<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1071 to 1085.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/social.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/publications/snooping-data-abuse.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Snoopgate.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Snehashish.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy_of_Snehashish.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/DP9.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Sneha.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Snapshot.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy_of_Snapshot.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/E2.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/SmitaSignature.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/smari-talk.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/news/economic-times-kalyan-parbat-june-23-2016-slow-internet-driving-you-nuts"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/social.jpg">
    <title>Social</title>
    <link>http://editors.cis-india.org/home-images/social.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/social.jpg'&gt;http://editors.cis-india.org/home-images/social.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-14T06:38:37Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology">
    <title>Snooping technology: Will CMS work in India?</title>
    <link>http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology</link>
    <description>
        &lt;b&gt;The Indian government plans to spend $132 million on setting up its brand new Central Monitoring System this year.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pierre Fitter's article was &lt;a class="external-link" href="http://www.firstpost.com/india/snooping-technology-will-cms-work-in-india-962545.html"&gt;published in FirstPost on July 17, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Several articles have raised valid questions about privacy violations, including &lt;a href="http://www.firstpost.com/india/indias-central-monitoring-system-security-cant-come-at-cost-of-privacy-944475.html" target="_blank"&gt;this one by Danish Raza&lt;/a&gt;. Elsewhere, &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/" rel="nofollow" target="_blank"&gt;Pranesh Prakash has raised important points&lt;/a&gt; about how CMS may actually violate several laws and at least one Supreme Court verdict.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I ask a much more basic question: will CMS work? Can it really help  security agencies eavesdrop on criminals and terrorists, despite several  known technical hurdles?&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/Daniel.png" title="Daniel" height="250" width="332" alt="Daniel" class="image-inline" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Encryption&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a prominent Brazilian banker and investor named Daniel Dantas  was arrested and charged with money laundering and tax evasion along  with a former mayor of Sao Paulo. For five months, the Brazilian  National Institute of Criminology tried to read the contents of his hard  drive but failed to crack it. Dantas had encrypted his data using a  free program called &lt;a href="https://en.wikipedia.org/wiki/TrueCrypt" rel="nofollow" target="_blank"&gt;Truecrypt&lt;/a&gt;. The &lt;a href="http://www.theregister.co.uk/2010/06/28/brazil_banker_crypto_lock_out/" rel="nofollow" target="_blank"&gt;INC sent the hard drive to the FBI in the US&lt;/a&gt;,  which spent a whole year trying to crack it; it too failed. Dantas’s  use of encryption likely helped him escape the money laundering and tax  evasion charges. He was ultimately &lt;a href="http://news.bbc.co.uk/2/hi/americas/7761823.stm" rel="nofollow" target="_blank"&gt;convicted of attempting to bribe a police officer&lt;/a&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This story illustrates a fundamental loophole at the heart of CMS. A  criminal, using free and easy-to-use software, can protect his data from  even the most advanced surveillance tools available in law enforcement.  NSA whistle blower Edward Snowden himself used encrypted email to  communicate with journalists at the &lt;i&gt;Guardian&lt;/i&gt;. In an &lt;a href="http://discussion.guardian.co.uk/comment-permalink/24384968" rel="nofollow" target="_blank"&gt;online chat where he took questions from the public&lt;/a&gt;, Snowden noted that encryption was “one of the few things that you can rely on” to protect you from the &lt;a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/" rel="nofollow" target="_blank"&gt;eavesdropping behemoth created of the NSA&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should hardly be surprising then, that terror groups have been  encrypting their emails and data for at least the last five years. In  fact &lt;a href="http://intelwire.egoplex.com/2008_02_02_exclusives.html" rel="nofollow" target="_blank"&gt;Al Qaeda developed its own encryption software called ‘Mujahideen Secrets’&lt;/a&gt;,  to encrypt emails, chat sessions and files. Version two of Mujahideen  Secrets even included a tool to delete files securely so that they could  not be recovered using special software if the computer was captured.  