The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 361 to 375.
Registering for Aadhaar in 2019
http://editors.cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019
<b>It is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.</b>
<p style="text-align: justify; ">The article was published in <a class="external-link" href="https://www.business-standard.com/article/opinion/registering-for-aadhaar-in-2019-119010201018_1.html">Business Standard</a> on January 2, 2019.</p>
<hr />
<p style="text-align: justify; ">Last November, a global committee of lawmakers from nine countries the UK, Canada, Ireland, Brazil, Argentina, Singapore, Belgium, France and Latvia summoned Mark Zuckerberg to what they called an “international grand committee” in London. Mr. Zuckerberg was too spooked to show up, but Ashkan Soltani, former CTO of the FTC was among those who testified against Facebook. He said “in the US, a lot of the reticence to pass strong policy has been about killing the golden goose” referring to the innovative technology sector. Mr. Soltani went on to argue that “smart legislation will incentivise innovation”. This could be done either intentionally or unintentionally by governments. For example, a poorly thought through blocking of pornography can result in innovative censorship circumvention technologies. On other occasions, this can happen intentionally. I hope to use my inaugural column in these pages to provide an Indian example of such intentional regulatory innovation.<br /><br />Eight years ago, almost to this date, my colleague Elonnai Hickok wrote an open letter to the Parliamentary Finance Committee on what was then called the UID or Unique Identity. She compared Aadhaar to the digital identity project started by the National Democratic Alliance (NDA) government in 2001. Like the Vajpayee administration which was working in response to the Kargil War, she advocated a decentralised authentication architecture using smart cards based on public key cryptography. Last year, even before the five-judge constitutional bench struck down Section 57 of the Aadhaar Act, the UIDAI preemptively responded to this regulatory development by launching offline Aadhaar cards. This was to be expected especially since from the A.P. Shah Committee report, the Puttaswamy Judgment, the B.N. Srikrishna Committee consultation paper, report and bill, the principle of “privacy by design” was emerging as a key Indian regulatory principle in the domain of data protection.<br /><br />The introduction of the offline Aadhaar mechanism eliminates the need for biometrics during authentication. I have previously provided 11 reasons why biometrics is inappropriate technology for e-governance applications by democratic governments, and this comes as a massive relief for both human rights activists and security researchers. Second, it decentralises authentication, meaning that there is a no longer a central database that holds a 360-degree view of all incidents of identification and authentication. Third, it dramatically reduces the attack surface for Aadhaar numbers, since only the last four digits remain unmasked on the card. Each data controller using Aadhaar will have to generate his/her own series of unique identifiers to distinguish between residents. If those databases leak or get breached, it won’t tarnish the credibility of Aadhaar or the UIDAI to the same degree. Fourth, it increases the probability of attribution in case a data breach were to occur; if the breached or leaked data contains identifiers issued by a particular data controller, it would become easier to hold them accountable and liable for the associated harms. Fifth, unlike the previous iteration of the Aadhaar “card”, on which the QR code was easy to forge and alter, this mechanism provides for integrity and tamper detection because the demographic information contained within the QR code is digitally signed by the UIDAI. Finally, it retains the earlier benefit of being very cheap to issue, unlike smart cards.<br /><br />Thanks to the UIDAI, the private sector is also being forced to implement privacy by design. Previously, since everyone was responsible for protecting Aadhaar numbers, nobody was. Data controllers would gladly share the Aadhaar number with their contractors, that is, data processors, since nobody could be held responsible. Now, since their own unique identifiers could be used to trace liability back to them, data controllers will start using tokenisation when they outsource any work that involves processing of the collected data. Skin in the game immediately breeds more responsible behaviour in the ecosystem.<br /><br />The fintech sector has been rightfully complaining about regulatory and technological uncertainty from last year’s developments. This should be addressed by developing open standards and free software to allow for rapid yet secure implementation of these changes. The QR code standard itself should be an open standard developed by the UIDAI using some of the best practices common to international standard setting organisations like the World Wide Web Consortium, Internet Engineers Task Force and the Institute of Electrical and Electronics Engineers. While the UIDAI might still choose to take the final decision when it comes to various technological choices, it should allow stakeholders to make contributions through comments, mailing lists, wikis and face-to-face meetings. Once a standard has been approved, a reference implementation must be developed by the UIDAI under liberal licences, like the BSD licence that allows for both free software and proprietary software derivative works. For example, a software that can read the QR code as well as send and receive the OTP to authenticate the resident. This would ensure that smaller fintech companies with limited resources can develop secure systems.<br /><br />Since Justice Dhananjaya Y. Chandrachud’s excellent dissent had no other takers on the bench, holdouts like me must finally register for an Aadhaar number since we cannot delay filing taxes any further. While I would still have preferred a physical digital artefact like a smart card (built on an open standard), I must say it is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019'>http://editors.cis-india.org/internet-governance/blog/business-standard-january-2-2019-registering-for-aadhaar-in-2019</a>
</p>
No publishersunilAadhaarInternet GovernancePrivacy2019-01-03T14:59:04ZBlog EntryThe constitutionality of MHA surveillance order
http://editors.cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order
<b>The rules require review committees to examine all surveillance orders issued under this section every couple of months.</b>
<p style="text-align: justify; ">The article by Nehaa Chaudhari was published in <a class="external-link" href="http://www.asianage.com/360-degree/301218/the-constitutionality-of-mha-surveillance-order.html">Asian Age</a> on December 30, 2018.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; "><b>The MHA notification </b><b>authorising</b><b> 10 agencies to intercept, monitor and decrypt “any information” generated, transmitted, received or stored in “any computer” has kicked up a row. One section calls it electronic surveillance at the behest of the Big Brother. This time the qualitative difference is data stored anywhere, not just data in motion, can be intercepted.</b></p>
<p style="text-align: justify; ">Privacy is a fundamental right in India. Nine Supreme Court judges agreed on this in late August, last year. It is “the constitutional core of human dignity” and flows primarily from the “guarantee of life and personal liberty” of our Constitution, they said, in the case of K.S.Puttaswamy vs Union of India. This meant two rules for the Indian state. Rule number 1.) Do not intrude upon a citizen’s right to life and personal liberty; and rule number 2.) Take all necessary steps to safeguard individual privacy.</p>
<p style="text-align: justify; ">However, because no fundamental right is absolute, the Indian state is allowed to deviate from rule number 1 in certain situations. It can restrict individual privacy provided that it first fulfills three conditions: The restriction must be backed by law; it must be for a legitimate state aim; and, it must be proportionate.</p>
<p style="text-align: justify; ">All laws (including existing ones) and government actions, with consequences for individual privacy, must meet the three conditions listed above to be valid.</p>
<p style="text-align: justify; ">Those that fail to do so are unconstitutional, and must be suitably amended, or will be struck down, as was the case with Section 377 of the Indian Penal Code, earlier this year. Section 69 of the Information Technology Act, under which the Ministry of Home Affairs has issued its recent surveillance order, warrants similar scrutiny.</p>
<p style="text-align: justify; ">Section 69 empowers the Centre and all state governments to authorise any of their officers to surveil citizens’ electronic communications and information. They may do so for any of the reasons laid down in the same section, including India’s sovereignty, integrity, defence, security and foreign relations, or public order, or to prevent the incitement of certain offences, or to investigate any offence. Government orders issued under this section must be reasoned, and in writing. These orders, and the resultant surveillance activity, must follow the procedure laid down in a set of rules framed under the Information Technology Act in 2009. The rules require review committees to examine all surveillance orders issued under this section every couple of months. The review committee at the Centre examines the Union government’s surveillance orders, while state governments’ orders are examined by committees at their respective states. But, review committees, whether at the Centre, or at any of the states, only have<br /> three members each, tasked with reviewing hundreds of orders every day. Moreover, they consist only of government officials. Neither the Information Technology Act, nor the accompanying 2009 rules, require Parliamentary or judicial oversight of electronic surveillance by the executive.</p>
<p style="text-align: justify; ">In the past week, at least two petitions have been filed before the Supreme Court,which claim that the MHA’s surveillance order violates the fundamental right to privacy and is unconstitutional. This order for electronic surveillance is a clear deviation from rule number 1, and so the question before the court will be if it meets each of the conditions above to be valid.</p>
<p style="text-align: justify; ">Is the MHA order lawful? Yes, given as it was framed under the framework of the IT Act. There remains however, a larger question of the constitutionality of Section 69 itself. If the court finds Section 69 itself to be unconstitutional, any action taken pursuant to Section 69, including the recent MHA order, will also be unconstitutional.</p>
