Mass surveillance in India

Last updated

Mass surveillance is the pervasive surveillance of an entire or a substantial fraction of a population. [1] Mass surveillance in India includes Surveillance, Telephone tapping, Open-source intelligence, Lawful interception, and surveillance under Indian Telegraph Act, 1885.

Contents

In recent years, India has seen use of facial-recognition technology by the law enforcement. Telangana is the most surveilled state in India with 36 CCTV cameras per 1,000 people, while cities Delhi and Chennai have more cameras per square mile than cities in China. [2] [3]

History

Colonial India

Police surveillance

Police in colonial India developed surveillance tactics as a form of preventive policing believing that a substantial portion of crime was being committed by those who were or were suspected to be repeat offenders. Higher ranking police officials would go through criminal records to identify those who were to be surveilled by the constabulary, to this end history sheets or "bad character rolls" were maintained on such individuals. These surveillance practices also depended on local district superintendents and could be outside legislative sanction as they were allowed to develop their own policing practices by the Police Act of 1861. This reliance on surveillance was seen necessary owing to the police force being minimally staffed and relying on indirect power following the 1857 rebellion. [4]

Indian Telegraph Act 1885

The section 5 of the Indian Telegraph Act allowed the Governor General or a Local Government to temporarily seize any licensed telegraph, and also gave them the ability block, intercept, detain, or even disclose the contents of any message transmitted during a "public emergency" or in "interest of public safety", the Secretary to the Government had a final say on whether something met those two criteria. [5] This act is one of the principal laws allowing surveillance of electronic communication in modern India. [6]

Use of Surveillance Technology

CCTV Cameras

Some Indian cities have some of the highest levels of CCTV surveillance in the world after those in China, with a Comparitech report in 2020 ranking Hyderabad among the top 20 most surveilled cities in the world, one of the only two non-Chinese cities in the list, with 29.99 CCTV cameras per 1000 people at that time. [7] The number of CCTV cameras has only risen since then, with the most recent data available as of June 2023 putting Hyderabad (83.32 cameras/1000 people), Indore (60 cameras/1000 people), and Delhi (19.96 cameras/1000 people) among the world's most surveilled cities. [8] However the number of CCTV cameras is not uniform among even major Indian cities, with just 4 cities; Hyderabad, Delhi, Chennai, and Indore accounting for 91% of CCTV cameras installed in the country. [9]

Facial Recognition Technology

Police forces in India have been using Facial Recognition software to identify "history-sheeters", "miscreants", solve missing person cases, with the Delhi police even using it to identify protestors during the 2019 anti-CAA protests and in the farmer protest in the following year. [10] [11] Police forces like the Telangana police run facial recognition systems along with their extensive CCTV surveillance network to feed live data into facial recognition algorithms. [12] [13] In 2017, the Chennai Police installed a facial recognition system running on real time CCTV footage from areas of T Nagar, a popular shopping street in the city, to detect any criminals stored in their database, similar systems have been deployed by the Punjab Police as Punjab Artificial Intelligence System (PAIS), and by the Surat Police using NEC's NeoFace technology. [14] [10]

Aadhaar Biometrics

The Government of India in 2009 introduced Aadhaar, a 12 digit identification document that can be obtained by any resident of India, with a goal to improve welfare delivery in the country. The enrollment process to obtain Aadhaar requires the submission of biometric data in the form of fingerprints, and an iris scan. [15] From its inception, the collection of this data for Aadhaar and its storage in a centralized database has raised privacy and surveillance concerns, with Aadhaar representing the world's largest such database with data on over 1.1 billion people. Over time Aadhaar has become increasingly mandatory to access basic state services, a necessary document for KYC verification to obtain a mobile SIM card, create a bank account, access loans, school and college admissions and scholarships, and has even been linked with other identification documents like the PAN card and Voter ID. Privacy advocates have pointed out that this level of Aadhaar integration allows the state to track all aspects of daily life of an individual as there is no legal restriction on the amount of information the government can access from this database, creating the necessary infrastructure for mass surveillance. [16] [17] [18] [19] The Aadhaar Act, 2016 tried to make Aadhaar mandatory for many public services including all welfare benefits and even allowed private companies to collect Aadhaar data, however the Supreme Court struck down these provisions of the act while upholding the validity of the act itself. [20] [21] However despite this verdict many organisations have continued claiming Aadhaar as a mandatory requirement. [22] [23]

Indian mass surveillance projects

India has been using many mass surveillance projects for many years. These include the following:

