Posts
Response to GCSC on Request for Consultation: Norm Package Singapore
— by Arindrajit Basu, Gurshabad Grover and Elonnai Hickok — last modified Jan 27, 2019 03:43 PMThe GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.
India should reconsider its proposed regulation of online content
— by Gurshabad Grover — last modified Jan 24, 2019 04:59 PMThe lack of technical considerations in the proposal is also apparent since implementing the proposal is infeasible for certain intermediaries. End-to-end encrypted messaging services cannot “identify” unlawful content since they cannot decrypt it. Presumably, the government’s intention is not to disallow end-to-end encryption so that intermediaries can monitor content.
The DNA Bill has a sequence of problems that need to be resolved
— by Shweta Mohandas and Elonnai Hickok — last modified Jan 15, 2019 02:36 AMIn its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.
How to make EVMs hack-proof, and elections more trustworthy
— by Pranesh Prakash — last modified Jan 14, 2019 03:34 PMFree and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didnât let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?
Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services
— by Gurshabad Grover — last modified Jan 11, 2019 04:01 PMThis submission presents a response to the Telecom Regulatory Authority of India’s Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services.
Registering for Aadhaar in 2019
— by Sunil Abraham — last modified Jan 03, 2019 02:59 PMIt is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.
Economics of Cybersecurity: Literature Review Compendium
— by Natallia Khaniejo — last modified May 01, 2021 06:09 AMThe twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.
Is the new ‘interception’ order old wine in a new bottle?
— by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare — last modified Dec 29, 2018 04:02 PMThe government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.
Private-public partnership for cyber security
— by Arindrajit Basu — last modified Dec 26, 2018 03:02 PMGiven the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.
Mapping cybersecurity in India: An infographic
— by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah — last modified Dec 23, 2018 04:57 PMThis infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue through our cybersecurity work at CIS.
Document Actions