<p style="text-align: justify; ">Is the MHA order pursuant to a legitimate state aim? The order itself does not specify what in particular the government hopes to achieve. However, given as it was issued under Section 69, the government could well argue that it was only for the six purposes laid down in the statute.</p>
<p style="text-align: justify; ">Moreover, according to the Supreme Court in the right to privacy judgment, legitimate state aims are “matters of policy to be considered by the Union government.” The court even offered examples of possible legitimate state aims, which included the grounds listed under Section 69.</p>
<p style="text-align: justify; ">Is the MHA order proportionate? No; and neither is the IT Act’s framework dealing with electronic surveillance. The IT Act allows government surveillance of citizens, unchecked by either the legislature, or the judiciary. It creates a scenario where tiny government committees must review the government’s own decisions to curtail citizens’ fundamental rights. Moreover, it penalises individuals with up to seven years in jail, in addition to fines, for not complying with any interception, monitoring, or decryption request by an authorised government agency.</p>
<p style="text-align: justify; ">In light of the recent MHA order, this means that individuals must comply with surveillance requests by 10 government agencies including tax authorities, the police, and civil and military intelligence agencies, or be prepared to face jail time. This is unethical, undemocratic, and unconstitutional.</p>
<p style="text-align: justify; ">Unchecked government surveillance threatens not just an individual’s fundamental right to privacy, but also her fundamental freedoms of speech, movement, and assembly among others, also guaranteed fundamental rights under the Indian Constitution.</p>
<p style="text-align: justify; ">These rights and freedoms are the very essence of what it means to be a free citizen in a modern democracy. A democratic state must only exercise its police powers in the narrowest of circumstances, within bright lines, clearly defined.</p>
<p style="text-align: justify; ">In August, 2017, the Supreme Court laid down the framework to identify these narrow circumstances and bright lines in so far as the fundamental right to privacy was concerned. But, the promise of Puttaswamy is only as good as its implementation, and here lies its biggest challenge.</p>
<p style="text-align: justify; ">As Pranesh Prakash, Fellow at the Centre for Internet and Society, said on a television channel recently, perhaps it is about time that we stopped relying solely on the courts to step in to safeguard our fundamental rights, and started demanding that our elected law-markers did their jobs, or did them better. After all, a general election is but a few months away.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order'>http://editors.cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order</a>
</p>
No publishernehaaInternet Governance2018-12-31T14:06:04ZNews ItemDecember 2018 Newsletter
http://editors.cis-india.org/about/newsletters/december-2018-newsletter
<b>We at the Centre for Internet & Society (CIS) wish you all a great year ahead and welcome you to the twelfth issue of its newsletter (December) for the year 2018: </b>
<h3><b>Highlights</b></h3>
<ul style="text-align: justify; ">
<li>CIS <a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy">signed a MoU</a> with Odia Virtual Academy to work on drafting an open content policy for the state, to promote use of Wikimedia projects by various user types and to ensure sustainability of Wikimedia projects, and to facilitate development of relevant free and open source software projects. This partnership between OVA and CIS will be carried out from December 2018 to November 2019.</li>
<li>Natalia Khaniejo, in a <a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity">four-part report</a> has attempted to document the various approaches that are being adopted by different stakeholders towards incentivizing cybersecurity and the economic challenges of implementing the same. The literature review was edited by Amber Sinha.</li>
<li>Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah <a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic">created an infographic</a> which has mapped the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. The authors have stated that broadly policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem.</li>
<li>In April 2018 European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). Vipul Kharbanda <a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law">has analysed</a> how service providers based in India whose services are also available in Europe would be affected by these proposals.</li>
<li>Feminist research methodology is a vast body of knowledge, spanning across multiple disciplines including sociology, media studies, and critical legal studies. A <a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research">literature review by Ambika Tandon</a> aims to understand key aspects of feminist methodology across these disciplines, with a particular focus on research on technology and its interaction with society.</li>
<li>CIS and design collective Design Beku came together <a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu">for a workshop on Illustrations</a> and Visual Representations of Cybersecurity. The authors Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu have stated that images play a vital role in the public’s perception of cybercrime and cybersecurity. </li>
<li>A list of selected sessions and papers for the Internet Researchers' Conference 2019 (IRC19) <a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers">has been published</a>. IRC19 will be held in Lamakaan, Hyderabad, from Jan 30 to Feb 1, 2019.</li>
</ul>
<h3><b>Articles</b></h3>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security">Private-public partnership for cyber security</a> (Arindrajit Basu; Hindu Businessline; December 24, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle">Is the new ‘interception’ order old wine in a new bottle?</a> (Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare; Newslaundry.com; December 27, 2018).</li>
<li><a href="https://cis-india.org/raw/indian-express-nishant-shah-december-30-2018-digital-native-system-needs-a-robot">Digital Native: System Needs a Reboot</a> (Nishant Shah; Indian Express; December 30, 2018).</li>
</ul>
<h3><b>Media Coverage</b></h3>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/news/deccan-herald-rajitha-menon-december-6-2018-many-sites-bypass-porn-ban">Many sites bypass porn ban</a> (Rajitha Menon; Deccan Herald; December 6, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook">How data privacy and governance issues have battered Facebook ahead of 2019 polls</a> (Rahul Sachitanand; Economic Times; December 6, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls">Is Aadhaar Essential To Achieve Error-Free Electoral Rolls?</a> (Bloomberg Quint; December 16, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy">Centre’s order on computer surveillance threatens right to privacy, experts say</a> (Abhishek Dey; Scroll.in; December 22, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards">Centre’s order on computer surveillance is backed by law – but the law lacks adequate safeguards</a> (Nehaa Chaudhari and Tuhina Joshi; Scroll.in; December 23, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data">Ten Indian government agencies can now snoop on people’s internet data</a> (David Spenser; VPN Compare; December 24, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete">Big Brother is here: Amid snooping row, govt report says monitoring system 'practically complete'</a> (Keerthana Sankaran; New Indian Express; December 26, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content">MHA snoop order & bid to amend IT rules: China-like clampdown or tracking unlawful content?</a> (Fatima Khan; The Print December 28, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech">The dark side of future tech: Where are we headed on privacy, security, truth? </a>(Dipanjan Sinha; Hindustan Times; December 29, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/news/nehaa-chaudhari-asian-age-december-30-2018-constitutionality-of-mha-surveillance-order">The constitutionality of MHA surveillance order</a> (Nehaa Chaudhari; Asian Age; December 30, 2018).</li>
</ul>
<p style="text-align: justify; "><b><a href="http://cis-india.org/a2k">Access to Knowledge</a></b></p>
<p style="text-align: justify; ">Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.</p>
<h3><b>Wikipedia</b></h3>
<p style="text-align: justify; ">As part of the <a href="http://cis-india.org/a2k/access-to-knowledge-program-plan">project grant from the Wikimedia Foundation</a> we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).</p>
<p style="text-align: justify; "><b>Blog Entries</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/punjabi-wikisource-training-workshop-patiala">Punjabi Wikisource Training Workshop, Patiala</a> (Jayanta Nath; December 6, 2018).</li>
<li><a href="https://cis-india.org/indic-wikisource-community-consultation-2018">Indic Wikisource Community Consultation 2018</a> (Jayanta Nath; December 8, 2019).</li>
<li><a href="https://cis-india.org/a2k/blogs/cis-signs-mou-with-odia-virtual-academy">CIS Signs MoU with Odia Virtual Academy</a> (Sailesh Patnaik; December 19, 2018).</li>
</ul>
<h3><b>Openness</b></h3>
<p style="text-align: justify; ">Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.</p>
<p style="text-align: justify; "><b>Guest Lecture</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/openness/news/lecture-on-open-access-and-open-content-licensing-at-icar-short-course">Lecture on Open Access and Open Content Licensing at ICAR (short course)</a> (Organized by ICAR-Indian Institute of Horticultural Research (IIHR) a constituent establishment of Indian Council of Agricultural Research; November 13 - 22, 2018). Anubha Sinha delivered a lecture.</li>
</ul>
<p style="text-align: justify; "><b><a href="http://cis-india.org/internet-governance">Internet Governance</a></b></p>
<p style="text-align: justify; ">As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.</p>
<h3><b>Privacy</b></h3>
<p style="text-align: justify; "><b>Guest Lecture</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/news/teaching-at-shristi-interlude">Teaching at Shristi Interlude</a> (Organised by Shristi; Bangalore; December 7, 2018). Shweta Mohandas participated as a mentor.</li>
</ul>
<h3><b>Gender </b></h3>
<p style="text-align: justify; "><b>Research Paper</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research">Feminist Methodology in Technology Research: A Literature Review</a> (Ambika Tandon with contributions from Mukta Joshi; research assistance by by Kumarjeet Ray and Navya Sharma; design by Saumyaa Naidu; December 23, 2018).</li>
</ul>
