How India Censors The
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Seeking Offense: Censorship and the Constitution of Democratic Politics in India
SEEKING OFFENSE: CENSORSHIP AND THE CONSTITUTION OF DEMOCRATIC POLITICS IN INDIA A Dissertation Presented to the Faculty of the Graduate School of Cornell University In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Ameya Shivdas Balsekar August 2009 © 2009 Ameya Shivdas Balsekar SEEKING OFFENSE: CENSORSHIP AND THE CONSTITUTION OF DEMOCRATIC POLITICS IN INDIA Ameya Shivdas Balsekar, Ph. D. Cornell University 2009 Commentators have frequently suggested that India is going through an “age of intolerance” as writers, artists, filmmakers, scholars and journalists among others have been targeted by institutions of the state as well as political parties and interest groups for hurting the sentiments of some section of Indian society. However, this age of intolerance has coincided with a period that has also been characterized by the “deepening” of Indian democracy, as previously subordinated groups have begun to participate more actively and substantively in democratic politics. This project is an attempt to understand the reasons for the persistence of illiberalism in Indian politics, particularly as manifest in censorship practices. It argues that one of the reasons why censorship has persisted in India is that having the “right to censor” has come be established in the Indian constitutional order’s negotiation of multiculturalism as a symbol of a cultural group’s substantive political empowerment. This feature of the Indian constitutional order has made the strategy of “seeking offense” readily available to India’s politicians, who understand it to be an efficacious way to discredit their competitors’ claims of group representativeness within the context of democratic identity politics. -
How Law Made Silicon Valley
Emory Law Journal Volume 63 Issue 3 2014 How Law Made Silicon Valley Anupam Chander Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Anupam Chander, How Law Made Silicon Valley, 63 Emory L. J. 639 (2014). Available at: https://scholarlycommons.law.emory.edu/elj/vol63/iss3/3 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. CHANDER GALLEYSPROOFS2 2/17/2014 9:02 AM HOW LAW MADE SILICON VALLEY Anupam Chander* ABSTRACT Explanations for the success of Silicon Valley focus on the confluence of capital and education. In this Article, I put forward a new explanation, one that better elucidates the rise of Silicon Valley as a global trader. Just as nineteenth-century American judges altered the common law in order to subsidize industrial development, American judges and legislators altered the law at the turn of the Millennium to promote the development of Internet enterprise. Europe and Asia, by contrast, imposed strict intermediary liability regimes, inflexible intellectual property rules, and strong privacy constraints, impeding local Internet entrepreneurs. This study challenges the conventional wisdom that holds that strong intellectual property rights undergird innovation. While American law favored both commerce and speech enabled by this new medium, European and Asian jurisdictions attended more to the risks to intellectual property rights holders and, to a lesser extent, ordinary individuals. -
DNS Spoofing 2
Professor Vahab COMP 424 13 November 2016 DNS Spoofing DNS spoofing, also known as DNS Cache Poisoning, is one of the most widely used man-in-the-middle attacks that capitalizes on vulnerabilities in the domain name system that returns a false IP address and routes the user to a malicious domain. Whenever a machine contacts a domain name such as www.bankofamerica.com, it must first contact its DNS server which responds with multiple IP addresses where your machine can reach the website. Your computer is then able to connect directly to one of the IP addresses and the DNS is able to convert the IP addresses into a human-readable domain name. If an attacker is able to gain control of a DNS server and change some of its properties such as routing Bank of America’s website to an attacker’s IP address. At that location, the attacker is then able to unsuspectingly steal the user’s credentials and account information. Attackers use spam and other forms of attack to deliver malware that changes DNS settings and installs a rogue Certificate Authority. The DNS changes point to the hacker's secret DNS name server so that when the users access the web they are directed to proxy servers instead of authorized sites. They can also start to blacklist domains and frustrate the user with their day to day activities. All blacklisted domains would have their traffic dropped instead of forwarded to their intended destination. Based on the rogue Certificate Authority the system has no sign that an attack is taking place or ever took place. -
