Why ban Skype, Viber and WhatsApp when you can monitor like India and China?

India, UAE, China and the US regulate electronic communication for national security; why can't Pakistan?

Ali Chughtai October 04, 2013
As electronic technology becomes increasingly complex and sophisticated, the internet has allegedly become a breeding ground for terrorists for mobilising their activities.The Sindh government’s solution to this menace, without examining any alternatives, is a proposal to temporarily ban multi-platform messaging and video applications including Skype, Viber and WhatsApp.

This comes as another unfortunate move for the general public of the country, especially since other nations have combated similar issues through less drastic means.

A fairly recent incident was the Mumbai terrorist attacks in 2008, after which the Indian government made demands to Gmail, Skype and Blackberry to share encryption keys that could help India monitor communication amongst users for the sake of intercepting potential terrorist activities. The companies initially resisted but India remained persistent, asserting that the companies had previously disclosed encryption keys to western nations facing similar predicaments. India also threatened to pull the plug on the companies’ local operations if they did not comply; hence, potentially putting the companies’ profits at risk. The companies eventually let the Indian government work in collaboration with them in order to achieve national security objectives.

Today, this phenomenon is not exclusive to India as other governments, from UAE to China to the USA all have agreements with internet companies to assist them with information that could help detect potential terrorist activities. Hence, companies active in the development of new internet applications, clearly understand that their applications may be regulated according to requests by the government.

Thus, providers such as Facebook and Google have an incentive to access and monetise their users’ private data for profit-generating purposes. For instance, if you were to receive a message via say, Gmail, from your friend telling you that he was in Istanbul, you might see Google advertising hotels or flights for Istanbul.

Until the recent Edward Snowden scandal, consumers in the US were unaware that law enforcement agencies frequently asked providers via subpoenas to provide data of individuals suspected of terrorist activity. Snowden, an American computer specialist and a former US Central Intelligence Agency (CIA) and National Security Agency (NSA) employee leaked classified details of several top-secret United States and British government mass surveillance programs to the press with the intent “to inform the public as to that which is done in their name and that which is done against them.” Snowden's release of NSA material was called the most significant leak in US history by Pentagon Papers leaker Daniel Ellsberg.

The monitoring and regulation process consists of the providers transferring the data and the intelligence agencies decrypting the data through their sophisticated technology and often intercepting problematic messages. Therefore, an efficient mechanism had to be developed through which a government could monitor communication without having to exhaust too many of its own resources.

This, of course, does not mean that catching potential terrorist activity on the internet is easy. In fact, terrorist organisations increasingly use encryption technology or their wit to avoid detection. For instance, weeks before the September 11, 2001 attacks, the terrorists used code language in an e-mail exchange to signal the attacks. The e-mail said,
“The semester (reported to mean 'attacks') begins in three more weeks (September 11). We've obtained 19 confirmations for studies in the faculty of law (reported to mean '19 terrorists for the September 11 attacks').”

However, some programs, such as Skype, are more difficult to decrypt because peer-to-peer communications are more complicated. In order to tackle this problem, countries like China only let such companies enter the local market that are willing to alter their software to the government’s liking, so that they can effectively monitor user data and intercept questionable communications for law enforcement purposes. However, this is often considered an extreme remedy since China plays a more intrusive role in regulating the internet as compared to other democratic nations.

That said, most sovereign nations, when faced with the task of monitoring electronic communications, try to strike a balance between a citizen’s right to access services and the State’s need to overview electronic data for national security. The legislature often develops mechanisms through which data-sharing with providers increases intelligence efficiency without complete censorship of such services. USA, Australia and England have legislated the criminal law enforcement and intelligence agencies to work synonymously for the monitoring and collection of evidence. India revised its Information Technology Act of 2008 and made it mandatory for global companies such as Google and Facebook to appoint local executives for swift intelligence-sharing.

Looking at these international examples, it is disturbing in Pakistan to see such a sweeping censorship proposal on the verge of being approved, without any semblance of public policy debate. A meeting unreported to the public at the Chief Minister House in Sindh led to the announcement of the proposed decision, with the Information Minister merely apologising for the proposed action. Sources also speculate that the inability of the Inter Services Intelligence (ISI) to monitor such data led to the proposal.

Therefore, unfortunately, with no sense of eagerness in sight by the government to unearth possible solutions, the public once again suffers at the hands of an untraceable enemy.

[poll id="294"]
WRITTEN BY:
Ali Chughtai An attorney at law in New York who does video-editing as a hobby and occasionally tweets @alic88 (https://twitter.com/alic88)
The views expressed by the writer and the reader comments do not necassarily reflect the views and policies of the Express Tribune.

COMMENTS (9)

Anooop | 10 years ago | Reply I am into IT and I can tell you that once the infrastructure for monitoring cyber activity is built, it can easily be manipulated. India is a Democracy and it'll always remain so. Its institutions have an unshakable foundation and there is no threat of military or any Taliban to take over or anyone who wants to override its Constitution. So, India can have such infrastructure in place to monitor activity on the Web. Pakistan is NOT India. You only need Nawaz Shariff to not allow Kayani's plane to land for an hour for a coup to take place. Thats what happened all those years ago with Musharaff and things haven't changed a bit since then. So, with all this in mind, trust me, its not a smart idea to give such capabilities to Pakistan. Its better Pakistan bans websites, not get the power to monitor, which can also include throttling. This technology will soon turn into a curse if TTP take over Pakistan or Military takes over. If that happens, with an infrastructure in place to monitor activity, any liberal who can voice his opinion against the Junta is an easy target. Imagine if TTP takes over Pakistan and they have this capability. People who are sympathetic to the Democratic cause are sitting ducks! Chinese arrested a blind man for writing against the Regime. The great firewall of China is a curse to anyone who is pro-Democracy or anti-Establishment. If Youtube is banned, no worries, you are alive. If the power to write against a Govt is gone, then all is lost. Don't you think?
rk | 10 years ago | Reply The reason for banning these internet services in Pakistan is not aimed at terrorism. The real intent is to stop questioning Islam or speaking against Islam. That is, the ban is part of the blasphemy issue.
VIEW MORE COMMENTS
Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