Wednesday, May 25, 2011

See What Headleys And Kasabs Did For Us

http://www.cybervictims.org
Using the cyber space for spreading extremist ideologies or gaining valuable informations for the purpose of terrorist activities have become a trend now a days. Since the 9/11 incidence, all most all countries are developing stringent laws to  close any single hole through which extremists can pour in the venomous principles in the cyber space. But could the laws really achieve their purposes? Probably no. The examples of  Mumbai attack, London tube attack, the serial blasts that happened in 2008 in many cities in India may prove how laws fail to curb the situation effectively. No wander, extremism can be born in a group discussion in social networking site, in a blog, in open access religious sites . What we get to learn from this? It is not the machine, neither the public site which was probably opened to give thousands of netizens chance to express their views, neither the email service providers who provide their service for genuine reasons which could be made liable, but the human minds which got rotten due to the smell of destruction in the name of protecting some rights. I see government of India’s decision to tighten the ropes on the privacy of individual net browsers through the new Information Technology (reasonable security practices and procedures and sensitive personal data or information) Rules,2011 , as a double edged weapon thus. This and the other proposed rules empower the government to seek personal data from the “trusted” sites and even the cyber cafes which promise to give enough privacy to the users.
One of the very prominent example could be found in  today’s report about Headley prosecution case (see  Headley e-mail casts light on ugly world of Shiv Sena fixers  by Swami & Gaikwad, http://www.hindu.com/2011/05/26/stories/2011052667061400.htm).  No, the news report doesn’t say anything on these laws or rules. But what seemed important to me is, how valuable one’s personal data could be when it comes to prosecute extremists and their aids, who may never know in which trap they are being pulled into. It was long before 9/11 US tragedy that many parts of India were receiving even more dangerous terrorist attacks. It compelled the government and the security personnel to have a strict vigil on accommodations which housed ‘outsiders’ as tenants, paying guests and even guests. Well, some had felt that their privacy rights had been infringed, some felt such vigilance was good. But the ultimate result was, common people became more aware about extremists and how they might become aids to extremism without their knowledge. May be  these rules regarding digital vigilance could bring more debates , but at the same time, the physical space anti-terrorism  vigils probably would suggest  that it is better to have a careful caretaker even when in the cyber space.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2011), “See what Headleys and Kasabs did for us
”, 26th May,,2011, published in http://cybervictims.blogspot.com/


Friday, May 13, 2011

Save Your Privacy In The Facebook

http://www.cybervictims.org

One of the many social networking sites where I enjoy to “hangout” is obviously Facebook. There are many reasons as to why Facebook won my heart….but at the same time; there are several ‘bad windows’ in this virtual site which literally has become a ‘home’ for many. Couple of weeks ago, I came across a beautiful picture of a girl in her bridal attire. She was not my friend, but her friend who was in this picture, was a friend of mine. I got to see the whole marriage album of someone whom I have never met either in my real life or even in my virtual life. This friend of mine who was in this marriage album, was “tagged” in some one else’s album. Like me, millions may have seen her, as well as her other friends who were thus tagged. Now, I understand this was a friendly gesture which was meant to share the albums ……..but this may bring in many unwanted troubles, especially breach in privacy  when the personal pictures could be seen by some one whom the person in question, does not want to include in his/her list. But remember, Facebook can’t be blamed because they have already given the option to exclude oneself from being tagged.
            The other bad window could be created when some one had sent you request for being a friend. I had couple of requests as such whom I had put in the “waiting list.” One day, I myself sent a request to some one whom I wanted to befriend. That was a waiting period for me ….I was not her friend but  I could see her wall posts and her comments to our common friends the moment I had sent my request to her , even though she closed her ‘doors’ to strangers. I had a glimpse on my own ‘requested’ list. Many were common friends of my own FB friends, but I internationally did not want to befriend some of them. I instantly understood how I was being open to stalking. My experiences taught me a lesson……. Take instant action in the virtual world if someone is trying to access you; remember ignorance is no defense in any courts of law especially when you are given the options to be safe.  
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2011), “Save your privacy in the Facebook
”, 12th May,2011, published in  http://cybervictims.blogspot.com/