The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 11 to 25.
CIS Cybersecurity Series (Part 14) – Menaka Guruswamy
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy
<b>CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.</b>
<div><em>"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."</em></div>
<div> </div>
<div>Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series. </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </div>
<div> </div>
<div>Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law. Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.</div>
<div> </div>
http://youtu.be/GCDD6Z-UrGI
<div> </div>
<div> </div>
<iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"></iframe>
<div>
<div><strong><br /></strong></div>
<div><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></div>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security Interview2014-07-21T10:39:03ZBlog Entry CIS Cybersecurity Series (Part 17) – Nishant Shah
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah
<b>CIS interviews Nishant Shah, researcher and academic, as part of the Cybersecurity Series.</b>
<p><em>“Given the political nature of social life in India, I always grew up thinking that I could speak my mind about anything to anybody unless they can hit me, more or less, and sometimes also to people who can hit me. So there has always been a very vibrant atmosphere, at least of expression, which is not necessarily a bad thing; it’s not only a good thing because it allows for, I don’t know, the first thing that comes to mind is hate speeches during the 1992 communal violences in Bombay. But it also allows for people to sit on a park bench, in a garden, at 4 o'clock in the afternoon and have a very strong critical reaction to whatever is happening around them, and sometimes it can be around celebrities, political figures, India's foreign policy and so on and so forth. I am saying that it would be unfair to think that people are not equipped to deal with questions of anonymous speech and the conditions that are necessary for it.”</em></p>
<p>Centre for Internet and Society presents its seventeenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Nishant Shah is the co-founder and director of research at the Centre for Internet and Society. He studies questions of governance, identity, planning and body at the intersections of digital technologies, law and everyday cultural practice. He is a visiting researcher at the Centre for Digital Cultures at Leuphana University, Germany, and an International Knowledge Partner on 'Youth, Technology and Change' with Hivos, Netherlands. He recently co-edited the four-volume book series "Digital AlterNatives with a Cause?" that captures discourse, practice and policy as it shapes and is shaped by youth driven, everyday practices of digital technologies and is currently working on looking at civic action in networked society. </p>
<iframe src="//www.youtube.com/embed/ea3kANxsEVE?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p><strong><br /></strong></p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah</a>
</p>
No publisherpurba2014-07-31T05:48:14ZBlog EntryCIS Cybersecurity Series (Part 15) – Malavika Jayaram
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram
<b>CIS interviews Malavika Jayaram, lawyer and researcher, as part of the Cybersecurity Series.</b>
<div><em>"So, civil society has a very interesting role in the whole internet governance debate because on one hand, they are the other ones are sort of pushing the agenda, and disseminating information and creating a public discourse around the shrinkage of the private sphere and free speech, but at the same time they, they are also the one most impacted by it. So the message that they are trying to get out is often the one that governments seek to filter at the first place. And they are most at harm.”</em></div>
<div> </div>
<div>Centre for Internet and Society presents its fifteenth installment of the CIS Cybersecurity Series. </div>
<div> </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </div>
<div> </div>
<div>Malavika works in the areas of privacy, identity, free expression and internet policy in India. She is a fellow at the Centre for Internet and Society in Bangalore, India and follows legislative and policy developments in the privacy and internet governance domains. She is also a Fellow at the Berkman Center for Internet and Society at Harvard University. </div>
<div> </div>
<iframe src="//www.youtube.com/embed/N_F5lpjt-VE" frameborder="0" height="315" width="560"></iframe>
<div> </div>
<div> </div>
<div><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram</a>
</p>
No publisherpurba2014-07-07T13:34:36ZBlog EntryCIS Cybersecurity Series (Part 18) – Lobsang Gyatso Sither
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither
<b>CIS interviews Lobsang Gyatso Sither, Tibetan field coordinator and activist, as part of the Cybersecurity Series.</b>
<p><em>“The digital arms trade and the digital arms race, that is going on right now is a huge problem, in terms of what is happening around the world. A lot of people talk about digital arms like it’s just digital technology; it’s just surveillance technology; it’s just censorship technology; it’s just technology; it doesn’t kill anyone, but the fact of the matter is that it does kill. It’s as bad as a gun; it’s as bad as a weapon. It's the same thing in my opinion and it has to be restricted; it has to be curtailed, it has to be controlled so that it doesn’t go to places where there are no human rights and where there are rampant human rights violations. People know what it is going to be used for and it is going to be used for human rights violations and that is something that has be kept in mind before the whole aspect of digital arms trade and it has to be treated as any other arms trade</em>.”</p>
