aruna Roy, who is an activist at the National Council for People’s Right to Information, has also filed a petition where she has questioned the UID because it violates privacy rights and the rights of the poor.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Furthermore, petitions have been filed in the Madras High Court and in the Mumbai High Court.  In 2012, it was argued in the Madras High Court that the only legal provision for taking fingerprints  exists under the Prisoners Act, whereas the UIDAI is taking the fingerprints of people who are not prisoners and therefore it is illegal. In 2013, Vikram Crishna, Kamayani Bahl and a few others argued in the Mumbai High Court that the right to privacy is being violated through the UID scheme. It is noteworthy that in most of these cases, the defendants have not filed any counter-arguments. The only exceptions were in the Aruna Roy and Puttaswamy cases, where the defendants claimed that the UID is secure and supported it in general. In the end, the Supreme Court directed that the cases in Mumbai and Madras should be clubbed together and addressed by it. As such, the cases filed in the Madras and Mumbai High Courts have been sent to the Supreme Court of India.&lt;/p&gt;

&lt;p align="JUSTIFY" class="western"&gt;Major General Vombathakere also filed a petition in the Supreme Court, arguing that the UID scheme violates individuals' right to privacy. When the counsel for the General commenced his arguments the judge pointed to the possibility of the Government passing the NIA Bill soon, which will contain provisions for privacy, as stated by the Government. As such, the judge implied that if the Government passes such a law the argument, that the Government is implementing the scheme in a legal vacuum, may not be valid.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;So what is the status of your pending court cases?&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY" class="western"&gt;Well, I impleaded myself in Aruna Roy's petition and brought my arguments with regards to corruption in the case of companies contracted with the UIDAI and the danger to national security through the involvement of persons linked to US intelligence agencies. The last hearing in the Supreme Court was on 10th December 2013, but it was postponed to 28 January 2014. So in short, in the Supreme Court I am currently filing a case for investigation with regards to corruption and links with foreign intelligence agencies by companies contracted with the UIDAI, while in the Bangalore High Court, I have appealed a civil trial with regards to the misplacement of Order 7, Rule 11, of the Civil Procedure Code.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign'&gt;http://editors.cis-india.org/internet-governance/blog/interview-with-mathew-thomas-from-the-say-no-to-uid-campaign&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-27T12:47:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/Brochures.zip">
    <title>Brochures.zip</title>
    <link>http://editors.cis-india.org/internet-governance/blog/Brochures.zip</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/Brochures.zip'&gt;http://editors.cis-india.org/internet-governance/blog/Brochures.zip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-12-26T05:23:23Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013">
    <title>Brochures from Expos on Smart Cards, e-Security, RFID &amp; Biometrics in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013</link>
    <description>
        &lt;b&gt;Electronics Today organised a series of expos on smart cards, e-security, RFID and biometric technology in Delhi on 16-18 October 2013. The Centre for Internet and Society is sharing the brochures it collected from these public expos for research purposes. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In Pragati Maidan, New Delhi, many companies from India and abroad gathered to exhibit their products at the following &lt;a class="external-link" href="http://www.electronicstoday.org/smartcardexpo/2013/smartcardexpo.aspx"&gt;expos&lt;/a&gt; which were organised by Electronics Today (India's first electronic exhibition organiser) on 16-18 October 2013:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SmartCards Expo 2013&lt;/li&gt;
&lt;li&gt;e-Security Expo 2013&lt;/li&gt;
&lt;li&gt;RFID Expo 2013&lt;/li&gt;
&lt;li&gt;Biometrics Expo 2013&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) attended these exhibitions for research purposes and is sharing the publicly available brochures it gathered through the &lt;a href="http://editors.cis-india.org/internet-governance/blog/Brochures.zip" class="internal-link"&gt;attached zip file&lt;/a&gt;. The use of these brochures constitutes Fair Use.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013'&gt;http://editors.cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-26T05:24:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou">
    <title>Big Democracy: Big Surveillance - A talk by Maria Xynou</title>
    <link>http://editors.cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou</link>
    <description>
        &lt;b&gt;Next Tuesday, Maria Xynou will be presenting her latest research on surveillance in India. Come and engage in a discussion on India's controversial surveillance schemes, surveillance industry and much much more! &lt;/b&gt;
        
&lt;p&gt;And so we've heard a lot about the Edward Snowden leaks and about the NSA's controversial mass surveillance projects. But what's happening in India?&lt;/p&gt;
&lt;p&gt;It turns out that the world's largest democracy has some of the most controversial surveillance schemes in the world! Some of India's laws, schemes, projects and technologies are unbeatable when it comes to mass surveillance, censorship and control. While India may be a developing country with issues ranging from poverty to corruption, it nonetheless appears to be at the forefront of surveillance on an international level.&lt;/p&gt;
&lt;p&gt;Join us at the Centre for Internet and Society (CIS) on 3rd December 2013 to hear about India's surveillance laws, schemes and technologies and to engage in a discussion on the potential implications. All that is required is an open mind, critical thought and a will to challenge that which has not been challenged!&lt;/p&gt;
&lt;p&gt;We look forward to seeing you all and to hearing your thoughts, ideas and opinions!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/P6tG8jl6cuo" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou'&gt;http://editors.cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-12T10:23:21Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you">
    <title>Why 'Facebook' is More Dangerous than the Government Spying on You</title>
    <link>http://editors.cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou looks at state and corporate surveillance in India and analyzes why our "choice" to hand over our personal data can potentially be more harmful than traditional, top-down, state surveillance. Read this article and perhaps reconsider your "choice" to use social networking sites, such as Facebook. &lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;&lt;i&gt;Do you have a profile on Facebook?&lt;/i&gt; Almost every time I ask this question, the answer is ‘yes’. In fact, I think the amount of people who have replied ‘no’ to this question can literally be counted on my right hand. But this is not an article about Facebook per se. It’s more about the ‘Facebooks’ of the world, and of people’s increasing “choice” to hand over their most personal data. More accurate questions are probably:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;“&lt;i&gt;Would you like the Government to go through your personal diary? If not, then why do you have a profile on Facebook?”&lt;/i&gt;&lt;/p&gt;

