The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 1 to 15.
CIS Cybersecurity Series (Part 24) – Shantanu Ghosh
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh
<b>CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.</b>
<p><em>“Remember
that India is also a land where there are a lot of people who are beginning to
use computing devices for the first time in their lives. For many people, their
smartphone is their first computing device because they have never had
computers in the past. For them, the challenge is how do you make sure that
they understand that that can be a threat too. It can be a threat not only to
their bank accounts, with their financial information, but even to their
private lives.”</em></p>
<p>Centre for Internet and Society presents its twenty fourth
installment of the CIS Cybersecurity Series.”</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.</p>
<p>Shantanu Ghosh is the Managing Director of Symantec
Product Operations, India. He also runs the Data Centre Security Group for
Symantec globally.</p>
<iframe src="https://www.youtube.com/embed/dFN2_R0HzbA" frameborder="0" height="315" width="560"></iframe>
<p><strong>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-15T14:58:50ZBlog EntryCIS Cybersecurity Series (Part 23) – Justin Searle
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle
<b>CIS interviews Justin Searle, security expert, as part of the Cybersecurity Series.</b>
<p><em>"I think that people here in India, just like everywhere else, are broadening the areas where security can be applied. We see elsewhere, like in the United States and in Europe, that a lot of security researchers are starting to get into not just control systems, but also embedded devices and hardware and wireless... And we are seeing the same trends here in India as well. It is fun to see that growth and continual development, and not only that, but we are seeing security projects and research coming out of India, that's unqiue and fresh and contributing back to what originally came more from the United States and Europe."</em></p>
<p>Centre for Internet and Society presents its twenty
third installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic. </p>
<p>Justin Searle is the managing partner for Utilisec.
Utisix provides security services to the energy sector. They also assist oil,
water, gas, and manufacturing companies. Justin specializes in security
assessments and finding vulnerabilities in systems. </p>
<iframe src="https://www.youtube.com/embed/ufOV8DXzQuA" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development
Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-15T14:44:38ZBlog EntryCIS Cybersecurity Series (Part 22) - Anonymous
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous
<b>CIS interviews a Tibetan security researcher and information activist, as part of the Cybersecurity Series. He prefers to remain anonymous.</b>
<p><em>"I
don't know technology but I am aware of the information people share with me.
So yes, they can track you down through your mobile phone. The last time I was
in Nepal, I met a westerner. We went to this restaurant and she asked me to
take the battery out of the phone. That was the first time I had heard of this
and so when I asked why she said that it is possible that people had followed
us and it has happened to other Tibetans in Nepal..."</em></p>
<p>Centre for Internet and Society presents its twenty second installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.</p>
<p><iframe src="https://www.youtube.com/embed/glsAFfj7tV4" frameborder="0" height="315" width="560"></iframe></p>
<p><em>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.</em></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-13T13:40:42ZBlog EntryCIS Cybersecurity Series (Part 21) – Gyanak Tsering
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering
<b>CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.</b>
<p style="text-align: justify; "><i>“I have three mobile phones but I use only one to exchange information to and from Tibet. I don't give that number to anyone and nobody knows about it. High security forces me to use three phones. Usually a mobile phone can be tracked easily in many ways, especially by the network provider but my third mobile phone is not registered so that makes sure that the Chinese government cannot track me. The Chinese have a record of all mobile phone numbers and they can block them at anytime. But my third number cannot be traced and that allows me to communicate freely. This is only for security reasons so that my people in Tibet don't get into trouble.”</i></p>
<p style="text-align: justify; ">Centre for Internet and Society presents its twenty-first installment of the CIS Cybersecurity Series.</p>