<p>Centre for Internet and Society presents its eighteenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Lobsang Gyatso Sither is a Tibetan born in exile dedicated to increasing cybersecurity among Tibetans inside Tibet and in the diasporas. He has helped to develop community-specific technologies and educational content and deploys them via training and public awareness campaigns at the grassroots level. Lobsang works with key communicators and organizations in the Tibetan community, including Voice of Tibet Radio and the Tibetan Centre for Human Rights and Democracy.</p>
<iframe src="//www.youtube.com/embed/OtLkgoiTBeo?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither</a>
</p>
No publisherpurba2014-07-31T05:34:34ZBlog EntryCIS Cybersecurity Series (Part 20) – Saumil Shah
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah
<b>CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.</b>
<blockquote class="quoted" style="text-align: justify; "><i>“If you look at the evolution of targets, from the 2000s to the present day, the shift has been from the servers to the individual. Back in 2000, the target was always servers. Then as servers started getting harder to crack, the target moved to the applications hosted on the servers, as people started using e-commerce applications even more. Eventually, as they started getting harder to crack, the attacks moved to the user's desktops and the user's browsers, and now to individual user identities and to the digital personas.”</i></blockquote>
<p style="text-align: justify; ">Centre for Internet and Society presents its twentieth installment of the CIS Cybersecurity Series.</p>
<p style="text-align: justify; ">The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p style="text-align: justify; ">Saumil Shah is a security expert based in Ahmedabad. He has been working in the field of security and security related software development for more than ten years, with a focus on web security and hacking.</p>
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/2V39K8y68mc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"></iframe></th>
</tr>
</tbody>
</table>
<p><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada</i>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security InterviewPrivacy2014-09-06T05:03:00ZBlog EntryCIS Cybersecurity Series (Part 6) - Lhadon Tethong
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong
<b>CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series</b>
<p><i>"In authoritarian states, and in this case, in Tibet, I think that every person that we can teach and pass knowledge to, that can help them stay out of jail, stay in the streets, for one, two, three days longer, one week longer, that is a valuable time of time and resources. And I think we cannot rely on only tools and technology solutions to protect people. I think we can't just rely on government policies at the highest levels, and on export controls... the approach to digital security has to be comprehensive and we have to engage citizens. And not just in cases like the Tibetans or for activists or for people living under repression, but for people in free and open societies too." - Lhadon Tethong, Tibetan human rights activist.</i></p>
<p>Centre for Internet and Society presents its sixth installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS interviews Lhadon Tethong, Tibetan human rights activist. Lhadon is the Director of the Tibet Action Institute, where she leads a team of technologists and human rights advocates in developing and advancing open-source communication technologies, nonviolent strategies and innovative training programs for Tibetans and other groups facing heavy repression and human rights abuses.</p>
<p>Link for Tibet Action Institute: <a href="https://tibetaction.net/">https://tibetaction.net/</a></p>
<p> </p>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RzlvdY_DAe8" width="560"></iframe></p>
<p><b><i><br /></i></b></p>
<p><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></p>
<div><b><i><br /></i></b></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong</a>
</p>
No publisherpurbaCybersecurityInternet GovernanceCyberculturesCyber SecurityCyber Security Interview2013-08-01T09:54:46ZBlog EntryCIS Cybersecurity Series (Part 11) - Anja Kovacs
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs
<b>CIS interviews Anja Kovacs, researcher and activist, and director of the Internet Democracy, Project as part of the Cybersecurity Series.</b>
<p><em>"Having the cyber security debate become more and more important was a real challenge for civil society. I think in part because many of us who were focused on human rights aren't necessarily techies. And so, when you have a conversation with a government bureaucrat, and ask questions about the kind of decisions they decided to take, very often they will come up with a technical answer in response. And then, if you don't have that expertise, it is difficult to react. In the meantime though, I think it has become clear that this is one of the biggest issues in the internet field at the moment. It is also one of the big issues that is driving the desires of governments to have a bigger role to play in internet governance. So it is an area that is unavoidable for activists. What has happened slowly is that we have come to realize that the first thing, as in most other areas, is not the technical details, but principles, and those principles are fairly similar to how they are in many other fields." - Anja Kovacs, Internet Democracy Project</em></p>