&lt;h2&gt;&lt;span&gt;&lt;b&gt;The Indian Surveillance State&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Following &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;Snowden&lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;’&lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;s&lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt; &lt;/a&gt;&lt;a href="http://news.yahoo.com/nsa-revelations-timeline-whats-come-since-snowden-leaks-203656274.html"&gt;revelations&lt;/a&gt;&lt;/span&gt;, there’s finally been more talk about surveillance. But what is surveillance?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;David Lyon - who directs the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.sscqueens.org/"&gt;Surveillance&lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt; &lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt;Studies&lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt; &lt;/a&gt;&lt;a href="http://www.sscqueens.org/"&gt;Centre&lt;/a&gt;&lt;/span&gt; - &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;defines&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;surveillance&lt;/a&gt;&lt;/span&gt; as &lt;i&gt;“any collection and processing of personal data, whether identifiable or not, for the purposes of influencing or managing those whose data have been garnered”&lt;/i&gt;. &lt;a href="http://www.polity.co.uk/book.asp?ref=9780745635910"&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance&lt;/span&gt;&lt;/a&gt; can also be defined as the monitoring of the behaviour, activities or other changing information of individuals or groups of people. However, this definition implies that individuals and/or groups of people are being monitored in a top-down manner, without this being their “choice”. But is that actually the case? To answer this question, let’s have a look at how the Indian government and corporations operating in India spy on us.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;State Surveillance&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The first things that probably come to mind when thinking about India from a foreigner’s perspective are poverty and corruption. Surveillance appears to be a “Western, elitist issue”, which mainly concerns those who have already solved their main survival problems. In other words, the most mainstream argument I hear in India is that surveillance is not a &lt;i&gt;real &lt;/i&gt;issue, especially since the majority of the population in the country lives below the line of poverty and does not even have any Internet access. Interestingly enough though, the other day when I was walking around a slum in Koramangala, I noticed that most people have Airtel satellites...even though they barely have any clean water!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The point though is that surveillance in India is a fact, and the state plays a rather large role in it. In particular, Indian law enforcement agencies follow three steps in ensuring that targeted and mass surveillance is carried out in the country:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. They create surveillance schemes, such as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Monitoring&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;System&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; (&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;)&lt;/a&gt;&lt;/span&gt;, which carry out targeted and/or mass surveillance&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. They create laws, guidelines and license agreements, such as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; 2008&lt;/a&gt;&lt;/span&gt;, which mandate targeted and mass surveillance and which require ISP and telecom operators to comply&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. They buy surveillance technologies from companies, such as CCTV cameras and spyware, and use them to carry out targeted and/or mass surveillance&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While Indian law enforcement agencies don’t necessarily follow these steps in this precise order, they usually try to create surveillance schemes, legalise them and then buy the gear to carry them out.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, surveillance in India is regulated under five laws: the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; 1885&lt;/a&gt;&lt;/span&gt;, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Office&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; 1898&lt;/a&gt;&lt;/span&gt;, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; 1933&lt;/a&gt;&lt;/span&gt;, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;section&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; 91 &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;of&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;the&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; 1973 &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;Code&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;of&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;Criminal&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; &lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;Procedure&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt; (&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;CrPc&lt;/a&gt;&lt;a href="http://indiankanoon.org/doc/911085/"&gt;)&lt;/a&gt;&lt;/span&gt; and the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; 2008&lt;/a&gt;&lt;/span&gt;. These laws mandate targeted surveillance, but remain silent on the issue of mass surveillance which means that technically it is neither allowed nor prohibited, but remains a grey legal area.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While surveillance laws in India may not mandate mass surveillance, some of their sections are particularly concerning. Section 69 of the&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; 2008&lt;/a&gt;&lt;/span&gt; allows for the interception of all information transmitted through a computer resource, while requiring that all users disclose their private encryption keys or face a jail sentence of up to seven years. This appears to be quite bizarre, as individuals can only keep their data private and protect themselves from surveillance through encryption.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Section 44 of the Information Technology (Amendment) Act 2008 imposes stiff penalties on anyone who fails to provide requested information to authorities - which kind of reminds us of Orwell’s totalitarian regime in &lt;a href="http://www.ministryoflies.com/1984.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;“1984”&lt;/span&gt;&lt;/a&gt;. Furthermore, section 66A of the same law states that individuals will be punished for sending “offensive messages through communication services”. However, the vagueness of this section raises huge concerns, as it remains unclear what defines an “offensive message” and whether this will have grave implications on the freedom of expression. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;arrest&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;of&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;two&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;Indian&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;women&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;last&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;November&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;over&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;a&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;Facebook&lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/india-news/mumbai/outrage-after-arrest-of-2-women-for-facebook-post-on-mumbai-shutdown/article1-961377.aspx"&gt;post&lt;/a&gt;&lt;/span&gt; reminds us of this.