<p style="text-align: justify; "><b>Blog Entry</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/blog/intermediary-liability-and-gender-based-violence">Event Report on Intermediary Liability and Gender Based Violence </a>(Akriti Bopanna; edited by Ambika Tandon; December 20, 2018).</li>
</ul>
<p style="text-align: justify; "><b>Participation in Event</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018">International Network on Feminist Approaches to Bioethics 2018</a> (Co-organized by Feminist Approaches to Bioethics and Sama; St. John's Medical College; Bangalore; December 3 - 5, 2018). Aayush Rathi and Ambika Tandon were speakers at the event.</li>
</ul>
<h3><b>Cyber Security</b></h3>
<p style="text-align: justify; "><b>Research Papers</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law">European E-Evidence Proposal and Indian Law</a> (Vipul Kharbanda; December 23, 2018).</li>
<li><a href="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity">Economics of Cybersecurity: Literature Review Compendium</a> (Natalia Khaniejo; edited by Amber Sinha; December 31, 2018).</li>
</ul>
<p style="text-align: justify; "><b>Infographic</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic">Mapping cybersecurity in India: An infographic</a> (information contributed by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah; designed by Saumyaa Naidu; December 23, 2018).</li>
</ul>
<p style="text-align: justify; "><b>Blog Entry</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu">A Critical Look at the Visual Representation of Cybersecurity</a> (Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu; December 11, 2018).</li>
</ul>
<p style="text-align: justify; "><b>Participation in Event</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/news/india-china-tech-forum">India-China Tech Forum 2018</a> (Organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies; Mumbai; December 11 - 12, 2018). Arindrajit Basu was a speaker.</li>
</ul>
<h3><b>Artificial Intelligence </b></h3>
<p style="text-align: justify; "><b>Participation in Event</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/internet-governance/news/future-tech-and-future-law">Future Tech and Future Law</a> (Organised by Dept. of IT & BT, Government of Karnataka; Palace Grounds; Bangalore; November 29 - December 1, 2018). Arindrajit Basu was a speaker.</li>
<li><a href="https://cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit">AI for Social Good Summit</a> (Co-organised by Google AI and United Nations ESCAP; Bangkok; December 13, 2018).</li>
</ul>
<p style="text-align: justify; "><b><a href="http://cis-india.org/raw">Researchers at Work</a></b></p>
<p style="text-align: justify; ">The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:</p>
<p style="text-align: justify; "><b>Selected Papers</b></p>
<ul style="text-align: justify; ">
<li><a href="https://cis-india.org/raw/irc19-list-selected-sessions-papers">Internet Researchers' Conference 2019</a> (IRC19): #List - Selected Sessions and Papers (P.P. Sneha; January 2, 2019).</li>
</ul>
<hr size="2" style="text-align: justify; " width="100%" />
<p style="text-align: justify; "><b>----------------------------------- </b><br /> <a href="http://cis-india.org/">About CIS</a> <br /> <b>----------------------------------- </b><br /> The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.</p>
<p style="text-align: justify; ">► Follow us elsewhere</p>
<ul style="text-align: justify; ">
<li>Twitter:<a href="http://twitter.com/cis_india"> http://twitter.com/cis_india</a> </li>
<li>Twitter - Access to Knowledge: <a href="https://twitter.com/CISA2K">https://twitter.com/CISA2K</a> </li>
<li>Twitter - Information Policy: <a href="https://twitter.com/CIS_InfoPolicy">https://twitter.com/CIS_InfoPolicy</a></li>
<li>Facebook - Access to Knowledge:<a href="https://www.facebook.com/cisa2k"> https://www.facebook.com/cisa2k</a> </li>
<li>E-Mail - Access to Knowledge: a2k@cis-india.org </li>
<li>E-Mail - Researchers at Work: raw@cis-india.org </li>
<li>List - Researchers at Work: <a href="https://lists.ghserv.net/mailman/listinfo/researchers">https://lists.ghserv.net/mailman/listinfo/researchers</a></li>
</ul>
<p style="text-align: justify; ">► Support Us</p>
<p style="text-align: justify; ">Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.</p>
<p style="text-align: justify; ">► Request for Collaboration</p>
<p style="text-align: justify; ">We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at tanveer@cis-india.org.</p>
<p style="text-align: justify; "><i>CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects</i>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/about/newsletters/december-2018-newsletter'>http://editors.cis-india.org/about/newsletters/december-2018-newsletter</a>
</p>
No publisherpraskrishnaResearchers at WorkInternet GovernanceAccess to Knowledge2019-01-08T16:15:38ZPageEconomics of Cybersecurity: Literature Review Compendium
http://editors.cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity
<b>The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.</b>
<hr />
<p style="text-align: justify;" class="moz-quote-pre">Authored by Natallia Khaniejo and edited by Amber Sinha</p>
<hr />
<p style="text-align: justify;" class="moz-quote-pre">Politics and economics are increasingly being amalgamated with Cybernetic frameworks and consequently Critical infrastructure has become intrinsically dependent on Information and Communication Technology (ICTs). The rapid evolution of technological platforms has been accompanied by a concomitant rise in the vulnerabilities that accompany them. Recurrent issues include concerns like network externalities, misaligned incentives and information asymmetries. Malignant actors use these vulnerabilities to breach secure systems, access and sell data, and essentially destabilize cyber and network infrastructures. Additionally, given the relative nascence of the realm, establishing regulatory policies without limiting innovation in the space becomes an additional challenge as well. The lack of uniform understanding regarding the definition and scope of what can be defined as Cybersecurity also serves as a barrier preventing the implementation of clear guidelines. Furthermore, the contrast between what is convenient and what is ‘sanitary’ in terms of best practices for cyber infrastructures is also a constant tussle with recommendations often being neglected in favor of efficiency. In order to demystify the security space itself and ascertain methods of effective policy implementation, it is essential to take stock of current initiatives being proposed for the development and implementation of cybersecurity best practices, and examine their adequacy in a rapidly evolving technological environment. This literature review attempts to document the various approaches that are being adopted by different stakeholders towards incentivizing cybersecurity and the economic challenges of implementing the same.</p>
<p style="text-align: justify;" class="moz-quote-pre">Click on the below links to read the entire story:</p>
<ul>
<li><a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-i">Economics of Cybersecurity Part I</a></li></ul>
<ul>
<li><a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-ii">Economics of Cybersecurity Part II</a></li></ul>
<ul>
<li><a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iii">Economics of Cybersecurity Part III</a></li></ul>
<ul>
<li><a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iv">Economics of Cybersecurity Part IV</a></li></ul>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity'>http://editors.cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity</a>
</p>
No publisherNatallia KhaniejoCyber SecurityInternet Governance2021-05-01T06:09:09ZBlog EntryMHA snoop order & bid to amend IT rules: China-like clampdown or tracking unlawful content?
http://editors.cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content
<b>An MHA order last week authorised 10 government agencies to scan data on computers. This was followed by the Modi government’s proposal to amend the Information Technology rules for social media platforms like WhatsApp, Facebook and Twitter to “proactively identify, remove or disable access to unlawful information or content” in order to curb fake news online.</b>
<p style="text-align: justify; ">The article by Fatima Khan was <a class="external-link" href="https://theprint.in/talk-point/mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content/170167/">published in the Print</a> on December 28, 2018. Amber Sinha was quoted.</p>
<hr style="text-align: justify; " />
<h3 style="text-align: justify; ">No concrete steps taken by either NDA or UPA to enact laws for surveillance reform</h3>
<p style="text-align: justify; ">The <a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf">MHA order</a> which gives 10 government agencies the power to intercept, monitor and decrypt ‘any information’ generated, transmitted, received, or stored in any computer, reaffirms the sorry state of communication surveillance law in India. This is reflected in the lack of judicial review, minimal legislative oversight and no regard for the principles of necessity, proportionality, user notification and transparency.</p>
<p style="text-align: justify; ">Despite detailed <a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf">recommendations</a> by the Committee of Experts led by Justice AP Shah back in 2013, there have been no concrete steps taken by either the current NDA government or the previous UPA government to enact laws for surveillance reform. The <a href="http://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf">draft bill</a> by the committee led by Justice Srikrishna does refer to the principles of necessity and proportionality, but stops short of recommending an overhaul of the surveillance regime. This notification is but merely the logical next step in the existing framework for communications surveillance.</p>
<p style="text-align: justify; ">On the other hand, the <a href="http://meity.gov.in/writereaddata/files/Draft_Intermediary_Amendment_24122018.pdf">draft amendments</a> to the IT Act regulations seek to address the problem of ‘unlawful content’ and seem to stem largely from concerns about the use of platforms like Facebook and WhatsApp to spread disinformation and impact electoral processes in India. To that extent, these steps are misguided and betray a failure to engage with the actual problem. Already, the powers of content moderation exercised by online platforms suffer from problems of transparency and accountability. The draft regulations will only serve to compound this problem while unreasonably expecting the platforms to exercise powers which should require judicial determination.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content'>http://editors.cis-india.org/internet-governance/news/the-print-december-28-2018-mha-snoop-order-bid-to-amend-it-rules-china-like-clampdown-or-tracking-unlawful-content</a>
</p>
No publisherAdminInternet GovernanceCensorship2018-12-30T10:08:31ZNews ItemThe dark side of future tech: Where are we headed on privacy, security, truth?