<p>Centre for Internet and Society presents its eleventh installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS speaks to Anja Kovacs, director of the Internet Democracy Project. Her work focuses on a wide range of questions regarding freedom of expression, cybersecurity and the architecture of Internet governance as they relate to the Internet and democracy. Anja is currently also a member of the of the Investment Committee of the Digital Defenders Partnership and of the interim Steering Group of Best Bits, a global network of civil society members.</p>
<p><em>(Bio from internetdemocracy.in) </em></p>
<p>Internet Democracy Project homepage: http://internetdemocracy.in/</p>
<p> <iframe src="//www.youtube.com/embed/uWH2oup6ND8" frameborder="0" height="315" width="420"></iframe></p>
<div>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<div><strong><em><br /></em></strong></div>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs</a>
</p>
No publisherpurbaCybersecurityInternet GovernanceCyberculturesCyber SecurityCyber Security Interview2013-10-15T15:25:07ZBlog EntryCIS Cybersecurity Film Screening
http://editors.cis-india.org/events/cis-cybersecurity-film-screening
<b>The Centre for Internet and Society invites you to a screening of Episode 1&2 of DesiSec: the first documentary film on cybersecurity in India. Hope you can join us on 26th March, at CIS, Domlur!</b>
<div>Early 2013, the Centre for Internet and Society began shooting its first documentary film project. After months of researching and interviewing activists and experts, CIS released the first episode on 11th December. </div>
<div> </div>
<div>CIS is hosting a special screening of <strong>DesiSec: Episode 1&2</strong> on <strong>26th March, 2</strong><strong>013, 5.30 pm</strong> and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society. The second episode is focused on anonymity and free speech online.</div>
<div> </div>
<div>We look forward to seeing you there!</div>
<div> </div>
<div>RSVP: <a href="mailto:purba@cis-india.org" target="_blank">purba@cis-india.org</a></div>
<div>Venue: http://osm.org/go/yy4fIjrQL?m=</div>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/events/cis-cybersecurity-film-screening'>http://editors.cis-india.org/events/cis-cybersecurity-film-screening</a>
</p>
No publisherpurbaCyber Security FilmEventCyber Security Interview2014-03-20T09:34:38ZEventCIS Cybersecurity Series (Part 12) - Namita Malhotra
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra
<b>CIS interviews Namita Malhotra, researcher and lawyer at Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.</b>
<p><em>"In a strange mix of how both capitalism and state control work, what is happening is that more and more of these places that one could access, for various reasons, whether it is for ones own pleasure or for political conversations, are getting further and further away from us. And I think that that mix of both corporate interests and state control is particularly playing a role in this regard." - Namita Malhotra, researcher and lawyer, Alternative Law Forum</em></p>
<p>Centre for Internet and Society presents its twelfth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>Namita Malhotra is a researcher and lawyer at Alternative Law Forum (ALF). She has a keen interest in working on law, technology and media through legal research, cultural studies, new media practices and film making.</p>
<p>ALF homepage: www.altlawforum.org</p>
<iframe src="//www.youtube.com/embed/R9bSvrs5w74" frameborder="0" height="315" width="560"></iframe>
<p><strong><em><br /></em></strong></p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra</a>
</p>
No publisherpurbaCybersecurityInternet GovernanceCyberculturesCyber SecurityCyber Security Interview2013-11-18T10:03:29ZBlog EntryFirst Look: CIS Cybersecurity documentary film
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer
<b>CIS presents the trailer of its documentary film DesiSec: Cybersecurity & Civil Society in India</b>
<p>The Centre for Internet and Society is pleased to release the trailer of its first documentary film, on cybersecurity and civil society in India. </p>
<p>The documentary is part of the CIS Cybersecurity Series, a work in progress which may be found <a class="external-link" href="http://cismetamedia.tumblr.com">here</a>.</p>
<iframe src="//www.youtube.com/embed/3134xVvMmfc" frameborder="0" height="315" width="560"></iframe>
<p><strong>DesiSec: Cybersecurity and Civil Society in India</strong></p>
<p>The trailer of <em>DesiSec: Cybersecurity and Civil Society in India</em> was shown at the Internet Governance Forum in Bali on October 24. It was a featured presentation at the Citizen Lab workshop, <em>Internet Governance For The Next Billion Users.</em></p>
<p>The transcript of the workshop is available here: <a href="http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users">http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users</a> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</a>
</p>