Al Qaeda’s links to several terror groups operating in India has been  widely reported in the past. It is not inconceivable that they have  shared their encryption software with their comrades-in-arms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years it has become easier to encrypt one’s communication. &lt;a href="https://www.youtube.com/watch?v=MKehyXaY2XM" rel="nofollow" target="_blank"&gt;YouTube tutorials&lt;/a&gt; train even novice users to set up email encryption within minutes. &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;Phone calls&lt;/a&gt;, &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;text messages&lt;/a&gt; and &lt;a href="http://www.cypherpunks.ca/otr/" rel="nofollow" target="_blank"&gt;online chats&lt;/a&gt; can also be encrypted with free, easy-to-install apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biggest problem with encryption is that it is virtually impossible  to break the code in a time frame that’s useful for law-enforcement  purposes. Without getting too technical, modern encryption relies  calculating the prime factors of very, very large integers. In 2009, a  group of some of the world’s best-known mathematicians and  cryptographers reported that &lt;a href="http://security.stackexchange.com/questions/4518/how-to-estimate-the-time-needed-to-crack-rsa-encryption" rel="nofollow" target="_blank"&gt;it took them four years to factor a 768-bit integer&lt;/a&gt;. They estimated &lt;a href="https://www.digicert.com/TimeTravel/math.htm" rel="nofollow" target="_blank"&gt;it would take 1,000 times longer to factorise a 1024-bit integer&lt;/a&gt;.  GPG, which is the most widely-used email encryption software, allows  users up to 4096-bit encryption. Unless you have the password to the  encrypted files, it would take you a very long time to crack the  encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example to help you understand why encryption makes CMS  redundant. Let’s say the system intercepts an encrypted email sent by a  LeT handler in Karachi to a sleeper cell in Mumbai. The email contains  instructions to detonate a bomb in a specific market at a specific time  four days from now. Even if India’s intelligence agencies managed to  link up every computer they had available to process the encryption,  they would still not be able to crack it in time to learn the details  and stop the attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What about ‘Metadata’?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that encryption only protects the body of the email. The metadata, including the sender’s and receiver’s email addresses remain unencrypted, else the service provider would be unable to send the email to its destination. Law enforcement agencies often partner with email providers to track down the exact computer on which tell-tale emails were read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this method of tracing criminals has a limitation. Programs such as &lt;a href="https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29" rel="nofollow" target="_blank"&gt;TOR&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Hotspot_Shield" rel="nofollow" target="_blank"&gt;Hotspot Shield&lt;/a&gt; disguise the IP address of a user’s PC. For example, when I use TOR,  Facebook will often ask me to confirm my identity as it sees me as  logging in from an unfamiliar location. TOR has thousands of servers  around the world through which it bounces your data before sending it to  its destination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is another limitation to using metadata. Due to obvious legal  hurdles, CMS will only be deployed to capture communication within  India. If terrorists were planning an attack from elsewhere in India’s  neighbourhood (as happened with 26/11), we would have to rely on that  country’s intelligence services for an alert. Good luck with that!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make untraceable phone calls, terrorists have been known to use &lt;a href="https://en.wikipedia.org/wiki/Burner_phone#Privacy_rights_and_prepaid_mobile_phones" rel="nofollow" target="_blank"&gt;“burner” phones&lt;/a&gt;.  These are pre-paid phones that are easily available in the US and other  countries that do not require an ID for such mobile connections. They  can be topped up using cash, which makes their prolonged using even more  untraceable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if CMS allowed spooks to listen to these calls, it would not be  able to tell who was talking to whom. From details that emerged  following the Abbottabad operation that killed Osama bin Laden, we also  know that terrorists have been trained to &lt;a href="http://www.foxnews.com/tech/2011/05/03/bin-laden-grid-govt-help-expert-says/" rel="nofollow" target="_blank"&gt;turn off their phones and remove the battery&lt;/a&gt; to prevent being tracked even while not on a call.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;So what is CMS good for?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If terrorist communications can easily be hidden from CMS, you have  to wonder why the government is going through all the effort and expense  to set up such a system. What good can come off the mass hoovering of  data of ordinary citizens’?