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Laws in India may not mandate mass surveillance, but guidelines and license agreements issued by the Department of Telecommunications do. In particular, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;regarding&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Central&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;System&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;CMS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;) &lt;/a&gt;&lt;/span&gt;not only mandates mass surveillance, but also attempts to legalise a mass surveillance scheme which aims to intercept all telecommunications and Internet communications in India. Furthermore, the Department of Telecommunications has issued &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;numerous&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;guidelines&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;and&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;license&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;agreements&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;for&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;ISPs&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;and&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;telecom&lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/data-services/internet-services"&gt;operators&lt;/a&gt;&lt;/span&gt;, which require them to not only be “surveillance-friendly”, but to also enable law enforcement agencies to tap into their servers on the grounds of national security. And then, of course, there’s the new &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;National&lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;Cyber&lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;Security&lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/national-cyber-security-policy-2013-1"&gt;Policy&lt;/a&gt;&lt;/span&gt;, which mandates surveillance to tackle cyber-crime, cyber-terrorism, cyber-war and cyber-vandalism.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;As both a result and prerequisite of these laws, the Indian government has created various surveillance schemes and teams to aid them. In particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;India&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;’&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;s&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Computer&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Emergency&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Response&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; &lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;Team&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt; (&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;CERT&lt;/a&gt;&lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert"&gt;)&lt;/a&gt;&lt;/span&gt; is currently monitoring “any suspicious move on the Internet” in order to checkmate any potential cyber attacks from hackers. While this may be useful for the purpose of preventing and detecting cyber-criminals, it remains unclear how “any suspicious move” is defined and whether that inevitably enables mass surveillance, without individuals’ knowledge or consent.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Crime&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;and&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Criminal&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Tracking&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;and&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Network&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; &amp;amp; &lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;Systems&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt; (&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;CCTNS&lt;/a&gt;&lt;a href="http://ncrb.gov.in/cctns.htm"&gt;)&lt;/a&gt;&lt;/span&gt; is the creation of a nationwide networking infrastructure for enhancing the efficiency and effectiveness of policing and sharing data among 14,000 police stations across the country. It has been estimated that Rs. 2000 crore has been allocated for the CCTNS project and while it may potentially increase the effectiveness of tackling crime and terrorism, it raises questions around the legality of data sharing and its potential implications on the right to privacy and other human rights - especially if such data sharing results in data being disclosed or shared with unauthorised third parties.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Similarly, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;National&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt; &lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;Intelligence&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt; &lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;Grid&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt; (&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;NATGRID&lt;/a&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;)&lt;/a&gt;&lt;/span&gt; is an integrated intelligence grid that will link the databases of several departments and ministries of the Government of India so as to collect comprehensive patterns of intelligence that can be readily accessed by intelligence agencies. This was first proposed in the aftermath of the Mumbai 2008 terrorist attacks and while it may potentially aid intelligence agencies in countering crime and terrorism, enforced privacy legislation should be a prerequisite, which would safeguard our data from potential abuse.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;However, the most controversial surveillance scheme being implemented in India is probably the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Monitoring&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;System&lt;/a&gt;&lt;/span&gt; (CMS). While several states, such as Assam, already have &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Systems&lt;/a&gt;&lt;/span&gt; in place, the Central Monitoring System appears to raise even graver concerns. In particular, the CMS is a system through which all telecommunications and Internet communications in India will be monitored by Indian authorities. In other words, the CMS will be capable of intercepting our calls and of analyzing our data on social networking sites, while all such data would be retained in a centralised database. Given that India currently lacks privacy legislation, such a system would mostly be unregulated and would pose major threats to our right to privacy and other human rights. Given that data would be centrally stored, the system would create a type of “honeypot” for centralised cyber attacks. Given that the centralised database would have massive volumes of data for literally a billion people, the probability of error in pattern and profile matching would be high - which could potentially result in innocent people being convicted for crimes they did not commit. Nonetheless, mass surveillance through the CMS is currently a reality in India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And the even bigger question: How can law enforcement agencies mine the data of 1.2 billion people? How do they even carry out surveillance in practice? Well, that’s where surveillance technology companies come in. In fact, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;surveillance&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;industry&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;in&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;India&lt;/a&gt;&lt;/span&gt; is massively expanding - especially in light of its new surveillance schemes which require advanced and sophisticated