DRDO Netra

DRDO NETRA is another mass surveillance project of India. It has been developed by the Center for Artificial Intelligence & Robotics (CAIR) laboratory under the Defence Research and Development Organisation. The system could detect selective words like “bomb”, “blast”, “attack” or “kill” within seconds from emails, instant messages, status updates and tweets. The system will also be capable of gauging suspicious voice traffic on Skype and Google Talk. To enhance the capacity of the DRDO NETRA Project Black Knight was initiated in late 2013 to monitor social media trends and identify source of various viral messages that posed a risk to tranquility of the global community. Not much detail is available about the project, but it is rumored that the group of engineers later founded a private organization and now conducts social media analysis on Indian and foreign subjects by tapping fiber optic cables in India and overseas, including cybertapping infrastructure on the main internet communication cable in Mongolia which links rest of the world to China.[ citation needed ]

Lawful Intercept and Monitoring project

Lawful Intercept and Monitoring, abbreviated to LIM, is a clandestine mass electronic surveillance program deployed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development centre. [24] LIM systems are used by the Indian Government to intercept records of voice, SMSs, GPRS data, details of a subscriber's application and recharge history and call detail record (CDR) [25] and monitor Internet traffic, emails, web-browsing, Skype and any other Internet activity of Indian users. Mobile operators deploy their own LIM system which allows the government to intercept calls, after taking “due authorisation” in compliance with Section 5(2) of the Indian Telegraph Act read with Rule 419(A) of the IT Rules. The LIM system to monitor Internet traffic is deployed by the government at the international gateways of some large ISPs (between the ISPs Internet Edge Router (PE) and the core network). These surveillance systems are under complete control of the government, and their functioning is secretive and unknown to the ISPs. [24]

NCCC

National Cyber Coordination Centre (NCCC) is a proposed cyber security and e-surveillance project of India. [26] It aims at screening communication metadata and co-ordinate the intelligence gathering activities of other agencies. [27] In the absence of any legal framework and parliamentary oversight, the NCCC could encroach upon Indian citizens' privacy and civil-liberties. [28]

Telecom Enforcement Resource and Monitoring Project

Telecom Enforcement Resource and Monitoring (TERM), formerly known as Vigilance Telecom Monitoring (VTM), is the vigilance and monitoring wing of the Indian Department of Telecommunications (DoT). The main functions of TERM Cells are vigilance, monitoring and security of the network. Apart from this, TERM Cells also operate the Central Monitoring System and carry out other functions.

Central Monitoring System Project

Central Monitoring System is a surveillance related project of India. The project is run by Centre for Development of Telematics [29]

National Intelligence Grid (NATGRID)

NATGRID project of Home ministry is creating a centralised database of citizens and companies recording every interaction with the government, which amounts to profiling and mass surveillance of citizens and companies. [30]

Misuse of Section 144

An analysis by lawyers Vrinda Bhandari, Abhinav Sekhri, Natasha Maheshwari and Madhav Aggarwal of orders passed by Delhi Police under Section 144 found that the law is being used to create a parallel surveillance network. Many of the orders directed private parties like ATMs, Banks, girls PG/hostels, liquor vendors, owner of parking lots etc. to install CCTV cameras for surveillance purposes. [31] [32]

See also

Related Research Articles

<span class="mw-page-title-main">Closed-circuit television</span> Use of video cameras to transmit a signal to a specific place on a limited set of monitors

Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

<span class="mw-page-title-main">Facial recognition system</span> Technology capable of matching a face from an image against a database of faces

A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.

<span class="mw-page-title-main">Automatic number-plate recognition</span> Optical character recognition technology

Automatic number-plate recognition is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit television, road-rule enforcement cameras, or cameras specifically designed for the task. ANPR is used by police forces around the world for law enforcement purposes, including checking if a vehicle is registered or licensed. It is also used for electronic toll collection on pay-per-use roads and as a method of cataloguing the movements of traffic, for example by highways agencies.

<span class="mw-page-title-main">Information Technology Act, 2000</span> Act of the Parliament of India

The Information Technology Act, 2000 is an Act of the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce.

Big Brother Watch is a non-party British civil liberties and privacy campaigning organisation. It was launched in 2009 by founding director Alex Deane to campaign against state surveillance and threats to civil liberties. It was founded by Matthew Elliott. Since January 2018, Silkie Carlo is the Director.

INDECT is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the European Union. The purpose of the project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection through e.g. processing of CCTV camera data streams, standardization of video sequence quality for user applications, threat detection in computer networks as well as data and privacy protection.

<span class="mw-page-title-main">Domain Awareness System</span> Surveillance system by Microsoft

The Domain Awareness System is the largest digital surveillance system in the world as part of the Lower Manhattan Security Initiative in partnership between the New York Police Department and Microsoft to monitor New York City. It allows the NYPD to track surveillance targets and gain detailed information about them, and is overseen by the counterterrorism bureau.