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if CMS intercepted a ‘BBM chat’ between two businessmen, who  were discussing a contract that could affect the business interests of a  government MP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine the government getting access to emails exchanged between a  journalist and a source in the IAS who wants to expose a major  corruption scandal involving a cabinet minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if the government had access to phone calls between two opposition politicians discussing election strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What if CMS tracks a PhD candidate who is researching Naxal terror  and has downloaded Naxal pamphlets? What if this researcher has been  able to establish contact with Naxals for an interview. Can the  government use such data to charge him with participating in a Naxal  conspiracy, even if his only intention was to research their  motivations? In a country where chief ministers label their critics as  “Naxals” for merely raising questions, are we certain we want such  unmitigated power in the government’s hands?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions well worth asking, especially since the  ostensible reason for setting up the CMS—monitoring terrorists and  criminals—is a fool’s errand at best.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology'&gt;http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-22T07:19:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/publications/snooping-data-abuse.pdf">
    <title>Snooping Can Lead to Data Abuse (PDF)</title>
    <link>http://editors.cis-india.org/internet-governance/publications/snooping-data-abuse.pdf</link>
    <description>
        &lt;b&gt;An article by Sunil Abraham in Mail Today on June 9, 2011.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/publications/snooping-data-abuse.pdf'&gt;http://editors.cis-india.org/internet-governance/publications/snooping-data-abuse.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-06-09T12:09:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Snoopgate.png">
    <title>Snoopgate</title>
    <link>http://editors.cis-india.org/home-images/Snoopgate.png</link>
    <description>
        &lt;b&gt;Snoopgate&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Snoopgate.png'&gt;http://editors.cis-india.org/home-images/Snoopgate.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-11-19T09:03:27Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Snehashish.jpg">
    <title>Snehashish Ghosh</title>
    <link>http://editors.cis-india.org/home-images/Snehashish.jpg</link>
    <description>
        &lt;b&gt;Snehashish Ghosh&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Snehashish.jpg'&gt;http://editors.cis-india.org/home-images/Snehashish.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-10-04T09:12:05Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy_of_Snehashish.jpg">
    <title>Snehashish</title>
    <link>http://editors.cis-india.org/home-images/copy_of_Snehashish.jpg</link>
    <description>
        &lt;b&gt;Snehashish&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy_of_Snehashish.jpg'&gt;http://editors.cis-india.org/home-images/copy_of_Snehashish.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-13T01:09:48Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/DP9.jpg">
    <title>Sneha Raman</title>
    <link>http://editors.cis-india.org/home-images/DP9.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/DP9.jpg'&gt;http://editors.cis-india.org/home-images/DP9.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-01-16T05:20:13Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Sneha.jpg">
    <title>Sneha</title>
    <link>http://editors.cis-india.org/home-images/Sneha.jpg</link>
    <description>
        &lt;b&gt;Sneha&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Sneha.jpg'&gt;http://editors.cis-india.org/home-images/Sneha.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-13T00:32:01Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Snapshot.jpg">
    <title>Snapshot</title>
    <link>http://editors.cis-india.org/home-images/Snapshot.jpg</link>
    <description>
        &lt;b&gt;Snapshot&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Snapshot.jpg'&gt;http://editors.cis-india.org/home-images/Snapshot.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-04-05T15:56:55Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy_of_Snapshot.jpg">
    <title>Snapshot</title>
    <link>http://editors.cis-india.org/home-images/copy_of_Snapshot.jpg</link>
    <description>
        &lt;b&gt;Snapshot&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy_of_Snapshot.jpg'&gt;http://editors.cis-india.org/home-images/copy_of_Snapshot.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-05-03T15:57:51Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/E2.png">
    <title>SMTP Server</title>
    <link>http://editors.cis-india.org/home-images/E2.png</link>
    <description>
        &lt;b&gt;SMTP Server&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/E2.png'&gt;http://editors.cis-india.org/home-images/E2.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-03-18T07:11:42Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country">
    <title>Smriti Irani brings back focus on voyeurism prevailing in our country</title>
    <link>http://editors.cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country</link>
    <description>