technology. According to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;CIS&lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;’ &lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;India&lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;Privacy&lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;Monitor&lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;Map&lt;/a&gt;&lt;/span&gt; - which is part of ongoing research - Indian law enforcement agencies use CCTV cameras in pretty much every single state in India. The map also shows that Unmanned Aerial Vehicles (UAVs), otherwise known as drones, are being used in most states in India and the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;DRDO&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;’&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;s&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt; “&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;Netra&lt;/a&gt;&lt;a href="http://defence.pk/threads/drdo-develops-uav-netra-to-aid-anti-terrorist-operations.64086/"&gt;”&lt;/a&gt;&lt;/span&gt; - which is a lightweight drone, not much bigger than a bird - is particularly noteworthy.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;But Indian law enforcement agencies also buy surveillance software and hardware which is aimed at intercepting telecommunications and Internet communications. In particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt; &lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt;Technologies&lt;/a&gt;&lt;/span&gt; is an Indian company - based in Indore - which equips law enforcement agencies in India and around the world with &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;software&lt;/a&gt;&lt;/span&gt; which can probably be compared with the “notorious” FinFisher. So in short, there appears to be a tight collaboration between Indian law enforcement agencies and the surveillance industry, which can be clearly depicted in the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;surveillance&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;trade&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;shows&lt;/a&gt;&lt;/span&gt;, otherwise known as “the wiretappers’ ball”.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Corporate Surveillance&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;When I ask people about corporate surveillance, the answer I usually get is: &lt;i&gt;“Corporations only care about their profit - they don’t do surveillance per se”&lt;/i&gt;. And while that may be true, &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;David&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;Lyon&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;’&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;s&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;definition&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;of&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;surveillance&lt;/a&gt;&lt;/span&gt; - as &lt;i&gt;“any collection and processing of personal data, whether identifiable or not, for the purposes of influencing or managing those whose data have been garnered” &lt;/i&gt;- may indicate otherwise.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Corporations, like Google, Amazon and Facebook, may not have an agenda for spying per se, but they do collect massive volumes of personal data and, in cases such as PRISM, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;allow&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;law&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;enforcement&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;to&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;tap&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;into&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;their&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;servers&lt;/a&gt;&lt;/span&gt;. Once law enforcement agencies get hold of data collected by companies, such as Facebook, they then use data mining software - equipped by various surveillance technology companies - to process and mine the data. And how do companies, like Google and Facebook, make money off our personal data? By selling it to big buyers, such as law enforcement agencies.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;So while Facebook and all the ‘Facebooks’ of the world may not profit from surveillance per se, they do profit from collecting our personal data and selling it to third parties, which include law enforcement agencies. And David Lyon argues that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;surveillance&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;involves&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;the&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;collection&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;of&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;personal&lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt; &lt;/a&gt;&lt;a href="https://globalsociology.pbworks.com/w/page/14711234/Network%20Society%20or%20Surveillance%20Society"&gt;data&lt;/a&gt;&lt;/span&gt; - which corporations, like Facebook, do - for the purpose of influencing and managing individuals. While this last point can probably be  widely debated on, it is clear that corporations share their collected data with third parties, which ultimately leads to the influence or managing of individuals - directly or indirectly. In other words, the collection of personal data, in combination with its disclosure to third parties, &lt;i&gt;is&lt;/i&gt; surveillance. So when we think about companies, like Google or Facebook, we should not just think of businesses interested in their profit - but also of spying agencies. After all, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;“&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;if&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;the&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;product&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;is&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;free&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;, &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;you&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;are&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;the&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;product&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/marketshare/2012/03/05/if-youre-not-paying-for-it-you-become-the-product/"&gt;”&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Now if we look at online corporations more closely, we can probably identify three categories:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. Websites through which we &lt;i&gt;buy products &lt;/i&gt;and hand over our personal details - e.g. Amazon&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. Websites through which we &lt;i&gt;use services&lt;/i&gt; and hand over our personal details - e.g. flight ticket&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. Websites through which we &lt;i&gt;communicate&lt;/i&gt; and hand over our personal details - e.g. Facebook&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And why could the above be considered “spying” at all? Because such corporations collect massive volumes of personal data and