<p style="text-align: justify; ">The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p style="text-align: justify; ">Gyanak Tsering is a Tibetan monk in exile, studying at Kirti Monastery, Dharamshala. He came to India in 1999, and has been using the internet and mobile phone technology, since 2008, to securely transfer information to and from Tibet. Tsering adds a new perspective to the cybersecurity debate and explains how his personal security is interlinked with internet security and mobile phone security.</p>
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mqSw3cy7MEc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"></iframe></th>
</tr>
</tbody>
</table>
<p><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada</i>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security InterviewPrivacy2014-09-06T05:08:44ZBlog EntryCIS Cybersecurity Series (Part 20) – Saumil Shah
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah
<b>CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.</b>
<blockquote class="quoted" style="text-align: justify; "><i>“If you look at the evolution of targets, from the 2000s to the present day, the shift has been from the servers to the individual. Back in 2000, the target was always servers. Then as servers started getting harder to crack, the target moved to the applications hosted on the servers, as people started using e-commerce applications even more. Eventually, as they started getting harder to crack, the attacks moved to the user's desktops and the user's browsers, and now to individual user identities and to the digital personas.”</i></blockquote>
<p style="text-align: justify; ">Centre for Internet and Society presents its twentieth installment of the CIS Cybersecurity Series.</p>
<p style="text-align: justify; ">The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p style="text-align: justify; ">Saumil Shah is a security expert based in Ahmedabad. He has been working in the field of security and security related software development for more than ten years, with a focus on web security and hacking.</p>
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/2V39K8y68mc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"></iframe></th>
</tr>
</tbody>
</table>
<p><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada</i>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security InterviewPrivacy2014-09-06T05:03:00ZBlog EntryCIS Cybersecurity Series (Part 19) – Lobsang Sangay
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay
<b>CIS interviews Lobsang Sangay, Prime Minister of the Central Tibetan Administration, as part of the Cybersecurity Series.</b>
<p><em>“If there is already freedom of speech in a democratic country, then anonymous commentary could be misplaced in many instances. Because if the country is democratic, it has freedom of speech, and the laws protect you when you speak out. Then I think the citizens also have responsibilities. Democracy not only means freedom, but it also means duties. Your duty is to say who you are and criticize the government, or the employer, or the policy or whatever, in your name. So anonymity is misplaced in that sense, in most of the instances. Having said that, if a particular country or a government restricts freedom of speech, then you have no option but to be anonymous because just by speaking out, you are committing a crime and hence you are liable. For example, in Tibet, even if you paste a poster on the wall, saying just two words ‘human right’, you will be arrested and you will go behind bars. Even if you just shout a slogan, you will be arrested and you will be in prison.”</em></p>
<p>Centre for Internet and Society presents its nineteenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Dr. Lobsang Sangay took office as Sikyong (Prime Minister) of the Central Tibetan Administration in Dharamsala, India, in 2011. He was born in a Tibetan refugee settlement in northern India. As a Fulbright scholar, he was the first Tibetan to receive a doctorate from the Harvard Law School in 2004. He worked as a senior fellow at Harvard University for a number of years during which he organized landmark conferences between the Dalai Lama and Chinese scholars. An expert on Tibet, international human rights law, democratic constitutionalism and conflict resolution, Dr Sangay has lectured at various universities and think-tanks throughout Europe, Asia and North America.</p>
<iframe src="//www.youtube.com/embed/pdSohCND-9Q?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p><strong><br /></strong></p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay</a>
</p>
No publisherpurba2014-07-31T05:40:04ZBlog EntryCIS Cybersecurity Series (Part 18) – Lobsang Gyatso Sither
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither
<b>CIS interviews Lobsang Gyatso Sither, Tibetan field coordinator and activist, as part of the Cybersecurity Series.</b>
