<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2411 to 2425.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/milestones.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/mikel_maron.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Mike.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/MHRD%20Estimate%20Expenditure.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/education-conference-bombay.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/picofmeshworm.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/MeshNetworks1.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy2_of_copy_of_merlin.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/merlin.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy_of_merlin.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/menaka.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/copy2_of_copy_of_menaka.jpg"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments">
    <title>Millions of Indians move from cash to digital payments. But some ask whether it’s safe</title>
    <link>http://editors.cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments</link>
    <description>
        &lt;b&gt;Minutes after Indian Prime Minister Narendra Modi began an ambitious new mobile-phone-payment application in December, several clones of the app popped up at Android smartphone stores.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rama Lakshmi was &lt;a class="external-link" href="https://www.washingtonpost.com/world/asia_pacific/millions-of-indians-move-from-cash-to-digital-payments-but-some-ask-whether-its-safe/2017/01/13/e807ebf0-ae9b-488b-9eb1-1dcba80ba984_story.html?utm_term=.fc710ade922b"&gt;published by Washington Post&lt;/a&gt; on 14 January 2017, Sunil Abraham was quoted. Annie Gowen contributed to this report.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In the first few days, users were flooded with &lt;a href="http://www.livemint.com/Industry/Q1z2di95uWbhcSMUKcx1SK/BHIM-app-users-raise-security-concerns-within-first-week.html"&gt;spam&lt;/a&gt; requests for money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bhim app sponsored by the government was rushed out after Modi’s abrupt &lt;a href="https://www.washingtonpost.com/world/asia_pacific/india-invalidates-large-bank-notes-in-crackdown-on-crime/2016/11/08/cc705ee2-a5c6-11e6-ba46-53db57f0e351_story.html?tid=a_inl&amp;amp;utm_term=.1e0d0920f753"&gt;withdrawal&lt;/a&gt; of large currency bills two months ago. More than 10 million people  downloaded it in just 10 days, but in a country where awareness and  regulation of &lt;a href="https://www.washingtonpost.com/world/asia_pacific/privacy-concerns-grow-in-india/2012/01/26/gIQAyM0UmQ_story.html"&gt;privacy&lt;/a&gt;, data protection and digital &lt;a href="http://timesofindia.indiatimes.com/business/india-business/None-of-mobile-payment-apps-in-India-fully-secure-warns-Qualcomm/articleshow/55967778.cms"&gt;security&lt;/a&gt; are low, the number of cyberattacks is rising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  are rushing toward launching and using these plethora of financial tech  apps without the exhaustive security testing and education that is  needed,” said Sunil Abraham, executive director of the Center for  Internet and Society. “We are operating in a bit of a regulatory  vacuum.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi’s ambitious move to swap old bills for new was intended to fight the hoarding of &lt;a href="https://www.washingtonpost.com/world/asia_pacific/india-targets-tax-evaders-who-hide-black-money-at-home-and-abroad/2015/09/04/2532b7c2-50c4-11e5-b225-90edbd49f362_story.html?utm_term=.6a8c7baf45d0"&gt;illicit&lt;/a&gt; cash reserves. But it was derailed by shoddy implementation, left citizens in Asia’s third-largest economy without &lt;a href="https://www.washingtonpost.com/world/panic-anger-and-scramble-to-stash-cash-amid-indias-black-money-squeeze/2016/11/10/32cb222a-565a-4c6f-8d40-59257c042109_story.html?utm_term=.6316c5fcb192"&gt;cash&lt;/a&gt; for weeks, slowed &lt;a href="https://www.washingtonpost.com/world/indias-currency-crisis-is-stalling-small-industries-and-sending-workers-home/2016/12/24/5a2d3aea-c7b2-11e6-acda-59924caa2450_story.html?utm_term=.ad60424e45f2"&gt;manufacturing&lt;/a&gt; and sent workers home, and is now likely to significantly affect the  country’s economic growth this year, economists say. It was acutely  painful for a country where 80 percent of transactions were conducted  with cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi quickly responded by turning the adversity into a call for Indians to kick their overwhelming dependence on &lt;a href="https://www.washingtonpost.com/world/asia_pacific/indians-like-to-pay-cash-the-government-is-now-forcing-them-to-swipe-cards/2016/12/16/58a5a42c-c0a6-11e6-b527-949c5893595e_story.html"&gt;cash&lt;/a&gt; and opt for digital payments overnight. The Bhim app is just one of  many available. But in this leap, experts say, security concerns are  being overlooked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new payment apps and e-wallet companies are governed by India’s  outdated information technology law of 2008 and central bank guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India  urgently needs a new digital payment law that regulates all these  mobile payment apps that have sprung up overnight,” said Pavan Duggal, a  cyber-law expert. “We are right now in a completely uncharted and  unsupervised territory legally. The norms for wallet companies are  undefined. If I lose my money due to a fraud, I can go round and round  in