        &lt;b&gt;The case of Union minister Smriti Irani finding a CCTV camera at Goa's Fab India has again brought back the focus on digital voyeurism and how a critical issue like surveillance can be exploited. Irani's case comes days after a woman found a mobile phone strapped to a changing room door of a Van Heusen store in Lajpat Nagar's Central market, a popular shopping hub.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amrita Madhukalya was &lt;a class="external-link" href="http://www.dnaindia.com/india/report-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-our-country-2075010"&gt;published in DNA&lt;/a&gt; on April 6, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Bangalore girl Sumitra (name changed) remembers the day in 2009 she saw a  camera when trying on a skirt at Palika Bazaar. "I looked around the  tiny changing room and saw a camera with a dipping red light. I quickly  rushed out and accused the shopkeeper. But, Palika is not a place of  great repute, and my friend who was accompanying me asked me to forget  the matter," she says, and that's what she did. She was a degree student  at Delhi University, and being relatively unaware of the city, decided  to keep mum. "But look at what has happened: if they can film a Union  minister at a Fab India store, they will film anyone. We need stringent  action."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case of Union minister &lt;a href="http://www.dnaindia.com/topic/smriti-irani"&gt;Smriti Irani&lt;/a&gt; finding a CCTV camera at Goa's Fab India has again brought back the focus on digital &lt;a href="http://www.dnaindia.com/topic/voyeurism"&gt;voyeurism&lt;/a&gt; and how a critical issue like surveillance can be exploited. Irani's  case comes days after a woman found a mobile phone strapped to a  changing room door of a Van Heusen store in Lajpat Nagar's Central  market, a popular shopping hub.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the first cases of digital voyeurism was reported in Pune in  2003 when a peon in an establishment at Sahakar Nagar installed a web  camera in a changing room. In 2005, landowner Mohan Kulkarni from Navi  Peth was arrested for filming women tenants. In 2007, two MMS clips from  the changing rooms of a renowned departmental store in Kolkata started  making the rounds. In one, a girl was shown changing clothes while in  the other a couple was shown having sex. Then a year later, shop  assistant Sunil Kumar Jha was found filming women in a clothes store  from below the trial room door in Kolkata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Debarati Halder, advocate and founder of the Centre for Cyber Victim  Counselling, feels that had it not been a politician like Irani, the  case would not have been highlighted at all. "People would have brushed  off the incident had it been another woman. It is hard to escape the  amount of negative publicity a case like this garners," she says. This  is reflected in the case of a woman who was filmed in a leading store in  Mumbai and was scared to approach the police, as she and her father did  not want to go through the "legal hassles" of the case. The woman spoke  of her story to a journalist of a leading daily and the ensuing report  eventually led to the arrest of the shop assistant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security expert Pranesh Prakash says that digital voyeurism is a  huge problem in India and elsewhere. "There is a mismatch between  privacy protection provided in the IT Act against non-consensual sharing  of certain forms of sexual images, and the utter disregard for privacy  in other parts of the law. Given that cybercafes have often been places  where users are secretly filmed, the law should seek to crack down on  such invasions of privacy. Instead, the law doesn't prohibit that, and  in fact the Cybercafe Rules, encourage cybercafe owners to photograph  all users, including minors. The rules say that untrustworthy cybercafe  owners keep these records for a minimum period of one year, but there is  no maximum period," says Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 66E of the Information Technology Act, 2000, amended in 2008,  deals with digital voyeurism. And section 354 (C) of the Indian Penal  Code (IPC) deals with voyeurism in general.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, there are many loopholes. "When the footage is shot by a  government-run establishment, then the clause of surveillance is a  cover, like in an MMS of Delhi Metro (where a couple was shown making  out)."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country'&gt;http://editors.cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-08T00:59:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/SmitaSignature.png">
    <title>Smitha Signature</title>
    <link>http://editors.cis-india.org/home-images/SmitaSignature.png</link>
    <description>
        &lt;b&gt;Smitha's Signature&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/SmitaSignature.png'&gt;http://editors.cis-india.org/home-images/SmitaSignature.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-03-20T11:08:22Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/smari-talk.pdf">
    <title>Smari McCarthy</title>
    <link>http://editors.cis-india.org/openness/blog-old/smari-talk.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/smari-talk.pdf'&gt;http://editors.cis-india.org/openness/blog-old/smari-talk.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-02-26T08:30:08Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/news/economic-times-kalyan-parbat-june-23-2016-slow-internet-driving-you-nuts">
    <title>Slow internet driving you nuts? Here is how your service provider is fleecing you</title>
    <link>http://editors.cis-india.org/telecom/news/economic-times-kalyan-parbat-june-23-2016-slow-internet-driving-you-nuts</link>
    <description>
        &lt;b&gt;June 20 was World Wifi Day — an occasion to celebrate speedy, reliable internet connections. India, although a major internet market and the fastest growing now, is a very odd place for such celebration. Average internet speed in India is lower than all other countries in BRICs and lower than most other emerging economies. 