<p><em>“The digital arms trade and the digital arms race, that is going on right now is a huge problem, in terms of what is happening around the world. A lot of people talk about digital arms like it’s just digital technology; it’s just surveillance technology; it’s just censorship technology; it’s just technology; it doesn’t kill anyone, but the fact of the matter is that it does kill. It’s as bad as a gun; it’s as bad as a weapon. It's the same thing in my opinion and it has to be restricted; it has to be curtailed, it has to be controlled so that it doesn’t go to places where there are no human rights and where there are rampant human rights violations. People know what it is going to be used for and it is going to be used for human rights violations and that is something that has be kept in mind before the whole aspect of digital arms trade and it has to be treated as any other arms trade</em>.”</p>
<p>Centre for Internet and Society presents its eighteenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Lobsang Gyatso Sither is a Tibetan born in exile dedicated to increasing cybersecurity among Tibetans inside Tibet and in the diasporas. He has helped to develop community-specific technologies and educational content and deploys them via training and public awareness campaigns at the grassroots level. Lobsang works with key communicators and organizations in the Tibetan community, including Voice of Tibet Radio and the Tibetan Centre for Human Rights and Democracy.</p>
<iframe src="//www.youtube.com/embed/OtLkgoiTBeo?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither</a>
</p>
No publisherpurba2014-07-31T05:34:34ZBlog Entry CIS Cybersecurity Series (Part 17) – Nishant Shah
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah
<b>CIS interviews Nishant Shah, researcher and academic, as part of the Cybersecurity Series.</b>
<p><em>“Given the political nature of social life in India, I always grew up thinking that I could speak my mind about anything to anybody unless they can hit me, more or less, and sometimes also to people who can hit me. So there has always been a very vibrant atmosphere, at least of expression, which is not necessarily a bad thing; it’s not only a good thing because it allows for, I don’t know, the first thing that comes to mind is hate speeches during the 1992 communal violences in Bombay. But it also allows for people to sit on a park bench, in a garden, at 4 o'clock in the afternoon and have a very strong critical reaction to whatever is happening around them, and sometimes it can be around celebrities, political figures, India's foreign policy and so on and so forth. I am saying that it would be unfair to think that people are not equipped to deal with questions of anonymous speech and the conditions that are necessary for it.”</em></p>
<p>Centre for Internet and Society presents its seventeenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Nishant Shah is the co-founder and director of research at the Centre for Internet and Society. He studies questions of governance, identity, planning and body at the intersections of digital technologies, law and everyday cultural practice. He is a visiting researcher at the Centre for Digital Cultures at Leuphana University, Germany, and an International Knowledge Partner on 'Youth, Technology and Change' with Hivos, Netherlands. He recently co-edited the four-volume book series "Digital AlterNatives with a Cause?" that captures discourse, practice and policy as it shapes and is shaped by youth driven, everyday practices of digital technologies and is currently working on looking at civic action in networked society. </p>
<iframe src="//www.youtube.com/embed/ea3kANxsEVE?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p><strong><br /></strong></p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah</a>
</p>
No publisherpurba2014-07-31T05:48:14ZBlog EntryCIS Cybersecurity Series (Part 16) – Nitin Pai
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai
<b>CIS interviews Nitin Pai, policy analyst, as part of the Cybersecurity Series.</b>
<p><em>“There is always a tension between the public interest and the individual's interest. Most republics function on this principle; they take a part of your freedom or liberty away in order to guarantee you the rest of your liberties and freedoms. So, I don’t think this inherent tension would be any different when it comes to cyberspace.”</em></p>
<p>Centre for Internet and Society presents its sixteenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Nitin Pai is Founder & Fellow for geopolitics at the Takshashila Institution, an independent networked think tank and editor of Pragati – The Indian National Interest Review, a publication on strategic affairs, public policy and governance. He is a graduate of Singapore’s Lee Kuan Yew School of Public Policy from where he obtained a Master in Public Administration degree. Nitin is an alumnus of Nanyang Technological University, Singapore and National College, Bangalore.</p>