No publisherpurbaCybersecurityInternet Governance ForumInternet GovernanceCyber Security FilmCyberculturesCyber Security2013-12-17T08:16:42ZBlog EntryExposing the Invisible - Tactical Tech films screening at CIS
http://editors.cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis
<b>Exposing the Invisible is Tactical Tech's series of short films examining some inspiring and provocative investigative cases, those that go beyond traditional journalistic investigations. CIS is pleased to invite you to a special screening of two of the films on 9th December, 6pm, at the CIS venue. </b>
<p align="LEFT"><strong><em>Exposing the Invisible</em> </strong>is Tactical Tech's series of short films examining some inspiring and provocative investigative cases, those that go beyond traditional journalistic investigations.</p>
<p align="LEFT">In the past decade, the work of investigators has undergone a significant transformation due to the rapid development of new technologies, the ubiquity of the Internet, and new possibilities in working with evidence, data and visualisation. The stories in the film illustrate this evolution as activists take advantage of this new wave of opportunities, while remaining aware of the dangers they expose themselves to. </p>
<p align="LEFT">Episode one,<strong> Our Currency is Information</strong>, introduces the work of a team of investigators led by Romanian reporter Paul Radu, investigating organised crime. The film takes you to the heart of Radu’s investigations, where the power of criminals, corporations and governments overlap in chilling cases. </p>
<p align="LEFT">Episode two,<strong> From Our Point of View</strong>, profiles three individuals from the UK, Lebanon and Israel, non-specialists who have taken it upon themselves to use information in innovative and varies ways to shed light on Syria's 'YouTube conflict', the theft of Lebanon's seashore, and house demolitions in East Jerusalem.</p>
<p align="LEFT">Episode three,<strong> Unseen War</strong>, touches on the issues of US drone strikes in Pakistan. </p>
<p align="LEFT">More about the project here:</p>
<p align="LEFT"><a href="https://exposingtheinvisible.org/">https://exposingtheinvisible.org/</a></p>
<p align="LEFT">CIS is very excited to participate in the week-long global films festival and will be organizing screenings of Episode one and Episode three on December 9, 2013. The screening of the films will be followed by an interactive discussion on the cases shown in the film, how activism is transforming in India, and how it effects us. </p>
<p align="LEFT"> We look forward to your participation in making this event a success!</p>
<p align="LEFT"> Venue: http://osm.org/go/yy4fIjrQL?m=</p>
<p align="LEFT">Tactical Tech Hompage: <a href="https://www.tacticaltech.org/">https://www.tacticaltech.org/</a></p>
<div> </div>
<p>
For more details visit <a href='http://editors.cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis'>http://editors.cis-india.org/events/exposing-the-invisible-tactical-tech-films-screening-at-cis</a>
</p>
No publisherpurbaDigital ActivismEvent2013-12-02T07:37:21ZEventCIS Cybersecurity Series (Part 19) – Lobsang Sangay
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay
<b>CIS interviews Lobsang Sangay, Prime Minister of the Central Tibetan Administration, as part of the Cybersecurity Series.</b>
<p><em>“If there is already freedom of speech in a democratic country, then anonymous commentary could be misplaced in many instances. Because if the country is democratic, it has freedom of speech, and the laws protect you when you speak out. Then I think the citizens also have responsibilities. Democracy not only means freedom, but it also means duties. Your duty is to say who you are and criticize the government, or the employer, or the policy or whatever, in your name. So anonymity is misplaced in that sense, in most of the instances. Having said that, if a particular country or a government restricts freedom of speech, then you have no option but to be anonymous because just by speaking out, you are committing a crime and hence you are liable. For example, in Tibet, even if you paste a poster on the wall, saying just two words ‘human right’, you will be arrested and you will go behind bars. Even if you just shout a slogan, you will be arrested and you will be in prison.”</em></p>
<p>Centre for Internet and Society presents its nineteenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Dr. Lobsang Sangay took office as Sikyong (Prime Minister) of the Central Tibetan Administration in Dharamsala, India, in 2011. He was born in a Tibetan refugee settlement in northern India. As a Fulbright scholar, he was the first Tibetan to receive a doctorate from the Harvard Law School in 2004. He worked as a senior fellow at Harvard University for a number of years during which he organized landmark conferences between the Dalai Lama and Chinese scholars. An expert on Tibet, international human rights law, democratic constitutionalism and conflict resolution, Dr Sangay has lectured at various universities and think-tanks throughout Europe, Asia and North America.</p>
<iframe src="//www.youtube.com/embed/pdSohCND-9Q?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p><strong><br /></strong></p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay</a>
</p>
No publisherpurba2014-07-31T05:40:04ZBlog EntryCIS Cybersecurity Series (Part 21) – Gyanak Tsering
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering
