Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 73 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 74 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Warning (512): Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853 [CORE/src/Http/ResponseEmitter.php, line 48]Code Contextif (Configure::read('debug')) {
trigger_error($message, E_USER_WARNING);
} else {
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-trace').style.display = (document.getElementById('cakeErr67f75780d940e-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f75780d940e-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-code').style.display = (document.getElementById('cakeErr67f75780d940e-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-context').style.display = (document.getElementById('cakeErr67f75780d940e-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f75780d940e-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f75780d940e-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 16585, 'metaTitle' => 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'metaKeywords' => 'internet', 'metaDesc' => ' -Live Mint India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...', 'disp' => '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 16585 $metaTitle = 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar' $metaKeywords = 'internet' $metaDesc = ' -Live Mint India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...' $disp = '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar | Im4change.org</title> <meta name="description" content=" -Live Mint India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Had the national cyber security been in place, the response from the government would have been better and time bounded.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said.</div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $maxBufferLength = (int) 8192 $file = '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php' $line = (int) 853 $message = 'Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853'Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 48 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 148]Code Context$response->getStatusCode(),
($reasonPhrase ? ' ' . $reasonPhrase : '')
));
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-trace').style.display = (document.getElementById('cakeErr67f75780d940e-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f75780d940e-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-code').style.display = (document.getElementById('cakeErr67f75780d940e-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-context').style.display = (document.getElementById('cakeErr67f75780d940e-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f75780d940e-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f75780d940e-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 16585, 'metaTitle' => 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'metaKeywords' => 'internet', 'metaDesc' => ' -Live Mint India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...', 'disp' => '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 16585 $metaTitle = 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar' $metaKeywords = 'internet' $metaDesc = ' -Live Mint India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...' $disp = '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar | Im4change.org</title> <meta name="description" content=" -Live Mint India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Had the national cyber security been in place, the response from the government would have been better and time bounded.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said.</div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $reasonPhrase = 'OK'header - [internal], line ?? Cake\Http\ResponseEmitter::emitStatusLine() - CORE/src/Http/ResponseEmitter.php, line 148 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 54 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 181]Notice (8): Undefined variable: urlPrefix [APP/Template/Layout/printlayout.ctp, line 8]Code Context$value
), $first);
$first = false;
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-trace').style.display = (document.getElementById('cakeErr67f75780d940e-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f75780d940e-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-code').style.display = (document.getElementById('cakeErr67f75780d940e-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f75780d940e-context').style.display = (document.getElementById('cakeErr67f75780d940e-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f75780d940e-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f75780d940e-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 16585, 'metaTitle' => 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'metaKeywords' => 'internet', 'metaDesc' => ' -Live Mint India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...', 'disp' => '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo; </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> &ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 16585 $metaTitle = 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang &amp; Sahil Makkar' $metaKeywords = 'internet' $metaDesc = ' -Live Mint India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...' $disp = '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn&rsquo;t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,&rdquo; said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Had the national cyber security been in place, the response from the government would have been better and time bounded.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. &ldquo;At present, there was a complete lack of coordination.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India&rsquo;s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)&mdash;the two main agencies fighting cyber crime&mdash;are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that&rsquo;s meant to define the government&rsquo;s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,&rdquo; said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. &ldquo;Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,&rdquo; said a home ministry official, who too refused to be identified. &ldquo;Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.&rdquo;</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,&rdquo; the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have got sufficient evidence,&rdquo; home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. &ldquo;I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,&rdquo; he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010&mdash;an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">&ldquo;We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,&rdquo; a railways spokesperson said.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar | Im4change.org</title> <meta name="description" content=" -Live Mint India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Had the national cyber security been in place, the response from the government would have been better and time bounded.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said.</div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $cookies = [] $values = [ (int) 0 => 'text/html; charset=UTF-8' ] $name = 'Content-Type' $first = true $value = 'text/html; charset=UTF-8'header - [internal], line ?? Cake\Http\ResponseEmitter::emitHeaders() - CORE/src/Http/ResponseEmitter.php, line 181 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 55 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
<head>