<p> </p>
<iframe src="//www.youtube.com/embed/P2Uxh2ye9Tg" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the cyber stewards network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-16-2013-nitin-pai</a>
</p>
No publisherpurba2014-07-07T13:18:40ZBlog EntryCIS Cybersecurity Series (Part 15) – Malavika Jayaram
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram
<b>CIS interviews Malavika Jayaram, lawyer and researcher, as part of the Cybersecurity Series.</b>
<div><em>"So, civil society has a very interesting role in the whole internet governance debate because on one hand, they are the other ones are sort of pushing the agenda, and disseminating information and creating a public discourse around the shrinkage of the private sphere and free speech, but at the same time they, they are also the one most impacted by it. So the message that they are trying to get out is often the one that governments seek to filter at the first place. And they are most at harm.”</em></div>
<div> </div>
<div>Centre for Internet and Society presents its fifteenth installment of the CIS Cybersecurity Series. </div>
<div> </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </div>
<div> </div>
<div>Malavika works in the areas of privacy, identity, free expression and internet policy in India. She is a fellow at the Centre for Internet and Society in Bangalore, India and follows legislative and policy developments in the privacy and internet governance domains. She is also a Fellow at the Berkman Center for Internet and Society at Harvard University. </div>
<div> </div>
<iframe src="//www.youtube.com/embed/N_F5lpjt-VE" frameborder="0" height="315" width="560"></iframe>
<div> </div>
<div> </div>
<div><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram</a>
</p>
No publisherpurba2014-07-07T13:34:36ZBlog EntryCIS Cybersecurity Series (Part 14) – Menaka Guruswamy
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy
<b>CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.</b>
<div><em>"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."</em></div>
<div> </div>
<div>Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series. </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </div>
<div> </div>
<div>Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law. Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.</div>
<div> </div>
http://youtu.be/GCDD6Z-UrGI
<div> </div>
<div> </div>
<iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"></iframe>
<div>
<div><strong><br /></strong></div>
<div><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></div>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security Interview2014-07-21T10:39:03ZBlog EntryCIS Cybersecurity Film Screening
http://editors.cis-india.org/events/cis-cybersecurity-film-screening
<b>The Centre for Internet and Society invites you to a screening of Episode 1&2 of DesiSec: the first documentary film on cybersecurity in India. Hope you can join us on 26th March, at CIS, Domlur!</b>
<div>Early 2013, the Centre for Internet and Society began shooting its first documentary film project. After months of researching and interviewing activists and experts, CIS released the first episode on 11th December. </div>
<div> </div>
<div>CIS is hosting a special screening of <strong>DesiSec: Episode 1&2</strong> on <strong>26th March, 2</strong><strong>013, 5.30 pm</strong> and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society. The second episode is focused on anonymity and free speech online.</div>
<div> </div>
<div>We look forward to seeing you there!</div>
<div> </div>
<div>RSVP: <a href="mailto:purba@cis-india.org" target="_blank">purba@cis-india.org</a></div>
<div>Venue: http://osm.org/go/yy4fIjrQL?m=</div>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/events/cis-cybersecurity-film-screening'>http://editors.cis-india.org/events/cis-cybersecurity-film-screening</a>
</p>
No publisherpurbaCyber Security FilmEventCyber Security Interview2014-03-20T09:34:38ZEventCIS Cybersecurity Series (Part 13) - Pranesh Prakash
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash
<b>CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.</b>
<div>
<div><i>"When it comes to things cyber we completely lose our sense of proportion. While killing someone by negligence only attracts two years of punishment, saying something that people can define "offensive" attracts even more under 66A of the Information Technology Act. Something that can be a nuisance, under the Criminal Laws, can attract up to six months punishment, whereas under the IT act, it is up to three years..." - Pranesh Prakash, lawyer and policy director, Centre for Internet and Society</i></div>
<div></div>
<div>Centre for Internet and Society presents its thirteenth installment of the CIS Cybersecurity Series.</div>
<div></div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</div>