subsequently:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;Disclose&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;such&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;data&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;to&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;law&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;enforcement&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html"&gt;agencies&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;Allow&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;law&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;enforcement&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;agencies&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;to&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;tap&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;into&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;their&lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt; &lt;/a&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=2&amp;amp;"&gt;servers&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Sell such data to “third parties”&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;What’s notable about so-called corporate surveillance is that, in all cases, there is a mutual, key element: we &lt;i&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;consent&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;to&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;the&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;handing&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;over&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;of&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;our&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;personal&lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/wp/know-your-rights"&gt;information&lt;/a&gt;&lt;/span&gt;. We are not forced to hand over our personal data when buying a book online, booking a flight ticket or using Facebook. Instead, we “choose” to hand over our personal data in exchange for a product or service. Now what significantly differentiates state surveillance to corporate surveillance is the factor of &lt;i&gt;“choice”&lt;/i&gt;. While we may choose to hand over our most personal details to large online corporations, such as Google and Facebook, we do not have a choice when the government monitors our communications, collects and stores our personal data.&lt;/p&gt;

&lt;h2 align="JUSTIFY"&gt;&lt;span&gt;&lt;b&gt;State Surveillance &lt;/b&gt;&lt;/span&gt;&lt;i&gt;&lt;b&gt;vs.&lt;/b&gt;&lt;/i&gt;&lt;span&gt;&lt;b&gt; Corporate Surveillance&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Both Indian law enforcement agencies and corporations collect massive volumes of personal data. In fact, it is probably noteworthy to mention that Facebook, in particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;collects&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; 20 &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;times&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;more&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;data&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;per&lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt; &lt;/a&gt;&lt;a href="http://www.zdnet.com/data-driven-analysis-debunks-claims-that-nsa-is-out-of-control-special-report-7000019522/"&gt;day&lt;/a&gt;&lt;/span&gt; than the NSA in total. In addition, Facebook has &lt;a href="http://www.ft.com/cms/s/0/7536d216-0f36-11e3-ae66-00144feabdc0.html#axzz2jDSrZPHv"&gt;&lt;span style="text-decoration: underline;"&gt;claimed&lt;/span&gt;&lt;/a&gt; that it has received more demands from the US government for information about its users than from all other countries combined. In this sense, the corporate collection of personal data can potentially be more harmful than government surveillance, especially when law enforcement agencies are tapping into the servers of companies like Facebook. After all, the Indian government and all other governments would have very little data to analyse if it weren’t for such corporations.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance is not just about “spying” or about “watching people” - it’s about much much more. Observing people’s behaviour only really becomes harmful when the data observed is collected, retained, analysed, shared and disclosed to unauthorised third parties. In other words, surveillance is meaningful to examine because it involves the &lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;analysis&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt; &lt;/a&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt;of&lt;/a&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt; &lt;/a&gt;&lt;a href="https://www.sogeti.nl/updates/vint/internet-things-has-dark-side-well-surveillance"&gt;data&lt;/a&gt;&lt;/span&gt;, which in turn involves &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;pattern&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;matching&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.surveillance-and-society.org/articles1/whatsnew.pdf"&gt;profiling&lt;/a&gt;&lt;/span&gt;, which can potentially have actual, real-world implications - good or bad. But such analysis cannot be possible without having access to large volumes of data - most of which belong to large corporations, like Facebook. The question, though, is: How do corporations collect such large volumes of personal data, which they subsequently share with law enforcement agencies? Simple: Because &lt;i&gt;we “choose”&lt;/i&gt; to hand over our data!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Three years ago, when I was doing research on young people’s perspective of Facebook, all of the interviewees replied that they feel that they are in control of their personal data, because they “choose” what they share online. While this may appear to be a valid point,  the “choice” factor can widely be debated on. There are many reasons why people “choose” to hand over their personal data, whether to buy a product, use a service, to communicate with peers or because they feel socially pressured into using social networking sites. Nonetheless, it all really comes down to one main reason: &lt;a href="http://edition.cnn.com/2010/TECH/04/14/oppmann.off.the.grid/"&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;convenience&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;. Today, in most cases, the reason why we hand over our personal data online in exchange for products or services is because it is simply more convenient to do so. And while that is understandable, at the same time we are exposing our data (and ultimately our lives) in the name of convenience.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The irony in all of this is that, while many people reacted to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;Snowden&lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;’&lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;s&lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt; &lt;/a&gt;&lt;a href="http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html"&gt;revelations&lt;/a&gt;&lt;/span&gt; on NSA dragnet surveillance, most of these people probably have profiles on Facebook. Secret, warrantless government surveillance is undeniably intrusive, but in the end of the day, our profiles on Facebook - and on all the ‘Facebooks’ of the world - is what enabled it to begin with. In other words, if we didn’t choose to give up our personal data - especially without really knowing how it would be handled - large databases would not exist and the NSA - and all the ‘NSAs’ of the world - would have had a harder time gathering and analysing data.