New Encryption Policy soon as 70 percentage terrorists weaponise the internet

Published: 01st October 2016 08:27 AM  |   Last Updated: 01st October 2016 08:27 AM   |  A+A-



By Express News Service

NEW DELHI: India will soon release a national encryption policy with the focus on multi-stake holder to support the security agencies against terrorists with more than 70 per cent of such groups across the globe using various tools in the cyber medium, according to Gulshan Rai, the National Cyber Security Coordinator, Prime Minister’s Office.
The rapidly advancing technology has the potential to further globalisation, but the real challenge before the world is to find a balance and solution between security and privacy. Quoting a study done recently, Rai said 70-75 per cent of terrorists are using the medium to achieve their goal.
He pointed that the terrorists are using tools like voice over internet telecom, social media and even encryption to spread the menace of terrorism and further their goals.
 “India is coming out with the national encryption policy with the focus on multi-stake holder model which he said is the best model that will work on PPP (public private partnership),” said Rai, delivering the keynote address at the CyFy 2016, the India Conference on Cyber Security & Internet Governance.
He said in this model, the government, industry, academia and the civil society will work together to ensure a perfect balance between security and smooth flow of data.
“The main problem is in the flow of data from consumer to consumer while the access to data from government-to-government and government-to-industry and vice versa are quite smooth,” he said. He urged upon the civil society to come forward and help in finding an amicable solution which is acceptable to all.
He also reminded that the Snowden episode had demonstrated that users and nations need to be worried about the security of their data. It has, no doubt, led to interruptions in seamless flow of data and information, but the need for finding a fine balance between the security of data as well as seamless flow of data can be achieved by use of various encryption techniques and policies, Rai said.


Disclaimer : We respect your thoughts and views! But we need to be judicious while moderating your comments. All the comments will be moderated by the editorial. Abstain from posting comments that are obscene, defamatory or inflammatory, and do not indulge in personal attacks. Try to avoid outside hyperlinks inside the comment. Help us delete comments that do not follow these guidelines.

The views expressed in comments published on are those of the comment writers alone. They do not represent the views or opinions of or its staff, nor do they represent the views or opinions of The New Indian Express Group, or any entity of, or affiliated with, The New Indian Express Group. reserves the right to take any or all comments down at any time.

flipboard facebook twitter whatsapp