http://editors.cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech
<b>#2018 Year-End Special: We now live in a time when devices listen, chips track your choices, and governments can watch from behind a barcode. How do we navigate this world?</b>
<p style="text-align: justify; ">The article by Dipanjan Sinha was published in the <a class="external-link" href="https://www.hindustantimes.com/tech/the-dark-side-of-future-tech-where-are-we-headed-on-privacy-security-truth/story-EEdRPH5Qcr9MDP6tB9m4QK.html">Hindustan Times</a> on December 29, 2018. Pranesh Prakash was quoted.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">“One of the definitions of sanity is the ability to tell real from unreal. Soon we’ll need a new definition,” Alvin Toffler, author of the 1970 bestseller Future Shock, once said.</p>
<p style="text-align: justify; ">Privacy. Security. Freedom. Democracy. History. News — the lines between the real and unreal are blurring in each of these fields.</p>
<p style="text-align: justify; ">Fake news is helping decide elections; history being rewritten as it happens; rumour has become identical in look, feel and distribution to the actual news.</p>
<p style="text-align: justify; ">Devices that listen, governments that watch you from behind a barcode, chips that track where you go, what you eat, how you feel — these used to be the stuff of dystopian novels.</p>
<p style="text-align: justify; ">In April, the world learnt of the Chinese government’s social credit system, a programme currently in the works that would employ private technology platforms and local councils to use personal data to assign a social score to every registered citizen.</p>
<p style="text-align: justify; ">Behave as the state wants you to, and you could get cheaper loans, easier access to education; it’s unclear what the consequences could be for those who do the opposite, but discredits are likely for bad behaviours that range from smoking in non-smoking zones to buying ‘too many’ video games, and being critical of the government.</p>
<p style="text-align: justify; ">We’ve seen this before — totalitarian governments where the individual is under constant surveillance by a state that pretends this is for the greater good. But the last time we came across it, it was fiction — George Orwell’s 1984, set in a superstate where thought police took their orders from a totalitarian leader with a friendly name, Big Brother.</p>
<p style="text-align: justify; "> </p>
<p><aside>
<ul class="row latest-news-bx">
</ul>
</aside></p>
<p style="text-align: justify; "><b>CATCH-22 </b></p>
<p style="text-align: justify; ">“Just because you’re paranoid doesn’t mean they aren’t out to get you,” Joseph Heller said, in Catch-22, a novel so layered that you’re never sure which bits are true. Who gets access to the data your phone collects? What is the government watching for, after they’ve assigned citizens unique IDs?</p>
<p style="text-align: justify; ">It feels good to be able to criticise China, still something of an anomaly in a global community that is largely democratic and free-market, but the UK had a National Identity Cards Act from 2006 to 2010; India has the Aadhar project; Brazil has had the National Civil Identification document since 2017; Germany, a national identity card since 2010, and Colombia has had one since 2013.</p>
<p style="text-align: justify; ">They’re collecting biometric data, assigning numbers to citizens and building national registers — with not much word on what’s in them, who has access, or how secure they are.</p>
<p style="text-align: justify; ">“To ask what the risk is with accumulating such big data is like asking what the risk is with computers. They are both embedded in our lives,” says Pranesh Prakash, a fellow at the thinktank Centre for Internet and Society.</p>
<p style="text-align: justify; ">Security is just the base layer in the pyramid if risks. There is also the risk of discrimination — whether in terms of benefits, employment, or something like marriage, Prakash says. There is the risk of bad data leading to worse discrimination; there is the risk of public profiling.</p>
<p style="text-align: justify; ">“The question here is about transparency,” Prakash says. “The questions of what the data contains, who it is accessed by or sold do, how much of it there is, and what the purpose is of collecting it — need to be clearly answered.”</p>
<p style="text-align: justify; "><b>OPERATION THEATRE</b></p>
<p style="text-align: justify; ">New questions are being asked in the field of medicine as well. Where do you draw the line on designer babies? Should parents get to edit the genes of their child-to-be? How much ought we to tinker — do you stop at mutations, or go on to decide hair colour and intellect?</p>
<p style="text-align: justify; ">As it becomes cheaper and easier to sequence DNA, the questions over the next steps — of interpreting and analysing the data — will become more complex, says K VijayRaghavan, principal scientific adviser to the government of India, and former director of the National Centre for Biological Sciences. “From here on, with the data deluge, deciding what and how to do it will become fiendishly complex. Especially as commercial interests become involved.”</p>
<p style="text-align: justify; ">We have rules and laws for the use of DNA information in research, but corresponding laws that regulate how one can use personal whole genome information in the public space are still being framed. “The data-privacy discussion will soon get to the genomic-data space,” VijayRaghavan says. “Data sharing is needed for patients to benefit. Yet data privacy is needed to prevent exploitative use. It’s a conundrum, and there are no easy answers.”</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech'>http://editors.cis-india.org/internet-governance/news/hindustan-times-dipanjan-sinha-december-29-2018-the-dark-side-of-future-tech</a>
</p>
No publisherAdminInternet GovernancePrivacy2018-12-30T09:24:40ZNews ItemIs the new ‘interception’ order old wine in a new bottle?
http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle
<b>The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.</b>
<p style="text-align: justify; ">An opinion piece co-authored by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare was published in <a class="external-link" href="https://www.newslaundry.com/2018/12/27/is-the-new-interception-order-old-wine-in-a-new-bottle">Newslaundry.com</a> on December 27, 2018.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">On December 20, 2018, through an <a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" target="_blank">order</a> issued by the Ministry of Home Affairs (MHA), 10 security agencies—including the Intelligence Bureau, the Central Bureau of Investigation, the Enforcement Directorate and the National Investigation Agency—were listed as the intelligence agencies in India with the power to intercept, monitor and decrypt "any information" generated, transmitted, received, or stored in any computer under Rule 4 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, framed under section 69(1) of the IT Act.</p>
<p style="text-align: justify; ">On December 21, the Press Information Bureau published a <a href="http://www.pib.nic.in/PressReleseDetail.aspx?utm_campaign=fullarticle&utm_medium=referral&PRID=1556945" target="_blank">press release</a> providing clarifications to the previous day’s order. It said the notification served to merely reaffirm the existing powers delegated to the 10 agencies and that no new powers were conferred on them. Additionally, the release also stated that “adequate safeguards” in the IT Act and in the Telegraph Act to regulate these agencies’ powers.</p>
<p style="text-align: justify; ">Presumably, these safeguards refer to the Review Committee constituted to review orders of interception and the prior approval needed by the Competent Authority—in this case, the secretary in the Ministry of Home Affairs in the case of the Central government and the secretary in charge of the Home Department in the case of the State government.</p>
<p style="text-align: justify; ">As noted in the press release, the government has always had the power to authorise intelligence agencies to submit requests to carry out the interception, decryption, and monitoring of communications, under Rule 4 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, framed under section 69(1) of the IT Act.</p>
<p style="text-align: justify; ">When considering the implications of this notification, it is important to look at it in the larger framework of India’s surveillance regime, which is made up of a set of provisions found across multiple laws and operating licenses with differing standards and surveillance capabilities.</p>
<p style="text-align: justify; ">- Section 5(2) of the Indian Telegraph Act, 1885 allows the government (or an empowered authority) to intercept or detain transmitted information on the grounds of a public emergency, or in the interest of public safety if satisfied that it is necessary or expedient so to do in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of an offence. This is supplemented by Rule 419A of the Indian Telegraph Rules, 1951, which gives further directions for the interception of these messages.</p>
<p style="text-align: justify; ">- Condition 42 of the <a href="http://www.dot.gov.in/sites/default/files/DOC270613-013.pdf" target="_blank">Unified Licence for Access Services</a>, mandates that every telecom service provider must facilitate the application of the Indian Telegraph Act. Condition 42.2 specifically mandates that the license holders must comply with Section 5 of the same Act.</p>
<p style="text-align: justify; ">- Section 69(1) of the Information Technology Act and associated Rules allows for the interception, monitoring, and decryption of information stored or transmitted through any computer resource if it is found to be necessary or expedient to do in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence.</p>
<p style="text-align: justify; ">- Section 69B of the Information Technology Act and associated Rules empowers the Centre to authorise any agency of the government to monitor and collect traffic data “to enhance cyber security, and for identification, analysis, and prevention of intrusion, or spread of computer contaminant in the country”.</p>
<p style="text-align: justify; ">- Section 92 of the CrPc allows for a Magistrate or Court to order access to call record details.</p>
<p style="text-align: justify; ">Notably, a key difference between the IT Act and the Telegraph Act in the context of interception is that the Telegraph Act permits interception for preventing incitement to the commission of an offence on the condition of public emergency or in the interest of public safety while the IT Act permits interception, monitoring, and decryption of any cognizable offence relating to above or for investigation of any offence. Technically, this difference in surveillance capabilities and grounds for interception could mean that different intelligence agencies would be authorized to carry out respective surveillance capabilities under each statute. Though the Telegraph Act and the associated Rule 419A do not contain an equivalent to Rule 4—<a href="https://mha.gov.in/MHA1/Par2017/pdfs/par2013-pdfs/ls-110214/294.pdf" target="_blank">nine Central Government agencies and one State Government agency</a> have previously been authorized under the Act. The Central Government agencies authorised under the Telegraph Act are the same as the ones mentioned in the December 20 notification with the following differences:</p>