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://economictimes.indiatimes.com/tech/internet/slow-internet-driving-you-nuts-here-is-how-your-service-provider-is-fleecing-you/articleshow/52876719.cms"&gt;published in the Economic Times&lt;/a&gt; on June 23, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Plus, wired broadband speeds available to 17 million paying consumers in India are far below what service providers promise when they charge end users for particular data services. A data service package that promises 8 Mbps will typically max out at 5 Mbps (Mbps is megabits per second, a measure of internet speed). Wireless connections are even more patchy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still worse, the Telecom Regulatory Authority of India (Trai) and consumer advocacy groups haven't made much headway and service providers are ready with a set of arguments. Trai, which will release a consultation paper on promoting WiFi in public places, has a fairly conservative definition of broadband — that download speed should not fall below 512 kbps (kilobits per second; 1Mbps equals 1,000 kbps).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end result: high-paying consumers suffer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a wired broadband service used at homes, few factors determine performance. First, the contention ratio, a key metric that measures the number of internet users sharing a fixed amount of data capacity or 'bandwidth' in a location at the same time. If the number of such users is large, the contention ratio will be high and real internet speed low.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, the latency of a network, a measure of the delay a user experiences when his/her computer tries to access an internet server. If a service provider runs a low latency network, internet speed will be better.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third is per capita spectrum usage/holdings in a country and India's is far below that of Western countries and major emerging economies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, a low bandwidth availability country to begin with, wired broadband services typically have high contention ratio and/or high latency. Service providers Bharti Airtel, RCom and BSNL did not reply to ET's queries on internet speed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bijender Yadav, chief technology &amp;amp; information officer at Sistema Shyam Teleservices, another service provider, told ET data download speeds could fall below contracted levels in case of improper network planning and bandwidth distribution, or if there are glitches in the transmission link between a service provider's internet gateway and the home broadband user's premises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior executive of a leading wired broadband service said, on the condition of anonymity, that companies do make certain assumptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Say, 10 customers are sold 2 Mbps connections, which means 20 Mbps should be available. But the company may provide only 5 Mbps for these 10 customers, assuming not all customers will be using their internet connections heavily at the same time. Therefore, the guaranteed internet speed is not 2 Mbps, but just 500 kbps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many telco executives ET spoke to said while the contention ratios are high given bandwidth availability, since bandwidth is a "scarce resource" it must be "optimised" to keep prices low for consumers. These executives spoke off record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer advocacy groups are however sceptical of this argument. They say companies are simply maximising data connection sales without offering good network quality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Telcos are selling bandwidth way beyond the optimum capacity of their networks and compromising on speed. Could they have done this if bandwidth was a tangible resource like cars or machines...imagine selling more cars than you've manufactured," asks Hemant Upadhyay, advisor (telecom and IT) at Consumer Voice, a leading telecom consumer group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer groups have recently urged the telecom regulator, Trai, to ensure an app that can continuously monitor bandwidth availability should be in use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of Bengaluru-based research organisation, Centre for Internet and Society, argues Trai must ensure mandatory disclosure of contention ratios by service providers. "If such disclosures become mandatory, home broadband users can buy wired internet connections more judiciously with a better sense of what data speeds to expect from telcos and the possible quality of their experience."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trai did not offer any comment on the call for mandatory disclosure of contention ratios by wired broadband operators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A top executive of a leading operator, speaking off record, dismissed the proposal, saying "it wouldn't make sense to mandate service providers to make such disclosures as contention ratios vary from place to place".