<span class="mw-page-title-main">Ring (company)</span> Home security products manufacturer

Ring LLC is a manufacturer of home security and smart home devices owned by Amazon. It manufactures a titular line of smart doorbells, home security cameras, and alarm systems. It also operates Neighbors, a social network that allows users to discuss local safety and security issues, and share footage captured with Ring products. Via Neighbors, Ring may also provide footage and data to law enforcement agencies to assist in investigations.

<span class="mw-page-title-main">Central Monitoring System</span>

The Central Monitoring System, abbreviated to CMS, is a centralized telephone interception provisioning system installed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development centre, and operated by Telecom Enforcement Resource and Monitoring (TERM) Cells. The CMC system is set up in each major state collocated with the TERM Cells. Telecom operators in India are required by law to give access to their networks to law enforcement agencies.

Telecom Enforcement Resource and Monitoring (TERM), formerly known as Vigilance Telecom Monitoring (VTM), is the vigilance and monitoring wing of the Indian Department of Telecommunications (DoT). TERM is made up of 34 Cells in India's 22 telecom circles and 10 large telecom districts, each headed by a Senior Administrative Grade (SAG) level officer, termed as Deputy Director General (DDG). The main functions of TERM Cells are vigilance, monitoring and security of the network. Apart from this, TERM Cells also operate the Central Monitoring System (CMS), a clandestine mass electronic surveillance program, and carry out other functions. The TERM Cells function as the subordinate offices of the DoT in the field. These Cells represent the Telegraph Authority and the Licensor.

<span class="mw-page-title-main">Mass surveillance in the United Kingdom</span>

The use of electronic surveillance by the United Kingdom grew from the development of signal intelligence and pioneering code breaking during World War II. In the post-war period, the Government Communications Headquarters (GCHQ) was formed and participated in programmes such as the Five Eyes collaboration of English-speaking nations. This focused on intercepting electronic communications, with substantial increases in surveillance capabilities over time. A series of media reports in 2013 revealed bulk collection and surveillance capabilities, including collection and sharing collaborations between GCHQ and the United States' National Security Agency. These were commonly described by the media and civil liberties groups as mass surveillance. Similar capabilities exist in other countries, including western European countries.

<span class="mw-page-title-main">Mass surveillance in China</span>

Mass surveillance in the People's Republic of China (PRC) is the network of monitoring systems used by the Chinese central government to monitor Chinese citizens. It is primarily conducted through the government, although corporate surveillance in connection with the Chinese government has been reported to occur. China monitors its citizens through Internet surveillance, camera surveillance, and through other digital technologies. It has become increasingly widespread and grown in sophistication under General Secretary of the Chinese Communist Party (CCP) Xi Jinping's administration.

The National Cyber Coordination Centre (NCCC) is an operational cybersecurity and e-surveillance agency in India. It is intended to screen communication metadata and co-ordinate the intelligence gathering activities of other agencies. Some have expressed concern that the body could encroach on Indian citizens' privacy and civil-liberties, given the lack of explicit privacy laws in the country.

<span class="mw-page-title-main">Police surveillance in New York City</span>

The New York City Police Department (NYPD) actively monitors public activity in New York City, New York, United States. Historically, surveillance has been used by the NYPD for a range of purposes, including against crime, counter-terrorism, and also for nefarious or controversial subjects such as monitoring political demonstrations, activities, and protests, and even entire ethnic and religious groups.

<span class="mw-page-title-main">Internet Freedom Foundation</span>

Internet Freedom Foundation (IFF) is an Indian digital rights organisation that advances liberty, equality, fraternity and social justice in the digital age. IFF has three verticals of work that include strategic litigation, policy engagement and civic literacy.

There is an estimated 400,000 privately owned and 10,000 publicly owned security cameras in New Zealand. They are primarily used for security, but are also used for monitoring traffic, weather, dumping, and parking, among others. Taxpayers pay approximately $5.4 million per year on the running costs of security cameras, and for the five years prior to 2022, spent $29.8 million on installation costs. At least three councils use facial recognition. The police have access to over 5,000 cameras owned by businesses, councils and government agencies, which can be accessed by 4,000 police officers on their smartphones. The New Zealand Security Intelligence Service is responsible for human intelligence collection in New Zealand.

<span class="mw-page-title-main">Anti-facial recognition mask</span> Mask used to fool facial recognition software

An anti-facial recognition mask is a mask which can be worn to confuse facial recognition software. This type of mask is designed to thwart the surveillance of people by confusing the biometric data. There are many different types of masks which are used to trick facial recognition technology.