<p style="text-align: justify; ">- Under the Telegraph Act, the Research and Analysis Wing (RAW) has the authority to intercept. However, the 2018 notification more specifically empowers the Cabinet Secretariat of RAW to issue requests for interception under the IT Act.</p>
<p style="text-align: justify; ">- Under the Telegraph Act, the Director General of Police, of concerned state/Commissioner of Police, Delhi for Delhi Metro City Service Area, has the authority to intercept. However, the 2018 notification specifically authorises the Commissioner of Police, New Delhi with the power to issue requests for interception.</p>
<p style="text-align: justify; ">That said, the<a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" target="_blank"> IT (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009 </a>under 69B of the IT Act contain a provision similar to Rule 4 of the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 - allowing the government to authorize agencies that can monitor and collect traffic data. In 2016, the Central Government <a href="http://meity.gov.in/writereaddata/files/69B%20Notification%20-April%202016.pdf" target="_blank">authorised</a> the Indian Computer Emergency Response Team to monitor and collect traffic data, or information generated, transmitted, received, or stored in any computer resource. This was an exercise of the power conferred upon the Central Government by Section 69B(1) of the IT Act. However, this notification does not reference Rule 4 of the IT Rules, thus it is unclear if a similar notification has been issued under Rule 4.</p>
<p style="text-align: justify; ">While it is accurate that the order does not confer new powers, areas of concern that existed with India’s surveillance regime continue to remain including the question of whether 69(1) and 69B and associated Rules are <a href="https://thewire.in/government/narendra-modi-snooping-it-act-home-ministry" target="_blank">constitutionally</a> valid, the lack of t<a href="https://cis-india.org/internet-governance/blog/transparency-in-surveillance" target="_blank">ransparency</a> by the government and the prohibition of transparency by service providers, <a href="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations" target="_blank">heavy handed </a>penalties on service providers for non-compliance, and a lack of legal backing and <a href="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance" target="_blank">oversight</a> mechanisms for intelligence agencies. Some of these could be addressed if the draft Data Protection Bill 2018 is enacted and the Puttaswamy Judgement fully implemented.</p>
<p style="text-align: justify; "><b>Conclusion</b></p>
<p style="text-align: justify; ">The MHA’s order and the press release thereafter have served to publicise and provide needed clarity with respect to the powers vested in which intelligence agencies in India under section 69(1) of the IT Act. This was previously unclear and could have posed a challenge to ensuring oversight and accountability of actions taken by intelligence agencies issuing requests under section 69(1) .</p>
<p style="text-align: justify; ">The publishing of the list has subsequently served to raise questions and create a debate about key issues concerning privacy, surveillance and state overreach. On <a href="https://barandbench.com/ministry-of-home-affairs-surveillance-order-challenged-in-supreme-court/" target="_blank">December 24</a>, the order was challenged by advocate ML Sharma on the grounds of it being illegal, unconstitutional and contrary to public interest. Sharma in his contention also stated the need for the order to be tested on the basis of the right to privacy established by the Supreme Court in Puttaswamy which laid out the test of necessity, legality, and proportionality. According to this test, any law that encroaches upon the privacy of the individual will have to be justified in the context of the right to life under Article 21.</p>
<p style="text-align: justify; ">But there are also other questions that exist. India has multiple laws enabling its surveillance regime and though this notification clarifies which intelligence agencies can intercept under the IT Act, it is still seemingly unclear which intelligence agencies can monitor and collect traffic data under the 69B Rules. It is also unclear what this order means for past interceptions that have taken place by agencies on this list or agencies outside of this list under section 69(1) and associated Rules of the IT Act. Will these past interceptions possess the same evidentiary value as interceptions made by the authorised agencies in the order?</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle'>http://editors.cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle</a>
</p>
No publisherElonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. BidareIT ActPrivacyInternet GovernanceCyber SecurityInformation Technology2018-12-29T16:02:00ZBlog EntryIndia-China Tech Forum 2018
http://editors.cis-india.org/internet-governance/news/india-china-tech-forum
<b>Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.</b>
<p class="moz-quote-pre" style="text-align: justify; ">Arindrajit spoke on the panel 'India, China and the future of cyber norms' along with Saravjit Singh,Liu Ke and Weng Wejia. This was a closed door discussion under Chatham House rules. Click <a class="external-link" href="http://cis-india.org/internet-governance/files/india-china-tech-forum-2018">here</a> to read the agenda.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/india-china-tech-forum'>http://editors.cis-india.org/internet-governance/news/india-china-tech-forum</a>
</p>
No publisherAdminCyber SecurityInternet Governance2018-12-26T15:32:20ZNews ItemBig Brother is here: Amid snooping row, govt report says monitoring system 'practically complete'
http://editors.cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete
<b>The recently released 2017-18 annual report of the Centre for Development of Telematics (C-DOT) says that surveillance equipment is being rolled out in 21 service areas across the country.</b>
<p style="text-align: justify; ">The article by Keerthana Sankaran was published in <a class="external-link" href="http://www.newindianexpress.com/nation/2018/dec/24/big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete-1915866.html">New Indian Express</a> on December 26, 2018.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">While last week's government order on snooping caused an uproar, the Centre's plans for a far-reaching monitoring system have been in the making for almost a decade -- with the groundwork being done by the previous UPA regime. The recently released 2017-18 annual report of the Centre for Development of Telematics (C-DOT) says that India’s ‘Central Monitoring System’ (CMS) is “practically complete”, confirming that the Orwellian ‘Big Brother’ is here.</p>
<p style="text-align: justify; ">The report says that surveillance equipment is being rolled out in 21 service areas across the country and operations have commenced in 12 service areas. The system will monitor and intercept calls and messages.</p>
<p style="text-align: justify; ">The government claims the CMS is based on the Telegraph Act of 1885 which states that the central or state government may intercept messages if the government is “satisfied that it is necessary or expedient to do so in the interests of the sovereignty and integrity of India, the security of the state, friendly relations with foreign states or public order or for preventing incitement to the commission of an offence.”</p>
<p style="text-align: justify; ">Even though the surveillance system was publicly announced in 2009, C-DOT’s annual report of 2007-2008 had hinted at a testing phase for a “lawful interception, monitoring” system.</p>
<p style="text-align: justify; ">A post from the website of the Centre for Internet and Society describes how the CMS could work. Network providers are all required to give interconnected Regional Monitoring Centres access to their network servers. The article also points out that there is no law that describes the CMS.</p>
<p style="text-align: justify; ">The CMS was approved by the Cabinet Committee on Security during the UPA government in 2011, receiving flak from experts and the press for not safeguarding the citizen’s right to privacy. However, in a Lok Sabha session in May 2016, Telecom Minister Ravi Shankar Prasad said that the system is for the “process of lawful interception”, adding that regional monitoring centres in Delhi and Mumbai had been operationalised.</p>
<p style="text-align: justify; ">The latest C-DOT report also talks about a Centre of Excellence for Lawful Interception being set up, which would use high-end technologies - such as open source intelligence, image processing and search engine tools to scan Twitter and Facebook - for surveillance.</p>
<p style="text-align: justify; ">On Thursday, the Ministry of Home Affairs released a notification, authorising 10 central agencies to intercept, monitor and decrypt any "information generated, transmitted, received or stored in any computer." While the public and opposition parties expressed alarm over the new order, the C-DOT report clearly shows that state surveillance plans are already in an advanced stage.</p>
<p style="text-align: justify; ">These government moves are taking place despite the August 2017 landmark judgement by the Supreme Court, which declared the right to privacy as a fundamental right which will protect citizens from intrusive activities by the state.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete'>http://editors.cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete</a>
</p>
No publisherAdminInternet GovernancePrivacy2018-12-26T15:22:27ZNews ItemPrivate-public partnership for cyber security
http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security
<b>Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security. </b>
<p style="text-align: justify; ">The article by Arindrajit Basu was published in <a class="external-link" href="https://www.thehindubusinessline.com/opinion/private-public-partnership-for-cyber-security/article25821899.ece">Hindu Businessline</a> on December 24, 2018.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">On November 11, 2018, as 70 world leaders gathered in Paris to commemorate the countless lives lost in World War I, French President Emmanuel Macron inaugurated the Paris Peace Forum with a fiery speech denouncing nationalism and urging global leaders to pursue peace and stability through multilateral initiatives.</p>
<p style="text-align: justify; ">In many ways, it echoed US President Woodrow Wilson’s monumental speech delivered at the US Senate a century ago in which he outlined 14 points on the principles for peace post World War I. As history unkindly reminds us through the catastrophic realities of World War II, Wilson’s principles went on to be sacrificed at the altar of national self-interest and inadequate multilateral enforcement.</p>
<p style="text-align: justify; ">President Macron’s first initiative for global peace — the Paris Call for Trust and Security in Cyber Space was unveiled on November 12 — at the UNESCO Internet Governance Forum — also taking place in Paris. The call was endorsed by over 50 states, 200 private sector entities, including Indian business guilds such as FICCI and the Mobile Association of India and over 100 organisations from civil society and academia from all over the globe. The text essentially comprises a set of high-level principles that seeks to prevent the weaponisation of cyberspace and promote existing institutional mechanisms to “limit hacking and destabilising activities” in cyberspace.</p>
