{"id":12184,"date":"2021-07-23T00:00:00","date_gmt":"2021-07-23T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/23-07-2021\/surveillance-laws-in-india\/"},"modified":"2024-05-08T16:04:55","modified_gmt":"2024-05-08T10:34:55","slug":"surveillance-laws-in-india","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/23-07-2021\/surveillance-laws-in-india","title":{"rendered":"Surveillance Laws in India"},"content":{"rendered":"<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In a recent response to the incident of individuals being targeted by <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #1155cc;\"><strong><u>Pegasus<\/u><\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, the Government of India has claimed that all <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>interception took place lawfully<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Background<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Over 300 mobile phone numbers<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in India were <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>targeted<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> by Pegasus spyware.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Indian list of \u201cverified\u201d <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>numbers includes<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> those used by ministers, opposition leaders, journalists, the legal community, businessmen, government officials, scientists, rights activists and others.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">However, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>presence<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of a phone number in the database was <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>not a confirmation of<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> whether the corresponding <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>device was infected with Pegasus or was subject to an attempted hack<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Pegasus was <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>developed by the NSO Group of Israel<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, which describes its <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>customers <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">as 60<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> intelligence, military and law-enforcement agencies<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in 40 countries.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It has <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>refrained from confirming the identities<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of any of them, citing client confidentiality obligations.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Government\u2019s Stand<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The government holds that the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>allegations<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> regarding <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>government surveillance on specific people<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> has <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>no concrete basis<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> or truth associated with it whatsoever.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In the past, similar claims were made regarding the use of Pegasus on WhatsApp by Indian state. Those reports also had <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>no factual basis<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and were categorically denied by all parties, including WhatsApp in the Indian Supreme Court.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">However, <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>WhatsApp confirmed<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> use of Pegasus to target journalists and human right activists in India in a lawsuit it had filed in a US court in San Francisco.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It highlighted that the latest news also appears to be a<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> similar fishing expedition<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, based on conjectures and exaggerations to<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> malign the Indian democracy <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">and its institutions.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Although <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Indian Government has not clearly admitted to or denied buying or using<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> Pegasus to conduct surveillance, the NSO Group has clarified that Pegasus is <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>used by sovereign governments in foreign countries<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Government held that all <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>interception took place lawfully<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Communication surveillance <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">in India takes place primarily under two laws, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Telegraph Act, 1885<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, which deals with interception of calls and the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Information Technology (IT) Act, 2000<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, which deals with surveillance of all electronic communication.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">However, a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>comprehensive data protection law<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to address the gaps in existing frameworks for surveillance is <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>yet to be enacted<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Telegraph Act, 1885<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Section 5(2)<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Telegraph Act<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> empowers the Central\/State government(s) to <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>stop transmitting<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>intercept<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> or <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>detain<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> or <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>disclose<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> calls and messages by a person or a group of people.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Under this law, the government <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>can intercept calls only in certain situations<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, namely the interests of the sovereignty and integrity of India, the security of the state, friendly relations with foreign states or public order, or for preventing incitement to the commission of an offence.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">These are the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>same restrictions imposed on free speech<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> under <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Article 19(2)<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of the Constitution.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Significantly, even these <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>restrictions can be imposed only when <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">there is a condition precedent, the occurrence of any <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>public emergency<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> or in the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>interest of public safety<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">A provision in <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Section 5(2)<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> states that even this <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>lawful interception cannot take place against journalists<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It reads that \u201cProvided that press messages intended to be published in India of correspondents accredited to the Central Government or a State Government shall not be intercepted or detained, unless their transmission has been prohibited under this subsection.\u201d<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Genesis<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Public Union for Civil Liberties versus Union of India<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> (1996), the SC pointed out <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>lack of procedural safeguards<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in the provisions of the Telegraph Act and laid down <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>certain guidelines<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> for interceptions.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">A public interest litigation (PIL) was filed in the wake of the report on \u201c<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Tapping of politicians phones<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u201d by the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Central Bureau of Investigation<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> (CBI).<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The SC held that <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>tapping<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> is a serious <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>invasion of an individual\u2019s privacy<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Every Government, howsoever democratic, exercises some degree of subrosa operation as a part of its intelligence outfit but at the same time citizen\u2019s right to privacy has to be protected from being abused by she authorities of the day,<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It also noted that <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>authorities<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> engaging in interception were <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>not even maintaining adequate records and logs<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> on interception.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Supreme Court\u2019s guidelines formed the basis of introducing <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Rule 419A in the Telegraph Rules in 2007<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and later in the rules prescribed under the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>IT Act in 2009<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Among the guidelines issued by the court were <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>setting up a review committee <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">that can look into authorisations made under <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Section 5(2) <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">of the Telegraph Act.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Rule 419A<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> states that a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Secretary<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to the Government of India in the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Ministry of Home Affairs<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> can pass <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>orders of interception<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in the case of Centre, and a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>secretary-level officer<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> who is in-charge of the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Home Department<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> can issue such directives in the case of a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>state<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> government.