The Daily Beast
Noah Seelam/AFP via GettyThis story was produced in partnership with Coda Story.On the evening of Oct. 8, Father Stan Swamy took a break from watching TV and came down to the ground floor of Bagaicha, the Jesuit community center he founded in the eastern Indian town of Ranchi, Jharkhand. The 83-year-old priest and social activist was chatting with colleagues when an SUV pulled up outside.Four officers from the National Investigation Agency, Indias counter-terrorism task force, burst into the roomone of them holding a gun. Six more stood outside, and another police vehicle waited about 200 meters away. The officers spoke quietly to Swamy, seized his mobile phone and asked him to pack a bag.A colleague asked for an arrest warrant, but none was presented.The next morning, Swamy was driven to Ranchi airport and put on a two and half hour commercial flight to Mumbai, where he was remanded into custody by a special NIA court until Oct. 23. The agency filed a 17,000-page charge sheet on the same day, accusing him of links to the banned Communist Party of India (Maoist), which the Indian government views as a terrorist organization.Swamy, who was detained under the Unlawful Activities (Prevention) Act (UAPA), is the oldest person to be accused of terrorism in India. To him, the arrest came as no surprise. Police had raided his residence in 2018 and 2019 and confiscated his laptop, tablet, mobile phone, a hard drive, some thumb drives, CDs and documents.As a prominent human rights campaigner who has spent decades fighting for the rights of marginalized and indigenous people (Adivasis), Swamy was the latest arrest in a sprawling 2018 case that has seen 16 human rights activists accused of being in league with the CPI (Maoist).Maoist fighters and Indian forces have engaged in conflict in central and eastern India for five decades. More than 12,000 people have been killed in the violence in the past 20 years. The rebels say they are fighting for the rights of indigenous people and landless farmers in the mineral-rich region, but the state regards them as outlaws and violent extremists.Among the individuals arrested in the 2018 case under the UAPA, a broadly worded antiterrorism law that gives the authorities powers of investigation and detention, are a prominent scholar of Indias caste system, a professor of linguistics and an 81-year-old poet. All have one thing in common: they have spent their lives campaigning for the rights of so-called low-caste Hindus, minority Muslims and other vulnerable Indians. All have been repeatedly denied bail and are accused of conspiring with banned Maoist militants to incite unrest. All deny the charges.Twitter Helps Indias Nationalist Government Block DissentThe detentions are linked to clashes that broke out on January 1, 2018, in the village of Bhima Koregaon in the western Indian state of Maharashtra. Hundreds of thousands of Dalitslower-caste Hindus, once known as untouchablesgathered to mark the 200th anniversary of the victory of Dalit soldiers in the British Army over an army of the upper-caste Peshwa dynasty. The commemoration was disrupted by a mob waving saffron-colored flags, the symbol of the Hindu nationalists who dominate Prime Minister Narendra Modis government.The nationalists objected to the Dalits, who commemorate the battle as an important chapter in their ongoing struggle against Indias caste system, celebrating a victory by British colonial forces. At least one person died in the resulting violence and several were injured.Police investigations quickly latched onto a complaint that the violence was instigated by Maoists during a public rally attended by 35,000 people in Maharashtra the previous day. Police claimed to have discovered Maoist plots to assassinate Modi and overthrow his government. Police have so far arrested 16 activists, who are accused of being Maoist conspirators and inciting hate which contributed to the violence at the Bhima Koregaon commemoration.The governments case against Swamy rests on digital evidence discovered on his electronic devices and the devices of three more of the accused. According to the NIA, investigators discovered letters encouraging an uprising against a fascist government purportedly written by Swamy to Maoist leaders.Swamy is also accused of writing letters to Maoists advocating that they capture senior leaders of the ruling Bharatiya Janata Party in protest against a controversial anti-conversion law introduced in Jharkhand in 2017, with stiff jail sentences and fines for those found guilty of forcing anyone to change their religion. Human rights groups say the law targets Christian, Muslim, and other minority groups, including Adivasis, in an effort to enshrine Hindu culture and practices.Other letters allegedly show that Swamy received $110,000 from an associate to help the Maoists. The priest denies having ever sent any such messages.Mihir Desai, Swamys lawyer, claims the discovery of the letters points to the possible use of spyware. Eight people connected with the case were previous targets of spyware attacks. One such incident used malware tools from the controversial Israeli surveillance tech firm the NSO Group.Surveillance from hacking tools provided by companies like the NSO Group has become a hallmark in crackdowns on minority groups and activists around the world. The NSO has previously been linked with helping numerous governments to zero in on human rights activists, lawyers and journalists, in countries including Mexico, France, Bahrain and Saudi Arabia.Speaking of Swamy during a telephone conversation, Desai said, These letters have not been emailed from his computer, neither have they been found in his deleted files. Please understand these are not emails. If its an email, youd find it on the senders email or device, as well as the receivers.In a video recorded by his colleagues days before his arrest and uploaded to YouTube by Jharkhand Janadhikar Mahasabha, a coalition of progressive human rights organisations, Swamy said officers from the NIA had questioned him over five days in July and August. He said they had produced "some extracts" of letters allegedly taken from his computer that linked him to the CPI (Maoist). Swamy described the letters as "fabrications" that were put onto his computer.We are all aware how prominent intellectuals, lawyers, writers, poets, activists, student leaders they are all put in jail just because they have expressed their dissent or raised questions about the ruling powers of India, he added.Desai insists that the letters were planted on Swamys devices and added that the priest had ample reason not to have written them.Why would he create these files just to keep them on his computer, when he knows hes been under scrutiny for the last two years? he asked. His house was raided twice and he was questioned about his links with Maoists. Why would he still not delete these letters? He wouldnt do this unless hes a complete fool. Nihalsing Rathod is a junior