Sahitya Akademi promotes Indian classics for foreign language translation – NewsGram

0

To understand the whole picture, it is relevant to take a look at the existing regulations in China, in particular: the National Intelligence Law of 2017 and the Counterintelligence Law of 2014. The article 7 of the National Intelligence Law of 2017 authorizes the Chinese government’s deliberate integration of the public and private digital landscape, which compels Chinese citizens and organizations to cooperate with state intelligence work. As it stands, the law remains obscure and vague in terms of national security and intelligence work, Article 11 further adding to the risk associated with Chinese entities or companies operating overseas.

Article 11 authorizes Chinese intelligence agencies to collect and process information on any activities of “foreign entities or individuals” that jeopardize China’s national security and interests. The Counterintelligence Act 2014 states that when the state security organ investigates and understands the espionage situation and collects relevant evidence, the organizations and individuals concerned must provide it honestly and cannot not refuse. In short, it seems that organizations and individuals have no choice when it comes to helping the government. The Chinese government, with this loosely defined “intelligence work,” could force companies to hand over network data whether they want to or not. This concern has also been raised by Amnesty International, stating that the national security legal architecture poorly defines the concepts of “intelligence work”, which makes it subject to risk and human rights violation.

Your cell phone apps collect data such as biometrics like retina and fingerprints. (Representative image) | Pixabay

China has accused India of discriminatory practices that violate World Trade Organization rules after India banned Chinese mobile apps and, instead, China’s national firewall, colloquially known as the “Great Firewall”. -fire of China”, has implemented many types of content filtering and censorship to control Internet traffic from China. Data suggests that China accounts for three-quarters of takedown requests between July 2018 and July 2019 and around 85% of apps removed from Apple’s App Store.

Scrupulous attention to data collected by Apps would give us a peek into possible threats from a geopolitical perspective. Applications on your mobile phone collect data such as:

  1. Who are you: This includes biometrics like retina and fingerprints, a person’s physical characteristics, and other personally identifiable information.
  2. What are you doing: Your activities such as movement and GPS location, a person’s behavior and movement patterns.
  3. What you know: Containing information known only to the viewer personally, such as personal identification number (PIN), usernames and access tokens.
  4. What you have: This includes documents and numbers such as a national ID number, passport, bank account numbers, etc.

While European apps must comply with its data protection law – the General Data Protection Regulation (GDPR), the US tech ecosystem is also democratically regulated (you can go to court). Data protection principles in totalitarian states like China are highly apocryphal. Regarding Chinese applications, there is no transparency and information on the rights of the data subjects, nothing is known about the principles of consent and other legitimate grounds for the processing of personal data. Similarly, transfers and processing of data by third parties are also opaque, leaving Indian citizens vulnerable to exploitation by an undemocratic totalitarian state, which monitors and censors its citizens around the clock. Government and corporate interests, in a totalitarian state, are opaque. Apple may stand up to the US government (supposedly) and refuse to share data for individual privacy reasons, but the same cannot be said of China.

Image showing people connected to each other
The Internet has no borders and connects everyone. (Representative image) | Pixabay

The internet has no borders, de facto and de jure, which is why hundreds of millions of Indians today subscribe to apps created around the world. The Cambridge Analytica scandal proved beyond doubt that data can be used for sinister purposes. Small bits and bytes of data leak information about individuals, but if added up, it can have perilous national security implications. In his book Data and Goliath, Bruce Schneier discusses the “hidden battles to collect your data and control your world”. In 2015, that thought didn’t seem so grim. The epialtes unfolded so slowly that the world has missed the horror ever since. A variety of data is used for corporate and government surveillance worldwide, including but not limited to identity, transaction, location, activity and communication details. The sources of these data points include social media platforms, email accounts, desktop computers, networks and now the strongest source is our mobile devices.

During the act of war and the conflict between China and other countries, the data from these apps will give the Chinese regime a great geopolitical advantage. It can get a real-time picture of the other country’s various strategic and tactical defense and combat readiness initiatives. (IANS/SP)

(Keywords: ban, Chinese, applications, necessary, India, data, sovereignty, mobile, information, leak, surveillance, documents, GPS, biometrics, appearance, violation, defence.)

Share.

Comments are closed.