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In unavoidable circumstances, Rule 419A adds, such orders may be made by an <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>officer, not below the rank of a Joint Secretary<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to the Government of India, who has been <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>duly authorised <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">by the Union Home Secretary or the state Home Secretary.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Information Technology Act, 2000<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Section 69<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>IT Act<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and the<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> Information Technology (Procedure for Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> were enacted to further the legal framework for <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>electronic surveillance<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Section 69 empowers the Central\/State government(s) to intercept, monitor or decrypt any information generated, transmitted, received or stored in any computer resource in the interest of the sovereignty or integrity of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Apart from the restrictions provided in Section 5(2) of the Telegraph Act and Article 19(2) of the Constitution, Section 69 the IT Act <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>adds another aspect <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u201c<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>for the investigation of an offence<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u201d that makes it broader.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Significantly, it <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>dispenses with the condition<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> precedent set under the Telegraph Act that requires \u201cthe occurrence of <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>public emergency<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of the interest of public safety\u201d which <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>widens the ambit of powers<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> under the law.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Under the IT Act, <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>all electronic transmission of data<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> can be <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>intercepted<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">For a Pegasus-like spyware to be used lawfully, the government would have to <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>invoke both the IT Act and the Telegraph Act<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Central government has authorised<\/strong><\/span><\/span><\/span> <span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>10 agencies<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to intercept communications.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">These are Intelligence Bureau (IB), Narcotics Control Bureau (NCB), Enforcement Directorate (ED), Central Board of Direct Taxes (CBDT), Directorate of Revenue Intelligence (DRI), Central Bureau of Investigation (CBI), National Investigation Agency (NIA), Cabinet Secretariat (RAW), Directorate of Signal Intelligence (For service areas of Jammu and Kashmir, North East and Assam only) and Commissioner of Police, Delhi.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Way Forward<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>2012<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Planning Commission<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and the Group of Experts on Privacy Issues were <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>tasked with identifying the gaps in laws affecting privacy<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">On surveillance, the committee <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>pointed out divergence in laws on permitted grounds<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, \u201ctype of interception\u201d, \u201cgranularity of information that can be intercepted\u201d, the degree of assistance from service providers and the \u201cdestruction and retention\u201d of intercepted material.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Although the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>grounds of selecting a person<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> for surveillance and <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>extent of information gathering<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> has to be <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>recorded<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> in writing, the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>wide reach<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of these laws has <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>not been tested in court<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> against the cornerstone of Fundamental Rights.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">There is a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>need for more debates<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> on the issue in order to secure individuals\u2019 <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>right to privacy<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and to keep a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>check on the authoritative traits <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">of governments trying to silence the people who raise their voices.<\/span><\/span><\/span><\/li>\n<\/ul>\n<div>\n<table style=\"border-collapse: collapse; border: none; width: 624px;\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td style=\"background-color: #fff2cc; vertical-align: top; width: 624px; border: 1px solid #000000;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Pegasus<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Pegasus<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> is spyware that can be installed on devices running some versions of iOS (Apple&#8217;s mobile operating system) and on devices running on Android.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It was developed by the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Israeli cyberarms firm NSO Group<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">NSO is a highly-regulated enterprise that provides government agencies an essential tool to monitor terrorists and criminals.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Functioning<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It mainly uses <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Exploit Links<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> for its working. <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Clicking<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> on such links <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>automatically installs Pegasus<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> on the user&#8217;s phone. The method of <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Social Engineering<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> is used.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In the context of information security, social engineering is the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>psychological manipulation<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> of people into performing actions or divulging confidential information.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This differs from social engineering within the social sciences, which does not concern the divulging of confidential information.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Once the spyware is installed, Pegasus can <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>potentially harvest most of the data<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> on the device including SMS, emails, WhatsApp chats, call logs, GPS data, contact lists and transmit it back to the attacker.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It can <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>also activate functionalities<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> such as camera, microphone, call recording, etc. to provide <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>surveillance capabilities<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to the client.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">An<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong> online database<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> about the use of the spyware Pegasus was launched.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It was launched by <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Forensic Architecture, Amnesty International<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Citizen Lab<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to document attacks against human rights defenders.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It showed the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>connections between \u2018digital violence\u2019 of Pegasus<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and the threats faced by the lawyers, activists and other civil society figures.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Israel<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> has established a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>commission to review allegations<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> that the NSO Group\u2019s Pegasus phone surveillance software was <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>misused<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> to assess <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>whether<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>nation needs to make corrections<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Source: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/indianexpress.com\/article\/explained\/project-pegasus-the-laws-for-surveillance-in-india-and-the-concerns-over-privacy-7417714\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #1155cc;\"><u>IE<\/u><\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News In a recent response to the incident of individuals being targeted by Pegasus, the Government of India has claimed that all interception took place lawfully. Background Over 300 mobile phone numbers in India were targeted by Pegasus spyware. The Indian list of \u201cverified\u201d numbers includes those used by ministers, opposition leaders, journalists, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12185,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[114,30,26],"class_list":["post-12184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-cyber-crime-security","tag-gs-2","tag-gs-3"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/149585Current-Affairs.jpg","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/12184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=12184"}],"version-history":[{"count":1,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/12184\/revisions"}],"predecessor-version":[{"id":24490,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/12184\/revisions\/24490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/12185"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=12184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=12184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=12184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}