Posts tagged “India”
This section details the research questions that informed our study. We also outline in detail the methods that we adopted to identify Netsweeper installations worldwide, and those that we employed to reduce the findings to countries of interest. We also present high-level technical findings and observations.
In this section, we spotlight several countries where we have evidence of public ISPs blocking websites using Netsweeper’s products. Each country has significant human rights, public policy, insecurity, or corruption challenges, and/or a history of using Internet censorship to prevent access to content that is protected under international human rights frameworks.
The Indian Space Research Organization (ISRO) is planning its next remote sensing satellite.
Source: Open the Magazine
In 1976, at the height of the Emergency imposed by Indira Gandhi, India’s Parliament enacted a piece of legislation called the Foreign Contribution (Regulation) Act.
Blue Coat Devices capable of filtering, censorship, and surveillance are being used around the world. 61 of these Blue Coat appliances are on public or government networks in countries with a history of concerns over human rights, surveillance, and censorship. Our findings support the need for national and international scrutiny of Blue Coat implementations in the countries we have identified, and a closer look at the global proliferation of “dual-use” information and communication technologies.
Source: The Hacker News
According to a report, all major Indian telecom companies, including Bharti Airtel, Vodafone India and Tata Tele services, have agreed to share real-time interception of BlackBerry calls and data services on their networks with Security agencies.
Source: The Indian Express
A 20-year-old youth was arrested on charge of uploading an objectionable picture on the Facebook, police said on Saturday.
Source: Aman Sharma, Economic Times
The government is gearing up to arm cyber sleuths with forensic tools to catch up with criminals who outsmart investigators by using secure mobile phones or password-protected computers.