circles with no remedy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central bank recently issued  guidelines asking payment banks to carry out security audits, but Duggal  said “there is no penalty or punishment for noncompliance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  problem is compounded by the fact that education about security risks  online is abysmally sparse, especially in India’s small towns and  villages. Indians are complacent about cyber risks in their online  behavior, according to the Norton Cyber Security Insights &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/indian-users-complacent-when-it-comes-to-cyber-security-norton-report/"&gt;Report&lt;/a&gt;. India does not have a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India reported more than 39,000 incidents of cyberattacks in the first nine months of 2016, &lt;a href="http://164.100.47.190/loksabhaquestions/annex/10/AS16.pdf"&gt;according&lt;/a&gt; to the government, including phishing, scanning and probing, website  intrusions, defacements, virus and malicious code, and denial-of-service  attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Pentagon got hacked, right? You haven’t closed  down the Pentagon as yet,” said Piyush Goyal, a minister. “These things  will happen, and we have to be one step ahead of the hackers and the  so-called security breaches and continuously improving and improvising  as they do in America or other developed economies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October,  top banks had to fix the security codes of about 3.2 million debit cards  in one of the biggest data breaches in India. Some users complained  that their cards had been used in China.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, &lt;a href="https://www.washingtonpost.com/news/worldviews/wp/2016/12/12/the-man-hacking-indias-rich-and-powerful-talks-motives-music-drugs-and-next-targets/?utm_term=.33bc426ae67a"&gt;hackers&lt;/a&gt; attacked Twitter and email accounts of prominent politicians and  journalists and defaced the website of the National Security Guard, an  elite commando force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The focus of global hackers has shifted to  India. The cyber risk is a direct fallout of the growth in the number  of digital users,” said Saket Modi, the chief executive of Lucideus  Tech, the firm that conducted the security audit of the government’s  Bhim app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the cash crunch began, the largest private e-wallet company, Paytm, has experienced a 400 percent jump in new downloads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But only &lt;a href="http://gadgets.ndtv.com/telecom/news/mobile-internet-subscribers-in-india-reached-34265-million-in-march-sinha-863186" shape="rect"&gt;342 million people&lt;/a&gt; access the Internet on their mobile phones. The government has  introduced dial-in service for those who have basic cellphones to make  digital payments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is airing radio jingles telling  citizens not to share their personal identification numbers and has a  toll-free helpline to teach people how to make online payments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Officials  understand how security worries can be a big dampener in their campaign  to get people to go digital,” said Vinayak Godse, senior director at  the Data Security Council of India, an industry body that advises the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a trade-off between convenience and security, the central bank recently &lt;a href="http://tech.economictimes.indiatimes.com/news/internet/payment-firms-applaud-rbis-move-to-relax-2-factor-authentication-for-small-value-transactions/55858515"&gt;waived&lt;/a&gt; the mandatory two-factor authentication for transactions less than $30 online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some cybersecurity experts say that Indians are not ready for this step.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  police recently arrested a gang in the eastern state of Jharkhand;  operators were calling people posing as bank executives and tricking  them into sharing their card details. They used the cards to do online  shopping and transferred money into their e-wallet accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“People  are gullible and can be threatened or lured to part with their bank  details easily. We need as many safeguards as we can have,” said  Surendra Kumar, a senior police officer in New Delhi who busted the  gang.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the biggest problem people face is that police in one  state get very little cooperation from those in another state in  digital-crime complaints, said Rakshit Tandon, a cybersecurity expert  who trains police, military members and school students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Only in  big-ticket frauds will police departments from different states  coordinate their investigations,” Tandon said. “If a person loses a  relatively smaller amount digitally, the case won’t go far. Even though  that amount may mean a lot in that person’s life.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments'&gt;http://editors.cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    

   <dc:date>2017-01-16T02:52:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/milestones.jpg">
    <title>Milestones</title>