References

  1. "Mass Surveillance Technologies". Electronic Frontier Foundation. Retrieved 26 August 2014.
  2. Inzamam, Qadri; Qadri, Haziq (2022-07-15). "Telangana Is Inching Closer to Becoming a Total Surveillance State". The Wire. Retrieved 2022-09-03.
  3. Loganathan, Sonikka (2023-05-05). "Do CCTV cameras protect us or invade our privacy?". The Hindu . Retrieved 2023-05-06.
  4. Giuliani, Erin (2012). Policing Knowledge: Surveillance in Colonial Bengal, 1861 to 1913 (PDF) (Phd). The University of Queensland. Archived from the original (PDF) on 2020-03-14. Retrieved 2 April 2023.
  5. A Collection of the Acts passed by the Governor General in Council. 1885. p. 132.
  6. "Explained: The laws for surveillance in India, and concerns over privacy". The Indian Express. 2021-07-23. Retrieved 2023-04-02.
  7. Mihindukulasuriya, Regina (2020-07-22). "Hyderabad, Chennai, Delhi among world's top 50 most surveilled cities, says report". ThePrint. Retrieved 2023-06-04.
  8. "Surveillance Camera Statistics: Which City has the Most CCTV Cameras?". Comparitech. Retrieved 2023-06-04.
  9. "CCTV Surveillance Is Rising in India, World, but Crime Rates Remain Unaffected". The Wire. Retrieved 2023-06-04.
  10. 1 2 Facial Recognition Technology in India (PDF). Centre for Internet and Society (India). 31 August 2021.
  11. "Explained | Delhi Police's use of facial recognition technology". The Hindu. 2022-08-21. ISSN   0971-751X . Retrieved 2023-06-05.
  12. "The Hyderabad model of CCTV surveillance". mint. 2020-11-09. Retrieved 2023-06-05.
  13. "Data | Telangana stands out in CCTV surveillance". The Hindu. 2023-04-11. ISSN   0971-751X . Retrieved 2023-06-05.
  14. Murali, Anand (2018-08-13). "The Big Eye: The tech is all ready for mass surveillance in India". FactorDaily. Retrieved 2023-06-05.
  15. "India Is Collecting a Vast Database of Eye Scans and Fingerprint Records". Time. 2018-09-28. Retrieved 2023-06-05.
  16. Thornhill, John (2021-11-11). "India's all-encompassing ID system holds warnings for the rest of world". Financial Times. Retrieved 2023-06-05.
  17. "India's dodgy mass surveillance project should concern us all". Wired UK. ISSN   1357-0978 . Retrieved 2023-06-05.
  18. Chandran, Rina. "India's digital ID sparks debate over human right to personal data". Thomas Reuters Foundation News. Retrieved 2023-06-05.
  19. Panday, Jyoti (2017-06-01). "Aadhaar: Ushering in a Commercialized Era of Surveillance in India". Electronic Frontier Foundation. Retrieved 2023-06-05.
  20. "What's valid and what's not: Everything you need to know about Aadhaar verdict". The Economic Times. 2018-09-26. ISSN   0013-0389 . Retrieved 2023-06-05.
  21. "Supreme Court Aadhaar verdict: What today's judgment means for you". The Indian Express. 2018-09-26. Retrieved 2023-06-05.
  22. "The Aadhaar confusion | Four years on, some banks yet to honour Supreme Court's Aadhaar verdict". Moneycontrol. 2022-06-20. Retrieved 2023-06-05.
  23. "Aadhaar not mandatory yet organisations pose it as a mandatory document". Business Today. 2022-05-29. Retrieved 2023-06-05.
  24. 1 2 "Govt. violates privacy safeguards to secretly monitor Internet traffic". The Hindu. 9 September 2013. Retrieved 26 August 2014.
  25. "Govt sets norms for lawful interception and monitoring". The Indian Express. 17 February 2012. Retrieved 26 August 2014.
  26. "India's cyber protection body pushes ahead". Hindustan Times. 29 January 2014. Archived from the original on January 19, 2014. Retrieved 24 November 2014.
  27. "India gets ready to roll out cyber snooping agency". The Hindu. 10 June 2013. Retrieved 24 November 2014.
  28. "India Sets Up Domestic PRISM-Like Cyber Surveillance?". The Diplomat. 10 June 2013. Retrieved 24 November 2014.
  29. "Forget NSA, India's Centre for Development of Telematics is one of top 3 worst online spies". India Today. 12 March 2014. Retrieved 26 August 2014.
  30. Singh, Dalip (27 April 2023). "Close watch. NATGRID to turn lens on digital print of people, firms". Business Line . Retrieved 2023-04-30.
  31. Bhandari, Vrinda; Sekhri, Abhinav; Maheshwari, Natasha; Aggarwal, Madhav. "The Use and Misuse of Section 144 CrPC". SSRN. SSRN. Retrieved 2023-04-24.
  32. Bhandari, Vrinda; Sekhri, Abhinav; Maheshwari, Natasha; Aggarwal, Madhav (2023-04-24). "Section 144 CrPC: How a law was used to break law". The Times of India . Retrieved 2023-04-24.