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts are optimistic that WiFi networks may offer better services to high-paying data consumers. Bharti Airtel, Vodafone and new entrant Reliance Jio Infocomm are deploying WiFi networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Airtel and Vodafone have also launched WiFi hotspots apps. Jio is slated to do the same after its expected launch later this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But WiFi in public places hasn't taken off so far. Cumbersome authentication procedures and challenges around monetising services have been hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The speed of internet in the world's fastest growing internet market will likely remain below world average in the near future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Plus, wired broadband speeds available to 17 million paying consumers in India are far below what service providers promise when they charge end users for particular data services. A data service package that promises 8 Mbps will typically max out at 5 Mbps (Mbps is megabits per second, a measure of internet speed). Wireless connections are even more patchy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still worse, the Telecom Regulatory Authority of India (Trai) and consumer advocacy groups haven't made much headway and service providers are ready with a set of arguments. Trai, which will release a consultation paper on promoting WiFi in public places, has a fairly conservative definition of broadband — that download speed should not fall below 512 kbps (kilobits per second; 1Mbps equals 1,000 kbps).&lt;br /&gt; The end result: high-paying consumers suffer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a wired broadband service used at homes, few factors determine performance. First, the contention ratio, a key metric that measures the number of internet users sharing a fixed amount of data capacity or 'bandwidth' in a location at the same time. If the number of such users is large, the contention ratio will be high and real internet speed low.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, the latency of a network, a measure of the delay a user experiences when his/her computer tries to access an internet server. If a service provider runs a low latency network, internet speed will be better.&lt;br /&gt; Third is per capita spectrum usage/holdings in a country and India's is far below that of Western countries and major emerging economies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, a low bandwidth availability country to begin with, wired broadband services typically have high contention ratio and/or high latency. Service providers Bharti Airtel, RCom and BSNL did not reply to ET's queries on internet speed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bijender Yadav, chief technology &amp;amp; information officer at Sistema Shyam Teleservices, another service provider, told ET data download speeds could fall below contracted levels in case of improper network planning and bandwidth distribution, or if there are glitches in the transmission link between a service provider's internet gateway and the home broadband user's premises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior executive of a leading wired broadband service said, on the condition of anonymity, that companies do make certain assumptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Say, 10 customers are sold 2 Mbps connections, which means 20 Mbps should be available. But the company may provide only 5 Mbps for these 10 customers, assuming not all customers will be using their internet connections heavily at the same time. Therefore, the guaranteed internet speed is not 2 Mbps, but just 500 kbps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many telco executives ET spoke to said while the contention ratios are high given bandwidth availability, since bandwidth is a "scarce resource" it must be "optimised" to keep prices low for consumers. These executives spoke off record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer advocacy groups are however sceptical of this argument. They say companies are simply maximising data connection sales without offering good network quality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Telcos are selling bandwidth way beyond the optimum capacity of their networks and compromising on speed. Could they have done this if bandwidth was a tangible resource like cars or machines...imagine selling more cars than you've manufactured," asks Hemant Upadhyay, advisor (telecom and IT) at Consumer Voice, a leading telecom consumer group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer groups have recently urged the telecom regulator, Trai, to ensure an app that can continuously monitor bandwidth availability should be in use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of Bengaluru-based research organisation, Centre for Internet and Society, argues Trai must ensure mandatory disclosure of contention ratios by service providers. "If such disclosures become mandatory, home broadband users can buy wired internet connections more judiciously with a better sense of what data speeds to expect from telcos and the possible quality of their experience."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trai did not offer any comment on the call for mandatory disclosure of contention ratios by wired broadband operators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A top executive of a leading operator, speaking off record, dismissed the proposal, saying "it wouldn't make sense to mandate service providers to make such disclosures as contention ratios vary from place to place".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts are optimistic that WiFi networks may offer better services to high-paying data consumers. Bharti Airtel, Vodafone and new entrant Reliance Jio Infocomm are deploying WiFi networks.&lt;br /&gt; Airtel and Vodafone have also launched WiFi hotspots apps. Jio is slated to do the same after its expected launch later this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But WiFi in public places hasn't taken off so far. Cumbersome authentication procedures and challenges around monetising services have been hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The speed of internet in the world's fastest growing internet market will likely remain below world average in the near future.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/news/economic-times-kalyan-parbat-june-23-2016-slow-internet-driving-you-nuts'&gt;http://editors.cis-india.org/telecom/news/economic-times-kalyan-parbat-june-23-2016-slow-internet-driving-you-nuts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Broadband</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    

   <dc:date>2016-07-01T15:32:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
