Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 73 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 74 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Warning (512): Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853 [CORE/src/Http/ResponseEmitter.php, line 48]Code Contextif (Configure::read('debug')) {
trigger_error($message, E_USER_WARNING);
} else {
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-trace').style.display = (document.getElementById('cakeErr67f074a804551-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f074a804551-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-code').style.display = (document.getElementById('cakeErr67f074a804551-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-context').style.display = (document.getElementById('cakeErr67f074a804551-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f074a804551-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f074a804551-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /> <br /> &quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 9382, 'metaTitle' => 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer', 'metaKeywords' => 'ICTs,Governance,media,Law and Justice,Human Rights', 'metaDesc' => ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...', 'disp' => '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /><br />&quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /> <br /> &quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 9382 $metaTitle = 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer' $metaKeywords = 'ICTs,Governance,media,Law and Justice,Human Rights' $metaDesc = ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...' $disp = '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /><br />&quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer | Im4change.org</title> <meta name="description" content=" Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Indian government monitoring tweets, Facebook posts by Javed Anwer</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia".<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive.<br /><br />"People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter".<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $maxBufferLength = (int) 8192 $file = '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php' $line = (int) 853 $message = 'Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853'Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 48 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 148]Code Context$response->getStatusCode(),
($reasonPhrase ? ' ' . $reasonPhrase : '')
));
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-trace').style.display = (document.getElementById('cakeErr67f074a804551-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f074a804551-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-code').style.display = (document.getElementById('cakeErr67f074a804551-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-context').style.display = (document.getElementById('cakeErr67f074a804551-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f074a804551-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f074a804551-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /> <br /> &quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 9382, 'metaTitle' => 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer', 'metaKeywords' => 'ICTs,Governance,media,Law and Justice,Human Rights', 'metaDesc' => ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...', 'disp' => '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /><br />&quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /> <br /> &quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 9382 $metaTitle = 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer' $metaKeywords = 'ICTs,Governance,media,Law and Justice,Human Rights' $metaDesc = ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...' $disp = '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /><br />&quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer | Im4change.org</title> <meta name="description" content=" Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Indian government monitoring tweets, Facebook posts by Javed Anwer</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia".<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive.<br /><br />"People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter".<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $reasonPhrase = 'OK'header - [internal], line ?? Cake\Http\ResponseEmitter::emitStatusLine() - CORE/src/Http/ResponseEmitter.php, line 148 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 54 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 181]Notice (8): Undefined variable: urlPrefix [APP/Template/Layout/printlayout.ctp, line 8]Code Context$value
), $first);
$first = false;
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-trace').style.display = (document.getElementById('cakeErr67f074a804551-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr67f074a804551-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-code').style.display = (document.getElementById('cakeErr67f074a804551-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr67f074a804551-context').style.display = (document.getElementById('cakeErr67f074a804551-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr67f074a804551-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr67f074a804551-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /> <br /> &quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 9382, 'metaTitle' => 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer', 'metaKeywords' => 'ICTs,Governance,media,Law and Justice,Human Rights', 'metaDesc' => ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...', 'disp' => '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /><br />&quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /> <br /> &quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 9382 $metaTitle = 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer' $metaKeywords = 'ICTs,Governance,media,Law and Justice,Human Rights' $metaDesc = ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...' $disp = '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to &quot;ensure effective monitoring of Twitter and Facebook&quot;. While &quot;effective monitoring&quot; has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to &quot;strengthen the cyber security paraphernalia&quot;.<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these &quot;blanket surveillance practices&quot; are counterproductive.<br /><br />&quot;People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment,&quot; said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that &quot;telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter&quot;.<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer | Im4change.org</title> <meta name="description" content=" Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Indian government monitoring tweets, Facebook posts by Javed Anwer</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia".<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive.<br /><br />"People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter".<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $cookies = [] $values = [ (int) 0 => 'text/html; charset=UTF-8' ] $name = 'Content-Type' $first = true $value = 'text/html; charset=UTF-8'header - [internal], line ?? Cake\Http\ResponseEmitter::emitHeaders() - CORE/src/Http/ResponseEmitter.php, line 181 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 55 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