<h2 style="text-align: justify; ">Need for private participation</h2>
<p style="text-align: justify; ">Given the increasing exploitation of the internet for reaping offensive dividends by state and non-state actors alike and the prevailing roadblocks in the multilateral cyber norms formulation process, Macron’s efforts are perhaps of Wilsonian proportions.</p>
<p style="text-align: justify; ">A key difference, however, was that Macron’s efforts were devised hand-in-glove with Microsoft — one of the most powerful and influential private sector actors of our time. Microsoft’s involvement is unsurprising given that private entities have become a critical component of the global cybersecurity landscape and governments need to start thinking about how to optimise their participation in this process.</p>
<p style="text-align: justify; ">Indeed, one of the defining features of cyberspace is its incompatibility with state-centric ‘command and control’ formulae that lead to the ordering of other global security regimes — such as nuclear non-proliferation. The decentralised nature of cyberspace means that private sector actors play a vital role in implementing the rules designed to secure cyberspace.</p>
<p style="text-align: justify; ">Simultaneously, private actors such as Microsoft have recognised the utility of clearly defined ‘rules of the road’ which ensure certainty and stability in cyberspace and ensure its trustworthiness among global customers.</p>
<h2 style="text-align: justify; ">Normative deadlock</h2>
<p style="text-align: justify; ">There have been multiple gambits to develop universal norms of responsible state behaviour to foster cyber stability. The United Nations-Group of Governmental Experts (UN-GGE) has been constituted five times now and will meet again in January 2019.</p>
<p style="text-align: justify; ">While the third and fourth GGEs in 2013 and 2015 respectively made some progress towards agreeing on some baseline principles, the fifth GGE broke down due to opposition from states including Russia, China and Cuba on the application of specific principles of international law to cyberspace.</p>
<p style="text-align: justify; ">This was an extension of a long-running ‘Cold War’ like divide among states at the United Nations. The US along with its NATO allies believe in creating voluntary non-binding norms for cybersecurity through the application of international law in its entirety while Russia, China and its allies in the Shanghai Co-operation Organization (SCO) reject the premise that international law applies in its entirety and call for the negotiation of an independent treaty for cyberspace that lays down binding obligations on states.</p>
<h2 style="text-align: justify; ">Critical role</h2>
<p style="text-align: justify; ">The private sector has begun to play a critical role in breaking this deadlock. Recent history is testament to catalytic roles played by non-state actors in cementing global co-operative regimes.</p>
<p style="text-align: justify; ">For example, Dupont — the world’s leading ChloroFluoroCarbon (CFC) producer — played a leading role in the 1970s and 1980s towards the development of The Montreal Protocol on Substances that Deplete the Ozone Layer and gained positive recognition for its efforts.</p>
<p style="text-align: justify; ">Another example is the International Committee of the Red Cross (ICRC) — a non-governmental organisation that played a crucial role in the development of the Geneva Conventions and its Additional Protocols, which regulate the conduct of atrocities in warfare by preparing initial drafts of the treaties and circulating them to key government players.</p>
<p style="text-align: justify; ">Similarly, in cyberspace, Microsoft’s Digital Geneva Convention which devised a set of rules to protect civilian use of the internet was put forward by Chief Legal Officer, Brad Smith two months before the fifth GGE met in 2017.</p>
<p style="text-align: justify; ">Despite the breakdown at the UN-GGE, Microsoft pushed on with the Tech Accords — a public commitment made by (as of today) 69 companies “agreeing to defend all customers everywhere from malicious attacks by cyber-criminal enterprises and nation-states.”</p>
<p style="text-align: justify; ">Much like the ICRC, Microsoft leads commendable diplomatic efforts with the Paris Call as they reached out to states, civil society actors and corporations for their endorsement.</p>
<h2 style="text-align: justify; ">Looking Forward</h2>
<p style="text-align: justify; ">Private sector-led normative efforts towards securing cyberspace are redundant in the absence of three key recommendations. First, is the implementation of best practices at the organisational level through the implementation of robust cyber defense mechanisms, the detection and mitigation of vulnerabilities and breach notifications — both to consumer and the government.</p>
<p style="text-align: justify; ">Second, is the development of mechanisms that enables direct co-operation between governments and private actors at the domestic level. In India, a Joint Working Group between the Data Security Council of India (DSCI) and the National Security Council Secretariat (NSCS) was set up in 2012 to explore a Private Public Partnership on cyber-security in India , which has great potential but is yet to report any tangible outcomes.</p>
<p style="text-align: justify; ">The third and final point is the recognition that their efforts need to result in a plurality of states coming to the negotiating table. The absence of the US, China and Russia in the Paris Call are eerily reminiscent of the lack of US participation in Woodrow Wilson’s League of Nations, which was one of the reasons for its ultimate failure.</p>
<p style="text-align: justify; ">Microsoft needs to keep on calling with Paris but Beijing, Washington and Alibaba need to pick up.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security'>http://editors.cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security</a>
</p>
No publisherbasuCyber SecurityInternet Governance2018-12-26T15:02:21ZBlog EntryHow data privacy and governance issues have battered Facebook ahead of 2019 polls
http://editors.cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook
<b>Rohit S, an airline pilot, had enough of Facebook. With over 1,000 friends and part of at least a dozen groups on subjects ranging from planes to politics, the 34-year-old found himself constantly checking his phone for updates and plunging headlong into increasingly noisy debates, where he had little personal connect.</b>
<p>The article by Rahul Sachitanand was <a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/how-data-privacy-and-governance-issues-have-battered-facebook-ahead-of-2019-polls/articleshow/67004685.cms">published in Economic Times</a> on December 9, 2018. Elonnai Hickok was quoted.</p>
<hr />
<p style="text-align: justify; ">While he had originally signed up with Facebook a decade ago to reconnect with school classmates, he found himself more and more disconnected from the sprawl the social network had become. “It was a mess of impersonal shares, unverified half-truths and barely any personal updates,” he says, a week after permanently logging out. “I’d rather reconnect the old-fashioned way.”<br /><br />This kind of user disenchantment has become increasingly common among Facebook users. Many like Rohit, who signed up with more altruistic aims, find themselves distanced by how the social networking platform has evolved.<br /><br />All through 2018, Facebook and its embattled cofounder, Mark Zuckerberg, have found themselves battling one fire after another. Starting with the mess involving Cambridge Analytica and ending with the document dump unearthed by UK’s Parliament this week (that showed the firm as a cut-throat corporation at best), this has been a year to forget. “Unfortunately, Facebook cannot be trusted with the privacy of its users’ data,” says Alessandro Acquisti, professor, Carnegie Mellon University. “Time and again, Facebook has shown a cavalier attitude towards the handling of users’ data as well as towards informing users clearly and without deception about the actual extent of Facebook’s data collection and handling policies.”<br /><br />This perception has caused problems with Facebook, both around the world and at home, with privacy advocates pushing for stronger monitoring to counter the seeming free reign enjoyed by the platform.<br /><br />Mishi Choudhary, legal director of Software Freedom Law Center in the US and Mishi Choudhary and Associates, a New Delhi-law firm, says the pay-for-data model necessitates a stronger data protection regime that doesn’t leave users at the mercy of self-governing corporate entities.<br /><br />“The contrast between Facebook’s public statements and private strategies to monetise user data reveals the truth of surveillance capitalism carried out stealthily and steadily,” she says.<br /><br />In an election year in India, this could cause problems for Facebook.<br /><br />The company has already tried to clean up its act, implementing more transparent political advertising norms and looking to clean up fake news claims (on itself and WhatsApp, the messaging platform it owns) to try to win back user trust. Facebook has also launched video monetisation capabilities and Lasso, a short video offering similar to Tik Tok, the Chinese startup that has been massively popular here. The company, that has over 250 million users in India, plans to train five million people on digital technologies in three years, to try to increase awareness.<br /><br />Facebook didn’t respond to an email seeking more specific comments for this piece.</p>
<p style="text-align: justify; ">In a country where privacy legislation is yet in the works, experts are worried about the overt and covert interest in users’ private data. Hundreds of millions of users here, many unwittingly, accepting user terms and giving apps too many permissions could easily give away confidential information, the experts argue. This is especially so in the case of Android users in the country, who access the web on cheap handsets and don’t have a full understanding of what they sign up for. “Very few people know about the origin or provenance of apps that they download or what data they track or phone features that they access,” says Shiv Putcha, founder and principal analyst, Mandala Insights, a telecom consultancy. “These are all potential security breaches of a massive order.”<br /><br />Alessandro Acquisti, professor, Carnegie Mellon University. This situation has privacy advocates closely watching Facebook and pushing for more stringent rules to monitor the company. "The criticality of human rights impact assessment for all products and services by companies like Facebook is underscored," says Elonnai Hickok, from the Centre for Internet and Society, a think tank in Bengaluru. "To build user trust, these assessments should be made public."<br /><br />As India finalises its privacy legislation, it is important to ensure that such assessments are undertaken according to law, citizens and their rights are upheld and companies are held accountable. "This also demonstrates that India needs a privacy legislation that allows the government to address a situation if data of Indian citizens is impacted."</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook'>http://editors.cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook</a>
</p>
No publisherAdminInternet GovernancePrivacy2018-12-25T01:43:59ZNews ItemIs Aadhaar Essential To Achieve Error-Free Electoral Rolls?
