READING COMPREHENSION (CLASS 11 AND 12)Our freedoms are at stake

 SOLVED WORKSHEET 25
Pegasus scandal points to the making of a surveillance state in India. 

1. The past few days have once again provided extensive evidence of a cyberattack on Indian citizens. Barring the evasive statements issued by various ministers of the Government of India, we are yet to hear any substantive explanation of why phone numbers of several Indian politicians, including Rahul Gandhi, activists and lawyers were found to be amongst the 50,000 other phone numbers believed to be potential surveillance targets by governments around the world. It is correct that for a variety of reasons, forensic testing that might have revealed infection by NSO’PEGASUS was not possible in each of these cases. But the presence of these numbers does call for a thorough investigation, instead of another word salad being offered by the government. The French and Israeli governments have already ordered an investigation.

2. Most followers of this controversy will remember that this is not the first time the current government has been accused of snooping on civilians. In 2019, it was alleged that NSO’s software was used by Government of India to exploit a vulnerability in WhatsApp to illegally spy on 24 citizens, and hack as many as121 Indians. All that resulted in was bombastic denials by ministers, and blocking of any action by the ruling party. The Parliamentary Standing Committee on Information Technology had held some hearings but no substantive outcome resulted or at least no information was made public. Such inaction across board leaves us citizens to wonder whether the surveillance structure is one where all parties are complicit and the inaction is deliberate after some obligatory public outrage.

3. In 2019, WhatsApp, in order to avoid any conflict with GOI, decided to sue NSO in California. The documents filed in that lawsuit tell us that Pegasus could “remotely and covertly extract valuable intelligence from virtually any mobile device”. Pegasus was designed, in part, to intercept communications sent to and from a device, including communications over iMessage, Skype, Telegram, WeChat, Facebook Messenger, WhatsApp, and others. Pegasus was modular malware, which meant that it could be customised for different purposes, including to intercept communications, capture screenshots and exfiltrate browser history and contacts from the device. That case is now on the discovery stage, in which both sides can request documents and records that may reveal more.

4.  This is only a part of the surveillance structure that operates unbridled in India. On March 11, the Indian government casually announced the adoption of facial recognition technology enabled surveillance. We were told that using photographic and other information from government “databases”, 1,100 individual participants in the Delhi riots had been identified. The number was later raised to 1,900. When other advanced democracies, including the European Union and several states in the US, have been slowing down or stopping use of facial recognition in the public sphere altogether, here in India, we seem to be not only traveling at top speed in the other direction, but the actions of the government indicate that rule of law is no more than a small bump on the way.

5. There seems to be a concerted effort to create a surveillance state, monitor free flow of information and use technology to control instead of empowering citizens. Where the government reads every face, political dissent is under permanent intimidation. We cannot live our lives outside the range of others’ cameras anymore.

6.     What should happen now?

First, we should not allow this to be yet another scandal that captures our attention for a few weeks before some other thing erupts. We all must keep the pressure on.

Second, an independent inquiry commission must be set up. This commission should not be headed by one or two Supreme Court judges but by a panel consisting of members of judiciary, civil society and technical experts. We must also ensure that the matter is not sent to the CBI, who the Supreme Court itself has called a caged parrot.

Third, in the absence of an independent judicial inquiry ordered by the Supreme Court, states should order the kind of investigations the state of West Bengal headed by Mamata Banerjee has ordered.

Fourth, all the victims should approach courts, police and ask for their rights to be enforced. Courts should stop buying the catchall argument of national security and allow governments to use the market to create an infrastructure of surveillance. Government’s right to have continuous access to our data, without adequate safeguards, should also be held a violation of constitutional human rights.

Fifth, information about the three surveillance projects, namely CMS, NATGRID and NETRA, should be publicly available and they must be subject to the principles laid down in the Puttaswamy case.

Sixth, we must use this opportunity to force Parliament to make by statute a strong personal privacy charter protecting the right to be free from forms of behaviour collection and mass data analysis that are demonstrably harmful. Such an Act should not have any exceptions. It should subject all government surveillance — and government use of private surveillance technologies — to the rule of law.

 

Without the freedom to think freely, there are no rights that can be exercised by anyone. If we leave this discussion only to politicians and don’t hold them accountable this time, we are doomed to live through the death of freedom.

 

This column first appeared in the print edition on August 10, 2021 under the title ‘Government vs citizen’. The writer is Legal Director at Software Freedom Law Center.

READ THE PASSAGE CAREFUULY AND ANSWER THE FOLLOWING QUESTIONS BY CHOOSING THE BEST OPTION:
1. The word barring in para 1 refers to
a)     Except for                      b) but for                     c) if not for         d) All the three.
2. The phrase word salad in para 1 refers to
a)     irrelevant                     b) nonsense                 c) unimportant  d) All the three
3. The word snooping in para 2 refers to
a)     An illegal action
b)     getting information on other private affairs
c)     Looking into others behavior
4. The word complicit in para 2 refers to
a)     Something unlawful
b)    Something complicated
c)     Something expensive
5. The word intercept in para 3 refers to
a)     Cut off 
b)    Intervene
c)     Involve
d)    None of the above.
6. The word exfiltrate in para 3 refers to
a)     Take off
b)    Turn off
c)     Withdraw
d)    None of the above
7. The word surveillance in para 4 refers to
a)     A mentoring system
b)    A monitoring system
c)     A supervisory system
d)    None of the above.
8. The word unbridled in para 4 refers to
a)     Free from control
b)    Uncontrollable
c)     Unbelievable
d)    All of the above.
9. The word dissent in para 5 refers to
a)     Decrease
b)    Refuse to accept
c)     Disintegration
d)    None of the above.
10. The word intimidate in para 5 refer to 
a)     To make them timid
b)    To frighten them
c)     To put pressure on them to make them to do what they want
d)    All of the above.
11. The word scandal in para 6 refers to
a)     Something wrong
b)    Something unlawful
c)     Something illegal
d)    All of the above.
12. The word catchall in para 6 refers to
a)     Different types of
b)    All the arguments
c)     Irrelevant arguments
d)    All of the above.

ANSWERS FOR THE ABOVE ARE HIGHLIGHTED.



Comments