India's Surveillance State

Slides:



Advertisements
Similar presentations
United Nations Counter-Terrorism Committee Executive Directorate (CTED) Thematic Discussion of the Counter-Terrorism Committee on Cash Couriers New York,
Advertisements

TWO DIFFERENT DEPARTMENTS OF THE GOVERNMENT OF INDIA GOVERN THE TELECOMMUNICATIONS SECTOR AND THE INFORMATION TECHNOLOGY SECTOR THESE TWO DEPARTMENTS.
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Rgu: Information management Management of target student numbers Working group.
Lab Outreach Connectivity System. Fast & Secure Access To Results Wherever You Have Internet Access Save time calling for results through instant access.
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
RISK ADVISORY SERVICES Green State IT Strictly Private and Confidential 29 September 2014 An initiative towards higher maturity for managing software.
 Overview of legal framework  Authorisation process  Analysis of main fund managers’ obligations 1.
30 Jan Information Management Framework IMF Training 19 November 2003 Overview.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Information Systems By Trino Aguiniga.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Opportunities and Challenges for Public Auditors.
INFORMATION RETRIEVAL, INFORMATION ACCESS & BIG DATA- LEGAL PERSPECTIVES.
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
1 GROUP-8. 2  To provide for electronic delivery of public services by the Government to all persons.  To ensure transparency, efficiency, accountability,
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Legal and Regulatory framework Regional Power Exchange Issues Apr 4, 2006 Kjell A Barmsnes
I Copyright © 2004, Oracle. All rights reserved. Introduction Copyright © 2004, Oracle. All rights reserved.
I am Very Most Definitely Blacklisted Due to this Project Anyway......
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Introduction Arrangements Louis P. Piergeti VP, IIROC March 29, 2011.
Cyber Security Training Assessment for Indian Army Cyber security for Social Networking 18 February 2015 Command HQ complex, Delhi Cantt.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
CONDUCTING CYBERSECURITY RESEARCH LEGALLY AND ETHICALLY By Aaron J. Burstein; Presented by David Muchene.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Various Stages of MiFID Implementation in Lithuania Tomas Talutis Lithuanian Securities Commission.
Introduction to the Tribal Child Support Enforcement Program.
Computers and Surveillance different types of surveillance surveillance programs some books and movies controversy.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
IPTS Workshop on Cyber Crime German Developments.
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
Monitoring and Supervision. June 15, Rotterdam 1 MONITORING ELECTRONIC COMMUNICATIONS: PRIVACY ISSUES Prof. Rimantas Petrauskas, Assoc.
CAG’s (DPC) Act, 1971 Introductory- Provisions of Art. 149& 151 Of the Constitution of India deal with Functions of CAG. Up to 1971 CAG continued to perform.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Progress made by countries of Eastern Europe, Caucasus and Central Asia in producing Indicator-based Environment Assessment Reports: Review Report Merab.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
“Global Indicators Workshop on Community Access to ICTs” Mexico City, November 2004 Presentation by: Roshan Shrestha Deputy Director Central Bureau.
International Telecommunication Union ITU Seminar on Standardization Accra, Ghana, May 2004 Numbering, naming, addressing and operational issues.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Prof. Dr. Lorena Bachmaier, Universidad Complutense Madrid, Spain Section III- Criminal Procedure Information Society and Penal Law Lorena Bachmaier Doha,
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Jordan Population and Housing Census 2015
1. Capital Markets (meaning, functions, and constituents); 2
Surveillance around the world
فایل ارائه حاضر توسط مرکز تحقیقات فناوری «اینترنتی از اشیاء »
SECURITY STANDARDS AND CYBER LAWS
Auditing Cloud Services
Inter operability of e-GP System
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Update on Lawful Interception (LI) Directive for ISPs
Presentation to TRAN Committee
GOVERNANCE AND ICT by Puneet Shukla N. R. E. C
Introduction to Databases Transparencies
Electronic Surveillance, Post 9/11
Presentation transcript:

India's Surveillance State

The substantive legal framework Telephone: Section 5(2), Indian Telegraph Act 1885 Internet: Section 69, Information Technology Act 2000 [Internet data] Section 69B, Information Technology Act [Internet meta-data]

The procedural legal framework Telephone: Rule 419A, Indian Telegraph Rules 1951 Internet: Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules 2009 [Internet data] Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules 2009 [Internet meta-data]

(Contd.) Procurement and review of lawful order

(Contd.) Retrieval of surveillance data

Other enabling provisions of law Section 28, Information Technology Act 2000 Section 29, Information Technology Act 2000 Rule 6, Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011 Rule 3(7), Information Technology (Intermediaries Guidelines) Rules 2011 Rule 7, Information Technology (Guidelines for Cyber Cafe) Rules 2011 Section 91, Code of Criminal Procedure 1973 TSP/ISP licenses

Functional surveillance mechanisms Lawful Interception and Monitoring Systems Primary sources of surveillance data Functionalities and number unknown Central Monitoring System (CMS) Brainchild of the Department of Telecommunications Elimination of manual components from the surveillance process Instant access to surveillance data Call Data Record analysis Total fund allocation: 400 crores

(Contd.) Network Traffic Analysis (NETRA) Designed specifically for Internet surveillance Scans Internet traffic for keywords such as “bomb”, “blast”, “kill” etc. National Intelligence Grid (NATGRID) Collation and analysis of data from 21 govt. databases Uses big data and other analytic technologies to build speculative profiles of targets “Outsourced” surveillance

Why should we be worried? No statutory right to privacy Executive monopoly Inadequate consideration of alternatives Lack of transparency

Thank you!