http://editors.cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls
<b>The Election Commission’s plans to link Aadhaar with electoral rolls may have stirred a hornet’s nest.</b>
<p style="text-align: justify; ">The article was published in <a class="external-link" href="https://www.bloombergquint.com/politics/is-aadhaar-essential-to-achieve-error-free-electoral-rolls">Bloomberg's Quint</a> on December 16, 2018. Pranesh Prakash was quoted.</p>
<hr />
<p style="text-align: justify; ">The commission plans to undertake the exercise to clean up electoral rolls—which need to be updated frequently to avoid duplication and errors, <i>The Economic Times</i> newspaper reported citing people aware of the matter. But with privacy concerns raised against the Aadhaar, is this the best way to achieve error-free voter data?</p>
<p style="text-align: justify; ">Pranesh Prakash, policy director at the Centre for Internet and Society, doesn’t think so. Using Aadhaar data without the consent of the user poses legal problems, he told BloombergQuint in a conversation. “For the Election Commission to link Aadhaar with citizens’ voter ID would require amending the law.”</p>
<blockquote style="text-align: justify; ">It is questionable whether this will fall within the bounds that the SC has set for usage of Aadhaar.</blockquote>
<p style="text-align: justify; ">Pranesh Prakash, Policy Director, Centre for Internet and Society</p>
<p style="text-align: justify; ">The former legal advisor of the Election Commission SK Mendiratta, however, brushed aside privacy concerns relating to the process. The Election Commission, according to him, is a constitutional body and can use information with the government to ensure purity of the electoral roll.</p>
<p style="text-align: justify; ">Reetika Khera, associate professor at Indian Institute of Management-Ahmedabad, said this could be bad for voters. She cited the mass deletion of voters from electoral rolls in Telangana ahead of the recent elections, and urged that due process must be followed.</p>
<blockquote style="text-align: justify; ">There are serious problems with the use of algorithmic approaches in various spheres. Aadhaar as a tool to clean up the electoral rolls is the problem.</blockquote>
<p style="text-align: justify; ">Reetika Khera, Associate Professor, IIM Ahmedabad</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls'>http://editors.cis-india.org/internet-governance/news/bloomberg-quint-december-16-2018-is-aadhaar-essential-to-achieve-error-free-electoral-rolls</a>
</p>
No publisherpraskrishnaAadhaarInternet GovernancePrivacy2018-12-25T01:21:45ZNews ItemAI for Social Good Summit
http://editors.cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit
<b>Arindrajit Basu was a speaker at the event co-organized by Google AI and United Nations ESCAP on December 13, 2018 in Bangkok, Thailand.</b>
<p class="moz-quote-pre" style="text-align: justify; ">Arindrajit spoke at the panel " How can governments use AI in Public Service Delivery" along with Malavika Jayaram, Jake Lucci,Punit Shukla,Simon Schmooly and Gal Oren. He presented CIS research on AI in agriculture in Karnataka-which will be published as part of a compendium documenting case studies worldwide soon.</p>
<p class="moz-quote-pre" style="text-align: justify; "><a class="external-link" href="http://cis-india.org/internet-governance/files/ai-for-social-good-summit">Click to read more</a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit'>http://editors.cis-india.org/internet-governance/news/unescap-and-google-ai-december-13-bangkok-ai-for-social-good-summit</a>
</p>
No publisherAdminInternet GovernanceArtificial Intelligence2018-12-25T01:02:01ZNews ItemCentre’s order on computer surveillance threatens right to privacy, experts say
http://editors.cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy
<b>The Constitutional validity of the notification allowing ten agencies to intercept information is uncertain.</b>
<p style="text-align: justify; ">The blog post by Abhishek Dey was <a class="external-link" href="https://scroll.in/article/906623/centres-order-on-computer-surveillance-threatens-right-to-privacy-experts-say">published in Scroll.in</a> on December 22, 2018.</p>
<hr />
<p style="text-align: justify; ">A notification issued by the Union Ministry of Home Affairs on Thursday allowing ten agencies to intercept, monitor and decrypt any information generated from any computer poses a grave threat to the <a href="https://scroll.in/article/848321/supreme-courts-decision-that-privacy-is-a-fundamental-right-is-not-just-about-aadhaar">fundamental right</a> to privacy, said lawyers and cyber security experts.</p>
<p style="text-align: justify; ">The notification led to a political storm on Friday and criticism from the Opposition forced Parliament to be adjourned. However, Union Finance Minister Arun Jaitley <a class="link-external" href="https://indianexpress.com/article/india/oppn-making-a-mountain-where-molehill-does-not-exist-jaitley-on-mhas-surveillance-order-5504009/" rel="nofollow" target="_blank">accused</a> the Opposition of “making a mountain where a molehill does not exist”. The government on Friday issued a clarification stating that the directive does not confer any new powers on it and has the legal backing of the Information Technology Act.</p>
<p style="text-align: justify; ">Experts agreed that Thursday’s notification lists powers <a href="https://scroll.in/article/906579/home-ministry-order-on-computer-surveillance-is-not-new-upa-introduced-provisions-in-2008">already available</a> to the authorities in the Information Technology Act 2000. The legal provisions to allow interception were introduced in 2008 by the Congress-led United Progressive Alliance government. However, with the fresh directive, experts said that the Bharatiya Janata Party-led government seems to be trying to formalise surveillance through the interception of computer information, they said.</p>
<p style="text-align: justify; ">“It is true that such [interception] powers already existed,” said Pavan Duggal, a lawyer with expertise in cyber security. “But neither any such formal directives were issued which I know of, nor any agency were specifically notified to have those powers.”</p>
<h3 class="cms-block-heading cms-block" style="text-align: justify; "><b>Privacy test</b></h3>
<p style="text-align: justify; ">The Information Technology Act 2000 was amended in 2008 to allow to the monitoring and interception of computer information, while the rules under which this would operate were <a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank">promulgated</a> in 2009. In 2017, the Supreme Court delivered a judgment establishing privacy as a fundamental right. The legal foundation of the computer interception directive could be still be challenged in court because it has not yet been considered in light of the privacy judgment, said Duggal. “It is now a matter of Constitutional validity,” he said</p>
<p style="text-align: justify; ">Thursday’s notification lists the agencies authorised to intercept, monitor and decrypt computer data: the Intelligence Bureau, Narcotics Control Bureau, Enforcement Directorate, Central Board of Direct Taxes, Directorate of Revenue Intelligence, Central Bureau of Investigation, National Investigation Agency, Cabinet Secretariat (RAW), Directorate of Signal Intelligence (for service areas of Jammu and Kashmir, North East and Assam) and the Commissioner of Police, Delhi. The Act provides a jail term of seven years for anyone who refuses to cooperate with these agencies.</p>
<p style="text-align: justify; ">On Friday, experts questioned whether a notification listing the 10 agencies had actually been issued earlier, as the Centre claimed.</p>
<p style="text-align: justify; ">“It is a fresh notification,” said Apar Gupta, a lawyer who specialises in technology and media issues. “With this, interception of computers has received formal acceptance in the public domain and it can have serious implications on privacy.”</p>
<p style="text-align: justify; ">Senior officials of the Delhi Police also said this appeared to be a fresh order. Asked if this meant that the agencies would not need to ask for authorisation in every case since a blanket order has been issued, the officials said that this still needs to be clarified.</p>
<h3 class="cms-block-heading cms-block" style="text-align: justify; "><b>Lacking proportionality</b></h3>
<p style="text-align: justify; ">The order has raised questions about the validity of the cases of interception of computer information conducted by the state police and other security agencies between 2009 (the year the interception rules were promulgated) and 2018 (the year the notification has been issued), Pranesh Prakash, co-founder of the Centre for Internet and Society.</p>