<div></div>
<div>Pranesh is a Policy Director with the Centre, and is a graduate of the National Law School of India University, Bangalore, with a degree in Arts and Law.</div>
<div></div>
</div>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/gUDeTeQ6DAg" width="560"></iframe></p>
<div><b><i><br /></i></b></div>
<div><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyber Security FilmCyberculturesCyber SecurityCyber Security Interview2014-01-20T06:20:44ZBlog EntryExposing the Invisible - Tactical Tech films screening at CIS
http://editors.cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis
<b>Exposing the Invisible is Tactical Tech's series of short films examining some inspiring and provocative investigative cases, those that go beyond traditional journalistic investigations. CIS is pleased to invite you to a special screening of two of the films on 9th December, 6pm, at the CIS venue. </b>
<p align="LEFT"><strong><em>Exposing the Invisible</em> </strong>is Tactical Tech's series of short films examining some inspiring and provocative investigative cases, those that go beyond traditional journalistic investigations.</p>
<p align="LEFT">In the past decade, the work of investigators has undergone a significant transformation due to the rapid development of new technologies, the ubiquity of the Internet, and new possibilities in working with evidence, data and visualisation. The stories in the film illustrate this evolution as activists take advantage of this new wave of opportunities, while remaining aware of the dangers they expose themselves to. </p>
<p align="LEFT">Episode one,<strong> Our Currency is Information</strong>, introduces the work of a team of investigators led by Romanian reporter Paul Radu, investigating organised crime. The film takes you to the heart of Radu’s investigations, where the power of criminals, corporations and governments overlap in chilling cases. </p>
<p align="LEFT">Episode two,<strong> From Our Point of View</strong>, profiles three individuals from the UK, Lebanon and Israel, non-specialists who have taken it upon themselves to use information in innovative and varies ways to shed light on Syria's 'YouTube conflict', the theft of Lebanon's seashore, and house demolitions in East Jerusalem.</p>
<p align="LEFT">Episode three,<strong> Unseen War</strong>, touches on the issues of US drone strikes in Pakistan. </p>
<p align="LEFT">More about the project here:</p>
<p align="LEFT"><a href="https://exposingtheinvisible.org/">https://exposingtheinvisible.org/</a></p>
<p align="LEFT">CIS is very excited to participate in the week-long global films festival and will be organizing screenings of Episode one and Episode three on December 9, 2013. The screening of the films will be followed by an interactive discussion on the cases shown in the film, how activism is transforming in India, and how it effects us. </p>
<p align="LEFT"> We look forward to your participation in making this event a success!</p>
<p align="LEFT"> Venue: http://osm.org/go/yy4fIjrQL?m=</p>
<p align="LEFT">Tactical Tech Hompage: <a href="https://www.tacticaltech.org/">https://www.tacticaltech.org/</a></p>
<div> </div>
<p>
For more details visit <a href='http://editors.cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis'>http://editors.cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis</a>
</p>
No publisherpurbaDigital ActivismEvent2013-12-02T07:37:21ZEventDesiSec: Episode 1 - Film Release and Screening
http://editors.cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening
<b>The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec.
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!</b>
<div>Early 2013, the Centre for Internet and Society began shooting its first documentary film project. After months of researching and interviewing activists and experts, CIS is thrilled to announce the release of the first documentary film on cybersecurity in India - <strong>DesiSec: Cybersecurity and Civi Society in India</strong>.</div>
<div> </div>
<div>Trailer link: <a href="http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer">http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</a></div>
<div> </div>
<div>CIS is hosting a special screening of <strong>DesiSec: Episode 1</strong> on <strong>11th December, 2013, 6 pm</strong> and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society.</div>
<div> </div>
<div>We look forward to seeing you there!</div>
<div> </div>
<div>RSVP: <a href="mailto:purba@cis-india.org" target="_blank">purba@cis-india.org</a></div>
<div>Venue: http://osm.org/go/yy4fIjrQL?m=</div>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening'>http://editors.cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening</a>
</p>
No publisherpurbaCyberspacePrivacyCybersecurityInternet GovernanceSurveillanceCyber Security FilmCyber SecurityEvent2013-12-17T08:13:32ZEvent