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, the main difference between state and corporate surveillance is that the first is imposed in a top-down manner by authorities, while the second is a result of our “choice” to give up our data. While many may argue that it’s worse to have control imposed on you, I strongly disagree. When control and surveillance are imposed on us in a top-down manner, it’s likely that we will perceive this - sooner or later - as a &lt;i&gt;direct&lt;/i&gt; threat to our human rights, which means that it’s likely that we will resist to it at some point. People usually react to what they perceive as a direct threat, whereas &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;they&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;rarely&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;react&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;to&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;what&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;does&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;not&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;directly&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;affect&lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/essay-155.html"&gt;them&lt;/a&gt;&lt;/span&gt;. For example, one may perceive murder or suicide as a direct threat due the immediateness of its effect, whereas smoking may not be seen as an equally direct threat, because its consequences are indirect and can usually be seen in the long term. It’s somehow like that with surveillance.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;University&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;students&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;have&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;protested&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;on&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;the&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;streets&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;against&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;the&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;installation&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;of&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;CCTV&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy/cctv-in-universities"&gt;cameras&lt;/a&gt;&lt;/span&gt;, but how many of them have profiles on social networking sites, such as Facebook? People may react to the installation of CCTV cameras, because it may appear as a direct threat to their right to privacy. However, the irony is that the real danger does not necessarily lie within some CCTV cameras, but rather within the profile of each person on a major commercial social networking site. At very best, a CCTV camera will capture some images of us and through that, track our location and possibly our acquaintances. What type of data is captured through a simple, “harmless” Facebook profile? The following probably only includes a tiny percentage of what is actually captured:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Personal photos&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Biometrics (possibly through photos)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Family members&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Friends and acquaintances&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Habits, hobbies and interests&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Location (through IP address)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Places visited&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Economic standing (based on pictures, comments, etc.)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Educational background&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Ideas and opinions (which may be political, religious, etc.)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Activities&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Affiliations&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The above list could potentially go on and on, probably depending on how much - or what type - of data is disclosed by the individual. The interesting element to this is that &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;we&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;can&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;never&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;really&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;know&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;how&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;much&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;data&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;we&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;are&lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt; &lt;/a&gt;&lt;a href="http://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/"&gt;disclosing&lt;/a&gt;&lt;/span&gt;, even if we think we control it. While an individual may argue that he/she chooses to disclose an x amount of data, while retaining the rest, that individual may actually be disclosing a 10x amount of data. This may be the case because usually every bit of data hides lots of other bits of data, that we may not be aware of. &lt;i&gt;It all really comes down to who is looking at our data, when and why.&lt;/i&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For example, (fictional) Priya may choose to share on her Facebook profile (through photos, comments, or any other type of data) that she is female, Indian, a Harvard graduate and that her favourite book is &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;“&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;Anarchism&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt; &lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;and&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt; &lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;other&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt; &lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;Essays&lt;/a&gt;&lt;a href="http://www.free-ebooks.net/ebook/Anarchism-and-other-essays/pdf/view"&gt;”&lt;/a&gt;&lt;/span&gt; by Emma Goldman. At first glance, nothing appears to be “wrong” with what Priya is revealing and in fact, she appears to care about her privacy by not revealing “the most intimate details” of her life. Moreover, one could argue that there is absolutely nothing “incriminating” about her data and that, on the contrary, it just reflects that she is a “shiny star” from Harvard. However, I am not sure if a data analyst would be restricted to this data and if data analysis would show the same “sparkly” image.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In theory, the fact that Priya is an Indian who attended Harvard reveals another bit of information, that Priya did not choose to share: her economic standing. Given that the majority of Indians live below the line of poverty, there is a big probability that Priya belongs to India’s middle class - if not elite. Priya may not have intentionally shared this information, but it was indirectly revealed through the bits of data that she did reveal: female Indian and Harvard graduate. And while there may not be anything “incriminating” about the fact that she has a good economic standing, in India this usually means that there’s also some strong political affiliation. That brings us to her other bit of information, that her favourite author is a feminist, anarchist. While that may be viewed as indifferent information, it may be crucial depending on the specific political actors in the country she’s in and on the general political situation. If a data analyst were to map the data that Priya chose to share, along with all her friends and acquaintances that she inevitably has through Facebook, that data analyst could probably tell a story about her. And the concerning part is that that story may or may not be true. But that doesn’t really matter.