<p style="text-align: justify; ">One possibility, he said, may be that they were all unlawful.</p>
<p style="text-align: justify; ">But if they were indeed conducted with legal backing, Prakash said, then permission for this would been sanctioned in the form of an order by a competent authority. This is what Rule 3 of the <a class="link-external" href="http://meity.gov.in/writereaddata/files/Information%20Technology%20%28Procedure%20and%20Safeguards%20for%20Interception%2C%20Monitoring%20and%20Decryption%20of%20Information%29%20Rules%2C%202009.pdf" rel="nofollow" target="_blank">interception rules</a> mandate. But if so, Rule 4, which deals with the government authorising agencies to conduct such interceptions, is redundant. “How can it not be when any state police or other agency is capable of acquiring an order for interception under Rule 3?” he said</p>
<p style="text-align: justify; ">Besides, Prakash said, the new directive does not pass the test of proportionality.</p>
<p style="text-align: justify; ">In 2007, the Central government introduced rules to amend the Indian Telegraph Act 1951 to allow for information to be intercepted, Prakash said. However, the rules say that the competent authority should resort to interception only after considering all alternative means to acquire information. Thursday’s directive, though, is silent about the circumstances in which interception will be permitted, he said.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy'>http://editors.cis-india.org/internet-governance/news/scroll-abhishek-dey-december-22-2018-centres-order-on-computer-surveillance-threatens-right-to-privacy</a>
</p>
No publisherAdminInternet GovernancePrivacy2018-12-25T00:50:48ZNews ItemTen Indian government agencies can now snoop on people’s internet data
http://editors.cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data
<b>In a significant attack on online privacy, India’s Home Affair’s Ministry has authorised no fewer than ten different central government agencies to intercept, monitor, and decrypt “any information generated, transmitted, received or stored in any computer”.</b>
<p style="text-align: justify; ">The blog post by David Spencer was <a class="external-link" href="https://www.vpncompare.co.uk/indian-government-agencies-snoop-data/">published by VPN Compare</a> on December 24, 2018. Pranesh Prakash was quoted.</p>
<hr />
<p style="text-align: justify; ">The move has angered many Indian internet users, with the number of Indians <a href="https://www.vpncompare.co.uk/best-vpn-india-2018-top-5/">turning to VPNs</a> like <a href="https://www.vpncompare.co.uk/expressvpn-com" rel="noopener" target="_blank">ExpressVPN</a> to protect their online privacy is expected to rise significantly.</p>
<h2 style="text-align: justify; ">Extending powers under and old law</h2>
<p style="text-align: justify; ">The authorisation has been made under Section 69 (1) of the Information Technology Act, 2000 and Rule 4 of the Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules.</p>
<p style="text-align: justify; ">While these laws have been in place for almost a decade, it is only now that the Ministry has decided to use them toenable the decryption and access of online data.</p>
<p style="text-align: justify; ">The agencies that can now look at what every single Indian citizen is doing online include the Intelligence Bureau, the Narcotics Control Bureau, the Enforcement Directorate, the Central Board of Direct Taxes, and the Directorate of Revenue Intelligence.</p>
<p style="text-align: justify; ">Other which will also be permitted to hack into people’s devices are the Central Bureau of Investigation; National Investigation Agency, the Cabinet Secretariat (R&AW), the Directorate of Signal Intelligence (only for the service areas of Jammu & Kashmir and North-East and Assam) and the Delhi Commissioner of Police.</p>
<p style="text-align: justify; ">The laws do notionally limit the circumstances in which these agencies can access private internet data, but as is so often the case, the definition of these circumstances are so vague as to render the restrictions almost meaningless.</p>
<p style="text-align: justify; ">Permissible circumstances include cases thought to be “in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any recognizable offence relating to above or for investigation of any offence.”</p>
<p style="text-align: justify; ">Indian lawyers have said that all of the above agencies will still have to comply with Rule 3 of Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.</p>
<p style="text-align: justify; ">This requires permission from either the union home secretary or the secretary of the Home Affair’s Ministry before interception can take place.</p>
<h2 style="text-align: justify; ">The new powers could be illegal</h2>
<p style="text-align: justify; ">The new permissions also raise the interesting prospect that all previous interception of data by these agencies could be both unconstitutional and illegal, according to one Indian technology policy analyst, Pranesh Prakash.</p>
<p style="text-align: justify; ">He also told <a href="https://thewire.in/government/home-ministry-allows-10-central-agencies-to-engage-in-electronic-interception" rel="noopener" target="_blank">The Wire</a> that he believed “Section 69 and 69B of the IT Act are unconstitutional for being over-broad in what they allow interception and monitoring for, in demanding decryption from accused persons, and the punishments that they prescribe.”</p>
<p style="text-align: justify; ">The New Delhi based Internet Freedom Foundation echoed this opinion, releasing a statement which said, “the decision to authorise electronic snooping is unconstitutional and in breach of the telephone tapping guidelines, the Privacy Judgement and the Aadhaar judgement.”</p>
<p style="text-align: justify; ">Opponents of the Indian President, Narendra Modi, have argued that this latest decision is further evidence that he is turning India into a surveillance state.</p>
<p style="text-align: justify; ">Congress Party chief, Rahul Gandhi, said this move showed Modi is “an insecure dictator”, while others have argued that that this increased surveillance will have a “chilling effect” on democratic debate and dissent in India.</p>
<p style="text-align: justify; ">Srinivas Kodali, an independent security researcher in Hyderabad, told <a href="https://www.aljazeera.com/news/2018/12/india-opponents-modi-creating-surveillance-state-181222090416318.html" rel="noopener" target="_blank">Al Jazeera</a> the new powers would “make data collection from critics and political opponents easier [and] facilitate targeted raids against the opposition and critics.”</p>
<p style="text-align: justify; ">For their part, the Indian Government have used the age-old argument about the new powers helping them to combat “terrorism”.</p>
<h2 style="text-align: justify; ">VPN use expected to rise in India</h2>
<p style="text-align: justify; ">For innocent India internet users, the reality is that their rights to online privacy have been significantly undermined by the new powers. There are now multiple central government agencies with the power to intercept, decrypt, and access their private online data, with minimal safeguards in place to protect their rights.</p>
<p style="text-align: justify; ">For most Indians, the new powers are a step to far, as has been seen by the angry response on social media.</p>
<p style="text-align: justify; ">It seems highly likely that the move will see more and amore Indian’s turning to a VPN to protect their online privacy. By connecting to a VPN, such as <a href="https://www.vpncompare.co.uk/expressvpn-com" rel="noopener" target="_blank">ExpressVPN</a>, they are able to ensure all of their online data is encrypted by state-of-the-art encryption and also effectively anonymised.</p>
<p style="text-align: justify; ">It means that no government agency will be able to see what they are doing online and it will be almost impossible for their online activity to be traced back to them.</p>
<p style="text-align: justify; ">Using a VPN should protect internet users from the erosion of online rights the Indian Government is trying to implement. But it seems unlikely that it will stop the Modi administration from trying.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data'>http://editors.cis-india.org/internet-governance/news/vpn-compare-david-spencer-december-24-2018-ten-government-agencies-can-now-snoop-on-peoples-internet-data</a>
</p>
No publisherAdminInternet Governance2018-12-25T00:33:47ZNews Item