<link rel="canonical" href="<?php echo Configure::read('SITE_URL'); ?><?php echo $urlPrefix;?><?php echo $article_current->category->slug; ?>/<?php echo $article_current->seo_url; ?>.html"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “Had the national cyber security been in place, the response from the government would have been better and time bounded.” </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.” </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.” </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 16585, 'metaTitle' => 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar', 'metaKeywords' => 'internet', 'metaDesc' => ' -Live Mint India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...', 'disp' => '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Had the national cyber security been in place, the response from the government would have been better and time bounded.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said.</div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 16585, 'title' => 'Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar', 'subheading' => '', 'description' => '<div style="text-align: justify"> -Live Mint </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “Had the national cyber security been in place, the response from the government would have been better and time bounded.” </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.” </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.” </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> In India, cases related to cyber crime have increased significantly in the past few years. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. </div> <div style="text-align: justify"> <br /> </div> <div style="text-align: justify"> “We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said. </div>', 'credit_writer' => 'Live Mint, 22 August, 2012, http://www.livemint.com/2012/08/21202449/Hate-messages-absence-of-cybe.html?atype=tp', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'hate-messages-absence-of-cyber-security-policy-hits-govts-efforts-shubham-shivang-sahil-makkar-16713', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 16713, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 16585 $metaTitle = 'LATEST NEWS UPDATES | Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar' $metaKeywords = 'internet' $metaDesc = ' -Live Mint India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially...' $disp = '<div style="text-align: justify">-Live Mint</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Had the national cyber security been in place, the response from the government would have been better and time bounded.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.”</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">In India, cases related to cyber crime have increased significantly in the past few years.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people.</div><div style="text-align: justify"><br /></div><div style="text-align: justify">“We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said.</div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'
include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51
![]() |
Hate messages: absence of cyber security policy hits govt’s efforts -Shubham Shivang & Sahil Makkar |
-Live Mint India’s biggest crackdown on websites and blogs hosting hate messages was hobbled by the absence of a policy on cyber security, escalating panic and resulting in an exodus of people belonging to north-eastern states from several cities. The government initially identified 245 such websites, but could block only 207 of them, saying it couldn’t shut out the other 38 because of technical difficulties. It has identified and is in the process of blocking another 65 such websites. Four people have been arrested. “This is the first time that cyber crisis of this scale has happened in the country. The(re) was delay in government response by 80 hours to pass directions to intermediaries (like Facebook and Twitter) and telecom service providers on bulk messages,” said cyber law expert and Supreme Court lawyer Pavan Duggal. “Had the national cyber security been in place, the response from the government would have been better and time bounded.” A cyber security policy would have defined the roles of all the stakeholders in the crisis, he said. “At present, there was a complete lack of coordination.” India’s Computer Emergency Response Team (CERT-In) and National Technical Research Organization (NTRO)—the two main agencies fighting cyber crime—are hard-pressed and working overtime to identify websites and blogs carrying messages instigating Muslims against north-eastern people, according to government officials. Experts blame this on the delay in implementing the cyber security policy that’s meant to define the government’s action on research and development, capacity development and creating a national cyber alert system. The draft policy circulated last year requires the government to identify the most dangerous classes of cyber security threats to the nation, critical information technology (IT) infrastructure vulnerabilities, and other cyber security problems, and use the findings to develop and implement a coordinated research and development effort focused on the key needs. Officials in the department of electronics and IT, which is drafting the policy, acknowledged the policy has been delayed as the department was awaiting responses from other stakeholders. “We have now received the suggestions from every one and are making necessary changes. We will soon approach the cabinet for its approval on the same,” said a government official, who declined to be identified. CERT-In is tasked with cyber incident prevention and mitigation and NTRO with counter-cyber espionage and surveillance. Investigators say they have blocked or removed only 60% of the inflammatory content. “Most of these websites were hosted from across the border. Miscreants set up proxy servers in the US, Saudi Arabia and Egypt to target India,” said a home ministry official, who too refused to be identified. “Now we are seeking the help of these two countries (the US and Saudi Arabia) to take appropriate action.” “Google has informed us that they are ready to cooperate with Indian agencies provided they are approached through legal channels. But our problem is that it takes some 40-45 days to get information,” the official added. “We have got sufficient evidence,” home minister Sushil Kumar Shinde said outside Parliament on Tuesday. Neelabh Rai, an independent cyber researcher, holds a different view. “I doubt that it is mostly done from Pakistan as neither the ISI (Inter-Services Intelligence of Pakistan) or terrorist elements have cyber propaganda nor they have requisite capabilities. Our reading is that most of it could have been from within India,” he said. In India, cases related to cyber crime have increased significantly in the past few years. According to data complied by the home ministry, 1,791 cases were registered under the IT Act in 2011 against 966 in 2010—an increase of over 85%. Cyber cases under the Indian Penal Code went up by 18.5% in 2011. The IT Act deals with cases related to incidents like hacking, obscene publication in electronic form and IPC covers offences like false electronic evidence, forgery and counterfeiting. A total of 1,630 people, mostly aged 18-30, were arrested under these laws in 2011. Meanwhile, people from the North-East have started to return. On Tuesday, three special trains returned to Bangalore with people. “We have run three special trains from Guwahati, but it would be premature to say that people are returning to their work places,” a railways spokesperson said.
|