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Today, governments don’t judge us and take decisions based on our version of our data, but&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;based&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;on&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;what&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;our&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;data&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;says&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;about&lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt; &lt;/a&gt;&lt;a href="http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us"&gt;us&lt;/a&gt;&lt;/span&gt;. And perhaps, under certain political, social and economic circumstances, our “harmless” data could be more incriminating than what we think. While an individual may express strong political views within a democratic regime, if that political system were to change in the future and to become authoritarian, that individual would possibly be suspicious in the eyes of the government - to say the least. This is where data retention plays a significant role.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Most companies &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;retain&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;data&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;indefinitely&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;or&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;for&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;a&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;long&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;period&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.bryancave.com/files/Publication/cbd3503b-c968-4565-9cc7-016b9aa3b6f1/Presentation/PublicationAttachment/b24d1c5a-4550-4207-9486-062a025da8d9/Data%20Privacy%20and%20Security%20Team_Retaining%20Data_March%202012.pdf"&gt;time&lt;/a&gt;&lt;/span&gt;, which means that future, potentially less-democratic governments may have access to it. And the worst part is that we can never really know what data is being held about us, because within data analysis, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;every&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;bit&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;of&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;data&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;may&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;potentially&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;entails&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;various&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;other&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;bits&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;of&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;data&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;that&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;we&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;are&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;not&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;even&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;aware&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/spy-files-three"&gt;of&lt;/a&gt;&lt;/span&gt;. So, when we “choose” to hand over our data, we don’t necessarily know what or how much we are choosing to disclose. Thus, this is why I agree with Bruce Schneier’s argument that people have an &lt;i&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;illusionary&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;sense&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;of&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;control&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;a href="https://www.schneier.com/blog/archives/2006/09/facebook_and_da.html"&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/a&gt;over their personal data.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;Social&lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt; &lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;network&lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt; &lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;analysis&lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt; &lt;/a&gt;&lt;a href="http://www.faculty.ucr.edu/~hanneman/nettext/"&gt;software&lt;/a&gt;&lt;/span&gt; is specifically designed to mine huge volumes of data that is collected through social networking sites, such as Facebook. Such software is specifically designed to profile individuals, to create “trees of communication” around them and to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.scs.ryerson.ca/~bgajdero/research/Malta08.pdf"&gt;match&lt;/a&gt;&lt;a href="http://www.scs.ryerson.ca/~bgajdero/research/Malta08.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.scs.ryerson.ca/~bgajdero/research/Malta08.pdf"&gt;patterns&lt;/a&gt;&lt;/span&gt;. In other words, this software tells a story about each and every one of us, based on our activities, interests, acquaintances, and all other data. And as mentioned before, such a story may or may not be true.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In data mining, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.sagepub.com/upm-data/40006_Chapter1.pdf"&gt;behavioural&lt;/a&gt;&lt;a href="http://www.sagepub.com/upm-data/40006_Chapter1.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.sagepub.com/upm-data/40006_Chapter1.pdf"&gt;statistics&lt;/a&gt;&lt;/span&gt; are being used to analyse our data and to predict how we are likely to behave. When applied to national databases, this may potentially amount to predicting how masses or groups within the public are likely to behave and to subsequently control them.  If a data analyst can predict an individual’s future behaviour - with some probability - based on that individuals’ data, the same could potentially occur on a mass, public level.  As such, the danger within surveillance - especially corporate surveillance through which we&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;voluntarily&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;disclose&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;massive&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;amounts&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;of&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/08/the_publicpriva_1.html"&gt;data&lt;/a&gt;&lt;/span&gt; about ourselves - is that it appears to come down to &lt;i&gt;public control&lt;/i&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to security expert Bruce Schneier, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;data&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;today&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;is&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;a&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;byproduct&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;of&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;the&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;Information&lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt; &lt;/a&gt;&lt;a href="http://edition.cnn.com/2013/10/16/opinion/schneier-surveillance-trajectories/"&gt;Society&lt;/a&gt;&lt;/span&gt;.  Unlike an Orwellian totalitarian state where surveillance is imposed in a top-down manner, surveillance today appears to widely exist because we indirectly choose and enable it (by handing over our data to online companies), rather than it being imposed on us in a solely top-down manner. However, contemporary surveillance may potentially be far worse than that described in Orwell’s “1984”, because surveillance is publicly perceived to be an &lt;i&gt;indirect &lt;/i&gt;threat - if considered to be a threat at all. It is more likely that people will resist a direct threat, than an indirect threat, which means that the possibility of mass violations of human rights as a result of surveillance is real.