lawyer who has been working with Surendra Gadling, a human rights lawyer who was also arrested in this case. Rathod said he once received suspicious emails from the poet Varavara Rao and the activist lawyer Arun Ferreira, both of whom were arrested in August 2018 after they were accused of being Maoist conspirators in the Bhima Koregaon violence. The communications arrived before their arrests.These emails looked suspicious and I had the good sense of not opening them. I called the senders instead, he said. They told me they had never sent me any email and got worried about a possible hacking.Suspicions of hacking are common in the arrests. In June 2020, the Canada-based Citizen Lab and Amnesty International released a report detailing how nine people, including Rathod, were targeted with malicious emails and messages. The investigation identified 12 spearphishing emails, messages which looked authentic because they appeared to come from a trusted source, sent between January and October 2019. All came from email accounts masquerading as belonging to journalists, officials from local courts or an activist that may have been known to the targets.These spearphishing emails attempted to use a PDF document to deliver NetWire, a commercially available spyware program capable of compromising Windows computers in order to monitor their actions and communications. Citizen Lab was unable to determine who was behind the attacks.Shalini Gera, an Adivasi rights activist and lawyer for one of those accused, also received similar emails. Ive been racking my brains over this: Why me?, she said. Look at all the others who have been targeted, the only thing that ties us together is Bhima Koregaon.Eight of the nine people targeted by the spyware are helping defend people arrested in the Bhima Koregaon case. Three of themRathod, Gera, and another Adivasi rights activistwere also targeted by another campaign that, according to Citizen Lab, used a program called Pegasus, a surveillance tool used by the NSO Group, to attack their WhatsApp accounts.Once installed, Pegasus can copy vast amounts of previously inaccessible data from smartphonesincluding contacts, voice calls, texts, emails, location and any data transmitted over apps including Facebook, WhatsApp and Skype. Pegasus can even turn on a phones camera, microphone and GPS to track a targets location and movements.Citizen Lab was unable to determine the extent of the breaches in both attacks and WhatsApp filed a lawsuit against the NSO Group in 2019. While the company says it does not operate any technology it provides to governments, the Modi administration has dodged questions on whether it has ever used Pegasus.Rathod claims that the evidence against Gadling was fabricated by the government. His suspicions were given some weight in December 2019, when the Indian magazine The Caravan reported that police may have edited files on Gadlings devices. The publication obtained clone copies of his computers from the police. They also found that the computer of another of the accused contained malware that could be used to plant files remotely.For Desai, finding evidence of electronic tampering is proving difficult. He is still trying to press the courts to give him access to clone copies of the devices seized from Swamy.Until the police provide clone copies of the hard disks, it is impossible to find out when and how the planting of evidence happened, he said.Swamy has campaigned against the Unlawful Activities (Prevention) Act for many years. The legislation has been criticised for erasing presumption of innocence, allowing the state to unilaterally declare anyone arrested a terrorist and incarcerate them without trial or bail.In 2019, India had 5,134 active cases under the law and the number of people being detained is rising every year. Critics claim the legislation has often been used to target religious minorities and marginalized communities, including Adivasis. A 2015 research paper by Swamy found that over 3,000 Adivasis have been falsely accused of being Maoists and are imprisoned in Jharkhand under the UAPA, or similar laws. Swamy is currently suing the state of Jharkhand over delays to those trials.In the video he posted before his arrest, Swamy linked his pro-Adivasi work to his arrest. This became a bone of contention with the state and they want to put me out of the way. And one easy way was to implicate me in some serious cases, he said.The historian and writer Ramachandra Guha believes that the Bhima Koregaon case can be characterised by the abuse of power by the state. The Bhima Koregaon case rests on dubious and manufactured evidence and is an extreme example of the ruling party abusing the power of the state to persecute its critics, he said, via email.It adversely affects the rights of Adivasis, Dalits, Muslims, as well as of independent writers, journalists and civil society activists of all backgrounds.Meanwhile, lawyers involved in the case fear they are still being surveilled.I assume that my mobile phone is tapped, said Desai. With the present government, anybody in my line of workhuman rights that iswould assume it. Catholic nuns hold placards during a protest against the arrest of Father Stan Swamy. Noah Seelam/AFP via Getty When Adivasi activist Dayamani Barla first met Swamy in Ranchi 20 years ago, she noticed his involuntary tremors.He was holding a glass of water but his hands shook so much that it wouldnt reach his mouth, she said.Those movements are caused by Parkinsons disease.His detention has united thousands of prominent Indians to push for his release. Immediately after Swamys arrest, a group of 2,000 scholars and activists signed a statement calling for his release. Recently, several high-profile individuals, including UN High Commissioner for Human Rights Michelle Bachelet, member of parliament Shashi Tharoor and Jharkhand Chief Minister Hemant Soren have made similar appeals.The courts have rejected bail applications from all of the accused, including Swamy, multiple times. Right-wing Hindu nationalists have described Swamy and his 15 co-accused and their educated supporters as invisible enemies of India.Desai spoke to Swamy by telephone in mid-November. Stan said he was doing ok but he didnt sound very well. Stan is a bold man; he was trying to sound bold.In a handwritten letter to his friends in January to mark 100 days in prison, Swamy expressed gratitude for the public goodwill he has received. At times, news of such solidarity has given me immense strength and courage, especially when the only thing certain in prison is uncertainty, he said.This story was produced in partnership with Coda Story.Read more at The Daily Beast.Get our top stories in your inbox every day. Sign up now!Daily Beast Membership: Beast Inside goes deeper on the stories that matter to you. Learn more.
Continued here:
Facebooks proposed move to end-to-end encryption threat to child protection - Yahoo Finance UK
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]