<head>
<link rel="canonical" href="<?php echo Configure::read('SITE_URL'); ?><?php echo $urlPrefix;?><?php echo $article_current->category->slug; ?>/<?php echo $article_current->seo_url; ?>.html"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia".<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive.<br /> <br /> "People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter".<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 9382, 'metaTitle' => 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer', 'metaKeywords' => 'ICTs,Governance,media,Law and Justice,Human Rights', 'metaDesc' => ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...', 'disp' => '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia".<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive.<br /><br />"People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter".<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 9382, 'title' => 'Indian government monitoring tweets, Facebook posts by Javed Anwer', 'subheading' => '', 'description' => '<div align="justify"> Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /> <br /> This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /> <br /> Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia".<br /> <br /> His statement was in response to a question from MP NK Singh.<br /> <br /> A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /> <br /> Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive.<br /> <br /> "People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham.<br /> <br /> Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter".<br /> <br /> He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /> <br /> India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /> <br /> In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /> <br /> Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /> <br /> <em>TIMES VIEW<br /> </em><br /> In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /> </div>', 'credit_writer' => 'The Economic Times, 11 August, 2011, http://economictimes.indiatimes.com/tech/internet/indian-government-monitoring-tweets-facebook-posts/articleshow/9559177.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'indian-government-monitoring-tweets-facebook-posts-by-javed-anwer-9491', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 9491, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 9382 $metaTitle = 'LATEST NEWS UPDATES | Indian government monitoring tweets, Facebook posts by Javed Anwer' $metaKeywords = 'ICTs,Governance,media,Law and Justice,Human Rights' $metaDesc = ' Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages. This follows a home ministry directive to...' $disp = '<div align="justify">Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.<br /><br />This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends.<br /><br />Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia".<br /><br />His statement was in response to a question from MP NK Singh.<br /><br />A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies.<br /><br />Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive.<br /><br />"People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham.<br /><br />Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter".<br /><br />He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies.<br /><br />India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging.<br /><br />In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.<br /><br />Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks.<br /><br /><em>TIMES VIEW<br /></em><br />In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. <br /></div>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'
include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51
![]() |
Indian government monitoring tweets, Facebook posts by Javed Anwer |
Beware of what you put in your Facebook messages or your tweets. Your friends and followers may not be the only ones reading them. Chances are government sleuths would be vetting these private messages.
This follows a home ministry directive to the department of telecom, asking it to "ensure effective monitoring of Twitter and Facebook". While "effective monitoring" has not been defined, sources said the MHA's intention is complete surveillance of the sites. This means not only does the government want to keep an eye on tweets and wall posts that are in the public domain but also the content you share only with your friends. Minister of state for communication and information technology Milind Deora said in a written reply in the Rajya Sabha last week that DoT had received a letter from the MHA asking it to monitor networking websites in order to "strengthen the cyber security paraphernalia". His statement was in response to a question from MP NK Singh. A senior government official said the home ministry's directive asked DoT to facilitate access to all data in social networking sites for its intelligence agencies. Sunil Abraham, executive director of Centre for Internet and Society said these "blanket surveillance practices" are counterproductive. "People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if government wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save law-abiding citizens from unnecessary harassment," said Abraham. Some Facebook and Twitter content is already under the surveillance of the National Technical Research Organization. Deora confirmed this, telling Parliament that "telecom service providers (already) provide facilities for lawful interception and monitoring of communication flowing through their network including communications from social networking websites like Facebook and Twitter". He said in cases where data is encrypted by websites like Twitter, the department works with the parties concerned to obtain access. Twitter and Facebook don't share private information on their servers without a court order. Twitter also has a policy of informing the user whose information is being shared with security agencies. India has in the recent months sought access to data from internet service providers as well as companies like Research In Motion, which sells BlackBerry phones capable of encrypted emails and messaging. In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers, web hosts and websites like responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists. Law enforcement agencies across the world monitor social networking sites but in most cases it is selective. A few days ago, Pentagon said that it was looking to monitor websites like Twitter in order to identify terror threats as well as to keep a tab on trends, unrest and events like popular revolts in the Arab world. Darpa, a research body under the US department of defence, said it had earmarked $42m to fund research into monitoring social networks. TIMES VIEW In the terrorism-ridden world we live in, security demands will be intrusive. But that doesn't mean the intrusion can be all-pervasive. When there are detailed guidelines on phone tapping, there's no reason why similar guidelines shouldn't be applied to surveillance of social networking sites. The basic principle should be clear: it can't be a fishing expedition on the off-chance that some wrongdoing may be detected. Surveillance of a person's social networking activity should be allowed only where there is a prima facie case of criminal activity. Plus there should be periodic review of each case. |