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Hannah Arendt argued that a main prerequisite and component of totalitarian power is &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;support&lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt; &lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;by&lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt; &lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;the&lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt; &lt;/a&gt;&lt;a href="http://livingtext.wordpress.com/2012/11/26/totalitarianism-was-supported-by-the-masses/"&gt;masses&lt;/a&gt;&lt;/span&gt;. Today, surveillance appears to be socially integrated within societies which indicates that contemporary power fueled by surveillance has mass support. While the argument that surveillance is being socially integrated can potentially be widely debated on and requires an entire in depth research of its own, few simple facts might be adequate to prove it at this stage. Firstly, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;CCTV&lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/cisprivacymonitor"&gt;cameras&lt;/a&gt;&lt;/span&gt; are installed in most countries, yet there has been very little resistance - on the contrary, there appears to be a type of universal acceptance on the grounds of security. Secondly, different types of spy products exist in the market - such as &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;Spy&lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt; &lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;Coca&lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt; &lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;Cola&lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt; &lt;/a&gt;&lt;a href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;cans&lt;/a&gt;&lt;/span&gt; - which can be purchased by anyone online. Thirdly, countries all over the world carry out controversial surveillance schemes - such as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt;Central&lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt; &lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt; &lt;/a&gt;&lt;a href="http://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml"&gt;System&lt;/a&gt;&lt;/span&gt; in India - yet public resistance to such projects is limited. And while one may argue that the above cases don’t necessarily prove that surveillance is being socially integrated, it would be interesting to look at a fourth fact: most people who have Internet access &lt;i&gt;choose &lt;/i&gt;to share their personal data through the use of social networking sites.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Reality shows, such as Big Brother, which broadcast the surveillance of people’s lives and present it as a form of entertainment - when actually, I think it should be worrisome - appear to enable the social integration of surveillance. The very fact that we all probably - or, hopefully - know that Facebook can share our personal data with unauthorised third parties and - now, after the Snowden revelations - that governments can tap into Facebook’s servers, should be enough to convince us to delete our profiles. Yet, why do we still all have Facebook profiles? Perhaps because surveillance is socially integrated and perhaps because it is just &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;convenient&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;to&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;be&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;on&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2013/06/trading_privacy_1.html"&gt;Facebook&lt;/a&gt;&lt;/span&gt;. But that doesn’t change the fact that surveillance can potentially be a threat to our human rights. It just means that we perceive surveillance as an indirect threat and that we are unlikely to react to it.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In the long term, what does this mean? Well, it seems like we will probably be &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;more&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;acceptive&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;towards&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;more&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;authoritarian&lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt; &lt;/a&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;power&lt;/a&gt;&lt;/span&gt;, that we will be used to the idea of censoring our own thoughts and actions (in the fear of getting caught by the CCTV camera on the street or the spyware which may or may not be implanted in our laptop) and that ultimately, we will be less politically active and more reluctant to challenge the authority.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;What’s particularly interesting though about surveillance today is that it is fueled and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;enabled&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;through&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;our&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;freedom&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;of&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;speech&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;and&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;general&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;Internet&lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt; &lt;/a&gt;&lt;a href="http://www.amazon.com/The-Net-Delusion-Internet-Freedom/dp/1610391063"&gt;freedom&lt;/a&gt;&lt;/span&gt;. If we didn’t have any Internet freedom - or as much as we do - we would have disclosed less personal data and thus surveillance would probably have been more restricted. The more Internet freedom we have, the more personal data we will disclose on Facebook - and on all the ‘Facebooks’ of the world - and the more data will potentially be available to mine, analyse, share and generally incorporate in the surveillance regime. So in this sense, Internet freedom appears to be a type of prerequisite of surveillance, as contradictory and ironic as it may seem. No wonder why the Chinese government has gone the extra mile in creating the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;Chinese&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;versions&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;of&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;Facebook&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;and&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt;Twitter&lt;/a&gt;&lt;a href="http://www.mirror.co.uk/news/world-news/weibo-chinese-version-of-twitter-can-1545515"&gt; &lt;/a&gt;&lt;/span&gt;- it’s probably no coincidence.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While we may blame governments for establishing surveillance schemes, ISP and TSP operators for complying with governments’ license agreements which often mandate that they create backdoors for spying on us and security companies for creating the surveillance gear in the first place, in the end of the day, we are all equally a part of this mess. If we didn’t &lt;i&gt;choose &lt;/i&gt;to hand over our personal data to begin with, none of the above would have been possible.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The real danger in the Digital Age is not necessarily surveillance per se, but our &lt;i&gt;choice&lt;/i&gt; to voluntarily disclose our personal data.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you'&gt;http://editors.cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-23T08:38:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
