Quest of Data Colonialism and Cyber Sovereignty: India’s Strategic Position in Cyberspace

  • Shubh Gupta Jawaharlal Nehru University
  • Reeta Sony Jawaharlal Nehru University
Keywords: data colonialism, cyber sovereignty, India’s data policy., India’s cyber strategy, data sovereignty

Abstract

The dawn of the neocolonial project has seen the emergence of a new space: data. Data is a raw material that can be stitched, processed and marketed in the same way as the East India Company (EIC) used to do with India’s cotton. EIC, which started as one of the world’s first joint-stock companies, turned into a wild beast, building a corporate lobby with the help of lawyers and MP shareholders to amend legislation in its favor. The EIC became a particularly atrocious and innovative colonial project that directly or indirectly controlled continents, thanks to an army larger than the army of any nation-state at the time. The Drain Theory of Dadabhai Naroji have opened India’s eyes to how the EIC was taking raw material from the country and converting it into a finished product that was marketed in India again in the same way as raw data is being processed outside India and then marketed here today. In today’s digital era, big corporations need not own big armies, as companies are protected by nation-states and bailed out when required. Today, one does not need to travel overseas to explore and conquer Gold, God and Glory; instead, they are a click away. The neocolonial project runs on digital platforms, while the popular narrative of bridging the digital divide and giving internet access to millions of people resembles the idea of the “white savior” liberating the “noble savage” through modern Western education. Facebook’s grand plan of providing free internet to all can be best understood as a neocolonial strategy to mine the data of billions by equating it with water and land. Similarly, the Cambridge Analytica scandal provides an example of how neocolonial forces can influence the fundamental democratic process of electing a government. Therefore, nations endorsing democratic values should be especially wary of the trap of neocolonialist forces, as such nations are particularly vulnerable to their project. This paper critically study the cyber security infrastructure and policies in India and analyze the India’s approach towards cyber sovereignty and data colonialism and thereafter examine the India’s strategic position in cyberspace and suggest policy recommendations.

Downloads

Download data is not yet available.

Author Biographies

Shubh Gupta, Jawaharlal Nehru University

PhD Scholar

Reeta Sony, Jawaharlal Nehru University

Assistant Professor

References

Appadurai A. (1991) Global ethnoscapes: Notes and queries for a transnational anthropology. In: R. Fox (ed.) Recapturing Anthropology. Santa Fe: School of American Research Press, pp.191–210.

Basu A., Hickok E., Rathi A., Trikanad S. (2018) Cyberspace and External Affairs: A Memorandum for India. Available at: https://cis-india.org/internet-governance/files/cyberspace-and-external-affairs (accessed: 14.02.2021)

Bhabha H. (1984) Of Mimicry and Man: The Ambivalence of Colonial Discourse. Available at: https://doi.org/10.2307/778467 (accessed: 04.06.2021)

Bhargava K. (2020) PM Modi’s mantra for Atmanirbhar Bharat: Value-Addition to raw material, making finished goods. Available at: https://www.financialexpress.com/economy/pm-modis-mantra-for-at-manirbhar-bharat-value-addition-to-raw-material-making-finished-goods/2055739/ (accessed: 04.06.2021)

Brain J. (2021) The Cotton Industry. Historic UK. Available at: https://www.historic-uk.com/HistoryUK/HistoryofBritain/Cotton-Industry/ (accessed: 03.04.2021)

Brandom R. (2015) British “Karma Police” program carries out mass surveillance of the web. The Verge. Available at: https://www.theverge.com/2015/9/25/9397119/gchq-karma-police-web-surveillance (accessed: 07.02.2021)

Cheney-Lippold J. (2011) A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control. Available at: https://doi.org/10.1177/0263276411424420 (accessed: 04.06.2021)

Cohen J. (2007) Cyberspace As/And Space. Available at: https://schol-arship.law.georgetown.edu/facpub/807 (accessed: 04.06.2021)

Cyberspace as Global Commons: The Challenges. (2012) DATAQUEST., Available at: https://www.dqindia.com/cyberspace-global-commons-the-challenges-1/ (accessed: 04.03.2021)

Dijck J. van (2014) Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance & Society, no 2, pp. 197–208. Available at: https://doi.org/10.24908/ss.v12i2.4776 (ac-cessed: 10.05.2021)

Dijck J. van, Poell T., Waal M. de (2018) The Platform Society. Available at: https://oxford.universitypressscholarship.com/view/10.1093/oso/9780190889760.001.0001/oso-9780190889760 (accessed: 04.06.2021)

Ghosh S. & Kanter J. (2019) Google says data is more like sunlight than oil, just 1 day after being fined $57 million over its privacy and consent practices. Available at: https://www.businessinsider.in/google-says-da-ta-is-more-like-sunlight-than-oil-just-1-day-after-being-fined-57-mil-lion-over-its-privacy-and-consent-practices/articleshow/67640224.cms (accessed: 4.06.2021)

Gitelman L. (2013) “Raw data” is an oxymoron. Cambridge: MIT Press, 192 p.