<b>CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.</b>
<p style="text-align: justify; "><i>“I have three mobile phones but I use only one to exchange information to and from Tibet. I don't give that number to anyone and nobody knows about it. High security forces me to use three phones. Usually a mobile phone can be tracked easily in many ways, especially by the network provider but my third mobile phone is not registered so that makes sure that the Chinese government cannot track me. The Chinese have a record of all mobile phone numbers and they can block them at anytime. But my third number cannot be traced and that allows me to communicate freely. This is only for security reasons so that my people in Tibet don't get into trouble.”</i></p>
<p style="text-align: justify; ">Centre for Internet and Society presents its twenty-first installment of the CIS Cybersecurity Series.</p>
<p style="text-align: justify; ">The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p style="text-align: justify; ">Gyanak Tsering is a Tibetan monk in exile, studying at Kirti Monastery, Dharamshala. He came to India in 1999, and has been using the internet and mobile phone technology, since 2008, to securely transfer information to and from Tibet. Tsering adds a new perspective to the cybersecurity debate and explains how his personal security is interlinked with internet security and mobile phone security.</p>
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mqSw3cy7MEc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"></iframe></th>
</tr>
</tbody>
</table>
<p><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada</i>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security InterviewPrivacy2014-09-06T05:08:44ZBlog EntryCIS Cybersecurity Series (Part 9) - Saikat Datta
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta
<b>CIS interviews Saikat Datta, Resident Editor of DNA, Delhi, as part of the Cybersecurity Series.
</b>
<p><em>"Anonymous speech, in countries which have extremely severe systems of governments, which do not have freedom, etcetera, is welcome. But in a democracy like India, I do not see the need for anonymous speech because it is anyways guaranteed by the Constitution of India. So, no, I do not see the need for anonymity in an open and democratic state like India and I would be seriously worried if such a requirement comes up. Shouldn't I strive to be ideal? The ideal suggests that the constitution has guaranteed freedom of speech. Anonymity, for a time being may be acceptable to some people but I would like a situation where a person, without having to seek anonymity, can speak about anything and not be prosecuted by the state, or persecuted by society. And that is the ideal situation that I would like to strive for." - Saikat Datta, Resident Editor, DNA, Delhi.</em></p>
<p>Centre for Internet and Society presents its ninth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>Saikat Datta is a journalist who began his career in December 1996 and has worked with several publications like The Indian Express, the Outlook magazine and the DNA newspaper. He is currently the Resident Editor of DNA, Delhi. Saikat has authored a book on India's Special Forces and presented papers at seminars organized by the Centre for Land Warfare Studies, the Centre for Air Power Studies and the National Security Guards. He has also been awarded the International Press Institute Award for investigative journalism, the National RTI award in the journalism category and the Jagan Phadnis Memorial Award for investigative journalism.</p>
<p> </p>
<iframe src="//www.youtube.com/embed/Fn2tqVU5mGg" frameborder="0" height="315" width="560"></iframe>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-08-05T05:24:35ZBlog EntryCIS Cybersecurity Series (Part 10) - Lawrence Liang
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang
<b>CIS interviews Lawrence Liang, researcher and lawyer, and co-founder of Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.</b>
<p><em>"The right to privacy and the right to free speech have often been understood as distinct rights. But I think in the ecology of online communication, it becomes crucial for us to look at the two as being inseparable. And this is not entirely new in India. But, interestingly, a lot of the cases that have had to deal with this question in the Indian context, have pitted one against the other. Now, India doesn't have a law for the protection of whistle-blowers. So how do we now think of the idea of whistle-blowers being one of the subjects of speech and privacy coming together? How do we use the strong pillars that have been established, in terms of a very rich tradition that Indian law has, on the recognition of free speech issues but slowly start incorporating questions of privacy?" - Lawrence Liang, researcher and lawyer, Alternative Law Forum. </em></p>
<p>Centre for Internet and Society presents its tenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>Lawrence Liang is one of the co-founders of the Alternative Law Forum where he works on issues of intellectual property, censorship, and the intersection of law and culture. He is also a fellow with the Centre for Internet and Society and serves on its board. </p>
<iframe src="//www.youtube.com/embed/odQajlxcLLA" frameborder="0" height="315" width="420"></iframe>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang</a>
</p>
No publisherpurbaCybersecurityCyber SecurityCyberculturesCyber Security Interview2013-09-10T08:31:31ZBlog Entry