    <link>http://editors.cis-india.org/home-images/milestones.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/milestones.jpg'&gt;http://editors.cis-india.org/home-images/milestones.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-10-02T00:12:54Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/mikel_maron.jpg">
    <title>Mikel Maron</title>
    <link>http://editors.cis-india.org/home-images/mikel_maron.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/mikel_maron.jpg'&gt;http://editors.cis-india.org/home-images/mikel_maron.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-11T03:34:29Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Mike.jpg">
    <title>Mike</title>
    <link>http://editors.cis-india.org/home-images/Mike.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Mike.jpg'&gt;http://editors.cis-india.org/home-images/Mike.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-15T09:34:50Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call">
    <title>Microsoft says WannaCry ransomware must be a wake-up call for governments </title>
    <link>http://editors.cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call</link>
    <description>
        &lt;b&gt;Computer security experts said the current attack could have been much worse but for the quick action of a young researcher in Britain who discovered a vulnerability in the ransomware itself, known as WanaCryptor 2.0. It has, however, retweeted a blog post by Brad Smith, president and chief legal officer at Microsoft, who directs much of the blame toward the USA government, arguing that it should have alerted the $524 billion tech titan about the problem.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://journaldumaghreb.com/2017/05/20/microsoft-says-wannacry-ransomware-must-be-a-wake-up-call/"&gt;Journaldu Maghreb&lt;/a&gt; on May 20, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"This is an emerging pattern in 2017", he continued. "We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world", wrote Smith in a blog post on Sunday. Then there's the US government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen", Mr Smith wrote. Brad Smith, Microsoft's top lawyer, criticized US intelligence agencies for "stockpiling" software code that can be used by hackers. In February, Smith first called for the creation of what he has dubbed a Geneva Convention for cyberspace, which would outlaw nation-state cyberattacks on critical infrastructure and tech companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber-security firm HumanFirewall said that on account of high use of pirated Windows operating system in India, it was more susceptible to the attack. Microsoft has connected previous exploits of its products released by the mysterious Shadow Brokers group to tools which were stolen from NSA cyber warfare operations. "All our systems are updated as required". This sophisticated, self-propagating malware was created to spread to all other computers on the same network after infecting one machine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise. When 22 year olds are the heroes of the anti-cyber attack fight, rather than the agencies tasked to defend countries against these types of threats, it is perhaps time to question what these organisations have been doing all this time? NHS staff shared screenshots of the WannaCry programme, which demanded a payment of $300 (£230) in virtual currency Bitcoin to unlock the files for each computer. That dump included a vulnerability codenamed EternalBlue, which preys on a flaw in Microsoft Word to transmit malicious software from one Windows Computer to another. Usually used by cyber criminals, ransomware is a popular means of making illicit money from victims who have to pay the criminals in order to have their data decrypted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since. It was a stress-filled weekend for many IT workers this past weekend as the WannaCry ransomware attack spread, crippling Windows systems worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security firm BinaryEdge, which specializes in internet-wide scans, has detected more than 1 million Windows systems that have the SMB service exposed to the internet. "Otherwise they're literally fighting the problems of the present with tools from the past", he said. However, a cyber security expert working with the Centre for Internet and Society, Udbhav Tiwari working on vulnerabilities such as these, said as most ATMs in the country especially of the public-sector banks run on outdated operating systems, or are not updated regularly, they can be easily compromised. This allowed users of the older systems to secure their computers without requiring an upgrade to the latest operating software.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call'&gt;http://editors.cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T00:55:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/MHRD%20Estimate%20Expenditure.pdf">
    <title>MHRD Estimate Expenditure.pdf</title>
    <link>http://editors.cis-india.org/a2k/blogs/MHRD%20Estimate%20Expenditure.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/MHRD%20Estimate%20Expenditure.pdf'&gt;http://editors.cis-india.org/a2k/blogs/MHRD%20Estimate%20Expenditure.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-05-26T16:36:07Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/education-conference-bombay.pdf">
    <title>MHRD and Planning Commission Conference on Higher Education</title>
    <link>http://editors.cis-india.org/a2k/blogs/education-conference-bombay.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/education-conference-bombay.pdf'&gt;http://editors.cis-india.org/a2k/blogs/education-conference-bombay.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-03-06T07:28:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator">
