Commentary

Find our newspaper columns, blogs, and other commentary pieces in this section. Our research focuses on Advanced Biology, High-Tech Geopolitics, Strategic Studies, Indo-Pacific Studies & Economic Policy

C is for Cyber

The book Listening In by Prof Susan Landau studies the clash between the individual’s need for privacy and the law enforcement agencies’ need for access to information. It traces the evolution of cyber security and is a must read for aspiring cyber security professionals and those interested in privacy debates and cyber wars.

Susan Landau’s Listening In is an encyclopedia of cyber security, but misses out on the opportunity to set the stage for policy dialogue.

After the San Bernadino terrorist shootings of 2015, the FBI recovered an iPhone belonging to one of the attackers. FBI and Apple Inc came to loggerheads when Apple declined the FBI’s request to create software that would unlock the security protection on the iPhone. FBI wanted “exceptional access” to be built into the encryption systems on Apple’s iPhone, using the pretext of national security. However, Apple argued that in an age of cyber attacks, weakening of security should be the last thing to do, even if that means that the data of terrorists and criminals remain hidden from law enforcement. The basis of Apple’s argument was that security loopholes would be eventually found and exploited by hackers, presumably causing more harm to national security.Using the above case as the background for her book Listening In Cyber Security in an Insecure Age, Susan Landau, a cryptography and cybersecurity expert, studies the clash between the individual’s need for privacy and the law enforcement agencies’ need for access to information. Landau unequivocally bats for not weakening security standards, even if that makes government investigations difficult. She sets the stage for her argument for stronger encryption standards by narrating one example after another of cyber espionage, exploits and attacks, and how these have been getting more sophisticated over time. She traces the first cyber espionage to 1986. With the involvement of the CIA, KGB, and a student in Germany hacking into systems at an energy research lab at Berkeley, this story makes for a fascinating read.Read more here>

Read More
High-Tech Geopolitics Nitin Pai High-Tech Geopolitics Nitin Pai

Modi govt must punish lynch mobs, not coerce WhatsApp into curbing users’ freedoms

WhatsApp is doing a lot of things in response to the union government: tagging forwarded messages as such, testing “a lower limit of five chats at once”, removing “the quick forward button next to media messages”, and promoting digital literacy. It also plans to introduce its “fake news verification model” in India ahead of the coming general elections in 2019. It has also announced a public competition to identify solutions on how to counter the spread of mala fide information.Yet, in the absence of any measures of its own to deter and punish violent lynch mobs, the government’s determination to move against one specific channel of communication could well end up as a wild goose chase.Conceptually, laying all the blame at WhatsApp’s door is a lot like blaming bus service operators for allowing criminals to ride to the scene of the crime. Not that the bus operator has no role to play in preventing the crime; but that it is not solely or primarily the bus operator’s fault that criminals ride their buses to work.Read more

Read More
High-Tech Geopolitics Nitin Pai High-Tech Geopolitics Nitin Pai

Social Media Censorship Won’t Stop Lynchings. We Need a New Gandhi

That social media in general — and WhatsApp in particular — are important channels through which bigotry is spreading, is now well-known, if less well-understood.Around ten years ago, I had begun to speculate that as mobile internet pervades societies and they become radically networked, we will see both entirely new forms of politics and new forms of political expression.Read more

Read More

On Sale: Your Vote

Our data, taken without our consent, can be used for informational warfare that harms our democracy. The actions of social media and analytics companies are a clear threat to voters’ rights to make free and fair choices.

Our data, taken without our consent, can be used for informational warfare that harms our democracy.

The Cambridge Analytica (CA) controversy has captured international mindspace over the last two days. In an interview with the Guardian, Christopher Wylie, the whistleblower at CA, laid bare the facts of how the company, under the influence of Steve Bannon (Donald Trump’s former chief strategist and former executive chairman of Breitbart) and Robert Mercer (an AI billionaire and Republican donor) used data from social media for “information warfare”. Wylie claims that over 50 million Facebook user profiles were harvested under false pretences, and then used for ballot box gains in the 2016 US presidential elections.People not only share and like things on social media, but often participate in “free” quizzes and personality tests that let these social media companies gather data on their personal and ideological preferences. The analysed data can  then used for commercial purposes, by either directly displaying ads and news tailored to particular demographic groups, or by further passing this data (knowingly or otherwise) to analytics companies like CA. The data analytics firms combine data from multiple sources and, using highly advanced algorithms, can generate sophisticated psychological profiles at group and individual levels. They can sell these to anyone who stands to profit from exploiting this data. These profiles are powerful tools, and can be used for tactical and strategic purposes against one’s opponent, or for spreading propaganda and fake news to influence  susceptible people. Thus ensues “information warfare”.Read more here>

Read More