Haupt M. (2016) Data is the New Oil—A Ludicrous Proposition. Medium. Available at: https://medium.com/project-2030/data-is-the-new-oil-a-ludicrous-proposition-1d91bba4f294 (accessed: 26.02.2021)

Hauser-Schäublin K., Dickhardt M. (2003) Kulturelle Räume—Räumliche Kultur. Available at: https://www.lit-verlag.de/isbn/978-3-8258-6799-4 (accessed: 20.08.2020)

Hiranandani G. (2000) Transition to Triumph: History of the Indian Navy, 1965–1975. New Delhi: Spantech & Lancer. 415 p.

Ho W.-C. (2008).The Transcendence and Non-Discursivity of the Life world. Springer Science + Business Media, no 3, pp. 323–342.

Jasanoff S. (2004). Ordering knowledge, ordering society. In: States of Knowledge: The Coproduction of Scienc and the Social Order. Available at: https://www.routledge.com/States-of-Knowledge-The-Coproduction-of-Science-and-the-Social-Order/Jasanoff/p/book/9780415403290 (accessed: 04.06.2021)

Kokot W. (2007) Culture and Space — anthropological approaches. Eth­noscripts , no 9, pp. 10–23.

Kumar A. (2014) Norm Entrepreneur, Catalyst or Challenger? India in the Nuclear Non-proliferation Narrative. Available at: https://journals.sage-pub.com/doi/abs/10.1177/0971523115592493 (accessed: 03.04.2021)

Latour B. (1987) Science in Action. Available at: https://www.hup.har-vard.edu/catalog.php?isbn=9780674792913 (accessed: 04.06.2021)

Lindsay J. (2015) The Impact of China on Cybersecurity: Fiction and Friction. Available at: https://www.belfercenter.org/publication/impact-chi-na-cybersecurity-fiction-and-friction (accessed: 04.06.2021)

Madhavan N. (2019) Is India cyber security ready? Available at: https://www.thehindubusinessline.com/opinion/columns/is-india-cyber-security-ready/article29911679.ece (accessed: 04.06.2021)

Mishra D., Chanchani M. (2020) Internet users in India: For the first time, India has more rural net users than urban. Available at: https://timeso-findia.indiatimes.com/business/india-business/for-the-first-time-india-has-more-rural-net-users-than-urban/articleshow/75566025.cms (accessed: 04.06.2021)

Mozur P. (2015) New Rules in China Upset Western Tech Companies. Available at: https://www.nytimes.com/2015/01/29/technology/in-china-new-cybersecurity-rules-perturb-western-tech-companies.html (accessed: 04.12.2021)

Roser M. (2018) The Internet’s history has just begun. Available at: https://ourworldindata.org/internet (accessed: 4.06.2021)

Pathak U. (2017) Cyber security and cyber laws in India: focus areas and issue areas. Vol. 6, issue 1. DOI: 10.5958/2277-937X.2017.00008.9

Preeti (2016) Colonial codification of education in India until 1920. Jour­nal of Indian Education, no 2, pp. 29–44.

Rao P. (2015) From Fishing Hamlet to Red Planet: India’s Space Journey. Bengaluru: ISRO, 736 p.

Xi Jinping P.E. (2015) Remarks. Available at: https://www.fmprc.gov.cn/mfa_eng/wjdt_665385/zyjh_665391/t1327570.shtml (accessed: 03.02.2021)

Said E. (2003) Orientalism. London: Penguin, pp. 1–28, 350–353.

Scholz L. (2018) Big Data is Not Big Oil: The Role of Analogy in the Law of New Technologies.Tennessee Law Review, vol. 85, p. 2020. DOI: 10.2139/ssrn.3252543

Segal A. (2016) China, Encryption Policy, and International Influence. Hoover Institution. Series Paper No. 1610. Available at: https://www.law-fareblog.com/china-encryption-policy-and-international-influence (accessed: 02.03.2021)

Segal A. (2020) China’s Vision for Cyber Sovereignty and the Global Governance of Cyberspace. NBR Special Report, no 87, pp. 85–100.

Sherman J. (2019) How Much Cyber Sovereignty is Too Much Cyber Sovereignty? Available at: https://www.cfr.org/blog/how-much-cyber-sovereignty-too-much-cyber-sovereignty (accessed: 07.12.2021) Singh S. (2013) Govt. Violates privacy safeguards to secretly monitor Internet traffic. Available at: https://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece (accessed: 04.03.2021)

Thengadi D. (1998) Thethirdway. Bengaluru: Sahitya Sindhu Prakashana, 283 p.

Venables A. (2019) Establishing Cyber Sovereignty — Russia Follows China’s Example. Available at: https://icds.ee/en/establishing-cyber-sovereignty-russia-follows-chinas-example/ (accessed: 16.12.2020)

Young R. (1995) Foucault on Race and Colonialism, Available at: https://www.semanticscholar.org/paper/Foucault-on-Race-and-Colonialism-Young/b4677c88a97256945644050fb7b2a33b1700503a (accessed: 04.06.2021)

Published
2021-07-27
How to Cite
GuptaS., & SonyR. (2021). Quest of Data Colonialism and Cyber Sovereignty: India’s Strategic Position in Cyberspace. Legal Issues in the Digital Age, 2(2), 70-81. https://doi.org/10.17323/2713-2749.2021.2.68.81