Secure Shell- Its Significance in Networking (Ssh)
International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected] Volume 4, Issue 3, March 2015 ISSN 2319 - 4847 SECURE SHELL- ITS SIGNIFICANCE IN NETWORKING (SSH) ANOOSHA GARIMELLA , D.RAKESH KUMAR 1. B. TECH, COMPUTER SCIENCE AND ENGINEERING Student, 3rd year-2nd Semester GITAM UNIVERSITY Visakhapatnam, Andhra Pradesh India 2.Assistant Professor Computer Science and Engineering GITAM UNIVERSITY Visakhapatnam, Andhra Pradesh India ABSTRACT This paper is focused on the evolution of SSH, the need for SSH, working of SSH, its major components and features of SSH. As the number of users over the Internet is increasing, there is a greater threat of your data being vulnerable. Secure Shell (SSH) Protocol provides a secure method for remote login and other secure network services over an insecure network. The SSH protocol has been designed to support many features along with proper security. This architecture with the help of its inbuilt layers which are independent of each other provides user authentication, integrity, and confidentiality, connection- oriented end to end delivery, multiplexes encrypted tunnel into several logical channels, provides datagram delivery across multiple networks and may optionally provide compression. Here, we have also described in detail what every layer of the architecture does along with the connection establishment. Some of the threats which Ssh can encounter, applications, advantages and disadvantages have also been mentioned in this document. Keywords: SSH, Cryptography, Port Forwarding, Secure SSH Tunnel, Key Exchange, IP spoofing, Connection- Hijacking. 1. INTRODUCTION SSH Secure Shell was first created in 1995 by Tatu Ylonen with the release of version 1.0 of SSH Secure Shell and the Internet Draft “The SSH Secure Shell Remote Login Protocol”. -
An Introspection of Film Censorship in India
Corpus Juris ISSN: 2582-2918 The Law Journal website: www.corpusjuris.co.in AN INTROSPECTION OF FILM CENSORSHIP IN INDIA -SUBARNO BANERJEE1 AND RITOJIT DASGUPTA2 ABSTRACT Cinema has been considered to be one of the most potent instrument of expression over a considerable amount of period. It is often considered to be a magnificent medium to communicate with people and impart knowledge and awareness. A traditional theatre system existed much before screen cinema could assert its authority in India and is said to have played a major role in nurturing emotions of freedom struggle through its plays in the pre-independence era. It was in 1913 India produced its first full-length feature film Raja Harishchandra. Cinema gradually became a powerful medium and went on to impact the lives of people, thoughts and even their political views. The medium has been witnessed to gain huge popularity and at present has become an integral part of common man’s leisure. Various statistics claim that India constitutes one of the largest film industries in the world in terms of number of films produced every year. Freedom of speech and expression is one of the most sacrosanct rights and is regarded as an integral concept in modern liberal democracies3. Society can develop only by free exchange of ideas4. However, since the drafting of the Constitution in 1947, freedom of speech and expression was considered controversial and received periodical dissent. According to Article 19(1) (a) of Part III of the Constitution of India, citizens shall have a right to freedom and expression. Films enjoy the same status and right so far as constitutional freedom relating to expression of ideas and spreading of ideas and messages are concerned but at the same time it places certain necessary restrictions on the content, with a view towards maintaining integrity of the state, public order, decency and morality and also communal and religious harmony, given the history of communal tension in the nation. -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
No Monitoring Obligations’ the Death of ‘No Monitoring Obligations’ a Story of Untameable Monsters by Giancarlo F