    <title>Messaging apps find another foe in India’s market regulator</title>
    <link>http://editors.cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator</link>
    <description>
        &lt;b&gt;Paranoid governments and mobile operators aren’t the only one that dislike messaging apps. Regulatory bodies aren’t crazy about them either. The Securities and Exchange Board of India (SEBI) is worried that attempts to pass on confidential information or manipulate markets are originating from within services like WhatsApp and Blackberry Messenger.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a class="external-link" href="http://qz.com/82488/messaging-apps-find-another-foe-in-indias-market-regulator/"&gt;blog post was published in Quartz&lt;/a&gt; on May 8, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The regulator already analyzes data from trades for irregularities  through its “integrated market surveillance system”. That gives it an  idea of what stocks are being manipulated. Now it wants to expand its  horizons. The &lt;a href="http://www.thehindu.com/business/Industry/sebi-mulls-steps-to-check-manipulation-through-bbm-whatsapp/article4686269.ece"&gt;Press Trust of India&lt;/a&gt; reports that SEBI has looked into tracking Twitter and Facebook and is  grappling with messaging apps—though as yet it has no systems in place  for doing either, according to Elonnai Hickok of the Center for Internet  Studies in Bangalore. A SEBI spokesperson could not be reached for  comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if SEBI did start following you on Twitter, it  cannot snoop on your WhatsApp messages. That sort of power is the  preserve of intelligence and police authorities. And there is good  reason for SEBI’s restricted powers. Keeping the markets clean may be an  honorable pursuit, but the regulator hasn’t always used honorable  means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s finance minister last year said that SEBI would be allowed to &lt;a href="http://articles.economictimes.indiatimes.com/2012-11-19/news/35203786_1_sebi-data-records-securities-and-exchange-board"&gt;request call records&lt;/a&gt;,  which are the data kept by operators about who called whom, for how  long and from where. Such information can help investigators discover  sources of leaked information. It can also be used to figure out whether  traders are trying to influence other investigators. But a  freedom-of-information request &lt;a href="http://www.cobrapost.com/index.php/news-detail?nid=359&amp;amp;cid=23"&gt;recently revealed&lt;/a&gt; that SEBI had been requesting—and receiving—such data from carriers at  least since 2009, well before it was supposedly allowed to do so.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator'&gt;http://editors.cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:46:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/picofmeshworm.png">
    <title>MeshWorm</title>
    <link>http://editors.cis-india.org/home-images/picofmeshworm.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/picofmeshworm.png'&gt;http://editors.cis-india.org/home-images/picofmeshworm.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-02-25T06:57:47Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/MeshNetworks1.jpg">
    <title>Mesh Networks 1</title>
    <link>http://editors.cis-india.org/home-images/MeshNetworks1.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/MeshNetworks1.jpg'&gt;http://editors.cis-india.org/home-images/MeshNetworks1.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-08-21T05:40:28Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy2_of_copy_of_merlin.jpg">
    <title>MerlinO</title>
    <link>http://editors.cis-india.org/home-images/copy2_of_copy_of_merlin.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy2_of_copy_of_merlin.jpg'&gt;http://editors.cis-india.org/home-images/copy2_of_copy_of_merlin.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-23T09:58:17Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/merlin.jpg">
    <title>Merlin John</title>
    <link>http://editors.cis-india.org/home-images/merlin.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/merlin.jpg'&gt;http://editors.cis-india.org/home-images/merlin.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-10T07:04:02Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy_of_merlin.jpg">
    <title>Merlin</title>
    <link>http://editors.cis-india.org/home-images/copy_of_merlin.jpg</link>
    <description>
        &lt;b&gt;Merlin Oommen&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy_of_merlin.jpg'&gt;http://editors.cis-india.org/home-images/copy_of_merlin.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-23T04:41:37Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/menaka.jpg">
    <title>Menaka </title>
    <link>http://editors.cis-india.org/home-images/menaka.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/menaka.jpg'&gt;http://editors.cis-india.org/home-images/menaka.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-01-28T09:10:41Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/copy2_of_copy_of_menaka.jpg">
    <title>Menaka</title>
    <link>http://editors.cis-india.org/home-images/copy2_of_copy_of_menaka.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/copy2_of_copy_of_menaka.jpg'&gt;http://editors.cis-india.org/home-images/copy2_of_copy_of_menaka.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-01-28T09:15:41Z</dc:date>
   <dc:type>Image</dc:type>
   </item>




</rdf:RDF>