The Death of ‘No Monitoring Obligations’ The Death of ‘No Monitoring Obligations’ A Story of Untameable Monsters by Giancarlo F. Frosio* Abstract: In imposing a strict liability regime pean Commission, would like to introduce filtering for alleged copyright infringement occurring on You- obligations for intermediaries in both copyright and Tube, Justice Salomão of the Brazilian Superior Tribu- AVMS legislations. Meanwhile, online platforms have nal de Justiça stated that “if Google created an ‘un- already set up miscellaneous filtering schemes on a tameable monster,’ it should be the only one charged voluntary basis. In this paper, I suggest that we are with any disastrous consequences generated by the witnessing the death of “no monitoring obligations,” lack of control of the users of its websites.” In order a well-marked trend in intermediary liability policy to tame the monster, the Brazilian Superior Court that can be contextualized within the emergence of had to impose monitoring obligations on Youtube; a broader move towards private enforcement online this was not an isolated case. Proactive monitoring and intermediaries’ self-intervention. In addition, fil- and filtering found their way into the legal system as tering and monitoring will be dealt almost exclusively a privileged enforcement strategy through legisla- through automatic infringement assessment sys- tion, judicial decisions, and private ordering. In multi- tems. Due process and fundamental guarantees get ple jurisdictions, recent case law has imposed proac- mauled by algorithmic enforcement, which might fi- tive monitoring obligations on intermediaries across nally slay “no monitoring obligations” and fundamen- the entire spectrum of intermediary liability subject tal rights online, together with the untameable mon- matters. -
GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms
ACCESS TO KNOWLEDGE RESEARCH GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Prakash Nagla Rizk Carlos Affonso Souza GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Pra ash Nag!a Ri" Car!os Affonso So$"a ACCESS %O KNO'LE(GE RESEARCH SERIES COPYRIGHT PAGE © 2015 Information Society Project, Yale Law School; Access to Knowle !e for "e#elo$ment %entre, American Uni#ersity, %airo; an Instituto de Technolo!ia & Socie a e do Rio+ (his wor, is $'-lishe s'-ject to a %reati#e %ommons Attri-'tion./on%ommercial 0%%.1Y./%2 3+0 In. ternational P'-lic Licence+ %o$yri!ht in each cha$ter of this -oo, -elon!s to its res$ecti#e a'thor0s2+ Yo' are enco'ra!e to re$ro 'ce, share, an a a$t this wor,, in whole or in part, incl' in! in the form of creat . in! translations, as lon! as yo' attri-'te the wor, an the a$$ro$riate a'thor0s2, or, if for the whole -oo,, the e itors+ Te4t of the licence is a#aila-le at <https677creati#ecommons+or!7licenses7-y.nc73+07le!alco e8+ 9or $ermission to $'-lish commercial #ersions of s'ch cha$ter on a stan .alone -asis, $lease contact the a'thor, or the Information Society Project at Yale Law School for assistance in contactin! the a'thor+ 9ront co#er ima!e6 :"oc'ments sei;e from the U+S+ <m-assy in (ehran=, a $'-lic omain wor, create by em$loyees of the Central Intelli!ence A!ency / em-assy of the &nite States of America in Tehran, de$ict. -
LL.B.) (Effective from Academic Year 2019-20)
UNIVERSITY OF DELHI BACHELOR OF LAW (LL.B.) (Effective from Academic Year 2019-20) PROGRAMME BROCHURE LL.B. Revised Syllabus as approved by Academic Council on XXXX, 2018 and Executive Council on XXXX, 2018 Department of Law, University of Delhi CONTENTS Page I. About the Department 6 II. Introduction to CBCS 6 Scope Definitions 6 Programme Objectives (POs) 7 Programme Specific Outcomes (PSOs) 7 III. LL.B. Programme Details Programme Structure 8 LL.B. Programme (Semester Wise) 13 Eligibility for Admissions 18 Assessment of Students’ Performance 19 and Scheme of Examination Pass Percentage & Promotion Criteria: 20 Semester to Semester Progression Conversion of Marks into Grades Grade Points CGPA Calculation Division of Degree into Classes 23 Attendance Requirement 23 Span Period 23 Guidelines for the Award of Internal Assessment Marks 24 IV. Course Wise Content Details for LL.B. Programme 25- 429 2 Department of Law, University of Delhi I Semester (CORE COURSES) Page No. LB-CC-101 Jurisprudence-I (Legal Method, Indian Legal 25 System and Basic Theory of Law) LB-CC-102 Law of Contract 32 LB-CC-103 Law of Torts including Motor Vehicles Act and 39 Consumer Protection Act LB-CC-104 Law of Crimes-I: Indian Penal Code 48 LB-CC-105 Family Law-I 57 II Semester (CORE COURSES) LB-CC-201 Law of Evidence 63 LB-CC-202 Family Law – II 71 LB-CC-203 Law of Crimes-II: Code of Criminal Procedure 78 LB-CC-205 Property Law 85 LB-CC-206 Public International Law 92 III Semester (CORE COURSES) LB-CC-301 Constitutional Law-I 99 LB-CC-302 Company Law 111 LB-CC-303 -
Self-Censorship
Surrendering to Silence An Account of Self-censorship among Pakistani Journalists A Publication of Media Matters for Democracy Surrendering to Silence An Account of Self-censorship among Pakistani Journalists Lead Researcher Waqas Naeem Research Team Annam Lodhi Hassan Abbas Komal Tariq Zafar Nizamani Editing & Review Sadaf Khan Asad Baig Design and illustrations Aniqa Haider Published by Media Matters for Democracy 2018 Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0/ Some rights reserved. This report is dedicated to to all the Pakistani journalists who bravely bring truth to the public despite increasing pressures on them to self-censor, growing threats, and unending impunity in crimes of violence against media professionals Acknowledgements We would like to acknowledge the eorts of Media Matters team, who worked without complaining, under tight deadlines and despite heavy workloads and extended all requi- site support for this publication through its various stages. Foreword Over the course of our engagement with journalists in Pakistan we have witnessed ups and downs that keep the news industry on its toes. From attacks on journalists to the targeting of their families, from the use and abuse of legal instruments to intimidate, threaten and harass them to conveniently timed information leaks and structured hate campaigns against media workers – the obstructions in the way of a free press in Pakistan are many. However, nothing has been as alarming as the increase in the tendency to self-censor. It is dicult to pinpoint exactly when this trend became noticeable. If one had to identify one pivotal point, it would be the Peshawar Army Public School Attack in December 2014. -
CONTEMPORARY ISSUES in MEDIA ETHICS Boctor of $I)Tios(Opi)
CONTEMPORARY ISSUES IN MEDIA ETHICS ABSTRACT THESIS SUBMITTED FOR THE AWARD OF THE DEGREE OF Boctor of $I)tIos(opI)p IN PHILOSOPHY By MD. EHSAN Under the Supervision of M. MUQIM DEPARTMENT OF PHILOSOPHY ALIGARH MUSLIM UNIVERSITY, ALIGARH (INDIA) 2009 ABSTRACT Twenty first century is the century of knowledge and information. Knowledge is the power. Media such as newspapers, radio, television, magazines, internet etc. are the primary and central source of information and knowledge of this fast moving world. Hence, media enjoys enormous power and exerts tremendous impacts on our lives. Media as a powerful institution not only disseminates information and knowledge rather it influences our lives, our political systems and our society as a whole. It shapes our opinions, beliefs, attitudes and behaviours. It affects our decision and judgment about family, home, education, institution etc. through information and knowledge it provides. So much so that it fashions our tastes and moral standards, and socializes our younger generation. Furthermore, media has got important role to play in democracy. It is media which helps democracy become 'of and 'by' the people. It wheels democracy. It facilitates democracy by making interaction between the governed and the governor. Moreover, it is considered to be the back bone as well as the fourth pillar of democracy. * I am using media as a singular noun In view of the enormous power implicit in media, its tremendous impacts on our lives and on our governing systems, and in view of its deep penetration in our society the need arises to use it with great caution and control. -
Thesis That TW-OR Forwards All DNS Queries to a Resolver in China
The Impact of DNSSEC on the Internet Landscape Von der Fakult¨atf¨urIngenieurwissenschaften, Abteilung Informatik und Angewandte Kognitionswissenschaft der Universit¨atDuisburg-Essen zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften genehmigte Dissertation von Matth¨ausWander aus Lubin (L¨uben) Gutachter: Prof. Dr.-Ing. Torben Weis Prof. Dr.-Ing. Felix Freiling Tag der m¨undlichen Pr¨ufung:19. Juni 2015 Abstract In this dissertation we investigate the security deficiencies of the Domain Name System (DNS) and assess the impact of the DNSSEC security extensions. DNS spoofing attacks divert an application to the wrong server, but are also used routinely for blocking access to websites. We provide evidence for systematic DNS spoofing in China and Iran with measurement-based analyses, which allow us to examine the DNS spoofing filters from van- tage points outside of the affected networks. Third-parties in other countries can be affected inadvertently by spoofing-based domain filtering, which could be averted with DNSSEC. The security goals of DNSSEC are data integrity and authenticity. A point solution called NSEC3 adds a privacy assertion to DNSSEC, which is supposed to prevent disclosure of the domain namespace as a whole. We present GPU-based attacks on the NSEC3 privacy assertion, which allow efficient recovery of the namespace contents. We demonstrate with active measurements that DNSSEC has found wide adoption after initial hesitation. At server-side, there are more than five million domains signed with DNSSEC. A portion of them is insecure due to insufficient cryptographic key lengths or broken due to maintenance failures. At client-side, we have observed a worldwide increase of DNSSEC validation over the last three years, though not necessarily on the last mile.