Tag: cyber crime against women

Judges, cops and civil servants: Can they have Social media friends in reality?

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Image courtesy: Internet 

In the fag end of May, 2018, news channels flashed the story of Major Nitin Leetul Gogoi, the army man who is hero to some and villain to some because of his controversial act of tying a Kashmiri man to a jeep using him as a human shield against the stone –pelters who were targeting army actions in Kashmir last year. He became (in)famous to many because the clippings of his controversial act became viral on the web. He grabbed the headlines again this month because of his controversial Facebook friendship with a Kashmiri woman who, the media says was trying to check in   with the Major and another person in a local hotel in Kashmir. It was reported that the said woman had claimed that she knew the Major through Facebook and his account was not in his real name. We know that social media including Facebook is used for secret surveillance by the government agencies and it has positive and negative aspects as well. Fake accounts are used by the police to detect and trap criminals including paedophiles, fraudsters and even terrorists.
But here, I am not actually concerned about pattern of use of social media by the government officials. I am concerned about professional ethics of certain categories of government servants who may not be allowed to befriend common people like what social media offers. This category may include judges belonging to higher and lower judiciary, government officials belonging to certain all India services including group A and B of central services etc.
Let me explain it broadly here:
Since ancient times judges are considered to be of high moral and judiciary is considered to be “an institution of integrity”. Several judgements including K.P.Singh vs. High Court of H.P. &ors,[1]High Court of Judicature for Rajasthan vs. Ramesh Chand Paliwal,[2]Tarak Singh vs. Jyoti Basu,[3]etc had established the fact that judges are expected to be like hermit, they should be honest and should “adhere to a code of moral value”.[4]In short, they should be inapproachable personally but approachable as an institution to be impartial. What does this mean? Judges cannot be on par with general individuals who may approach the institution of justice, i.e., the courts for seeking justice. They should not make themselves individually or privately approachable so that the possible litigants, who may approach their  courts, may not influence him. It is the principle of fair justice which to a large extent governs the code of conduct of judges. But we need to remember that in this era of social media, any individual can hardly be out of the net . While it is still expected that judges should not make themselves privately approachable, I myself have loads of Facebook friends who are in the judiciary. They share opinions, their personal photos with their chosen friends just like any other individual. But yes, their circle of friends may not be as big as any other common social media user. Many of them are directly connected with the Facebook pages of District legal services authorities, which not only spread awareness about legal rights, but also showcase performances of the particular government offices.  However, I do not have Facebook friends from higher judiciary, but nonetheless, many of “Their Lordships” may be easily approachable because of  digital messaging services like WhatsApp, which may be used to create ‘groups’ as well.[5]World wide this has become a cause of concern now; it has been suggested by many that judges while in service, should try to avoid social media as this may pull them in unnecessary trouble and make floodgates open for questioning their integrity.[6]But again, we can neither ignore the strong (social media) presence of judges like Justice Markendey Katzu, former Supreme Court judge who had courted controversy because of his blog posts, social media posts for strong criticism of court decisions.[7]Doesn’t this show that he may still be considered as falling in the ‘restricted netizen’ category even as a retired judge? Probably yes because he may never be seen as a general individual who may criticise judges and their judicial understanding of cases by virtue of his being a judge himself who is expected to not to lower the respect the judiciary; probably no, because he may still use his right to speech and expression to express his displeasure for the judgements which according to him, are not fare. But still then, he could not be equal to general individuals: the court questioned his act towards publishing post in social media criticising court’s decision in crucial cases like the final verdict of the sensational case of Soumya, who was killed by her rapist.
       High level civil servants including bureaucrats, officers of Indian Police Services etc have a high presence in the social media too. Most of their accounts may be private accounts. But there are several pages of their offices which may be made by their respective offices. This actually shows that even though the government and the courts continue to question data policy of social media companies like Facebook or Twitter, these social media sites are very much involved in government outreach mechanisms: for example, see the websites of certain city police offices/headquarters; all may show their Facebook presence. http://ahmedabadcitypolice.org/, https://www.bcp.gov.in/ ,http://www.tnpolice.gov.in/CCTNSNICSDC/Index?0 ; all may have their Facebook and twitter pages where individuals may access for information and even to reach out concerned police offices for immediate lodging of complaints. But private accounts of IAS or IPS officers are not connected with these pages. This means that they have a separate private presence in the social media. Their friends, their posts and their photographs are their private affairs just like any other general individual who may use social media sites for reaching out to friends. But still, they may not be out of surveillance for their conduct in their private social media accounts. Their children may also be held accountable for sharing parents’ pictures which may raise questions about their integrity: erstwhile J&K DIG Beig invited hoards of controversy when his son posted certain pictures of his dad which raised media storm because the posts suggested that Beig was abusing power.[8]Even though the son removed the posts, the pictures and hashtags were made viral and they are still available on internet.  It may actually mean that these officers may not have a private life even in social media. Gogoi in the same way, may also not have that privacy even if he may claim that he and the woman in question personally knew each other and this friendship was neither professional, nor was an abuse of power for harassing the girl offline or online.
In short, why such friendships between officers and civilians, their online presence and activities may raise questions at all? Misuse of power to harass and exploit civilians especially women could be one primary reason for such enthusiasm. But in case the friendships are genuine, posts by the officials reflect their personal and independent opinions and photographs shared in their social media sites are personal memoire , why they should be targeted and who makes these posts (in)famous for public and media? It is those ‘friends’ who may knowingly or unknowingly feed the enthusiastic ‘third persons’ by sharing /showing the private posts that may appear in their time line feeds. Remember Merin Joseph, the young IPS officer from Kerala who being a police officer herself, could not remain safe online? She had to encounter fake profiles with her picture, trolls and misogynist posts even though she was sharing some posts as a private person and not as an on duty officer. Trolls attacked her  posts and albums, some of which were not for public viewing. Privacy may be myth for these public servants  especially when they are active  in their private  social media accounts. Compared to 1990’s public servants have become more accountable now because of their web presence. After each UPSC result declarations, the social media accounts of successful candidates may immediately come into lime light. It works positively because their conduct becomes more transparent to public; it works negatively because they may slowly lose privacy being within the private social media account. The very much private personssuddenly come under lime light as not only the common people , but also the media starts data mining  to know them more than what is expected to be known. One name which comes in my mind right now is of Sandeep Nanduri, IAS, who is presently the District magistrate and collector of Tuticorin district. He had taken over as DM and collector Tutircorin at a very crucial time when the district was having agitation over Sterlite copper industries plant closure issue. Nanduri’s Facebook account may reveal his activities as a government official as well as a private individual. This may further mean that not only he himself, but his wife may also be targeted by trolls, stalkers and miscreants who may wish to approach him.
Untill now there is no clear-cut code of conduct framed for restricting judges and grade A and B officers of central government or even state government services from using social media (except  for certain issues like restriction from spreading hatred, criticising the government in certain key issues, leaking confidential data etc) and befriending  common people. They however may have to rely on the social media policies for data protection. But again, in such cases, they may be held responsible for choosing their virtual friends. We should not forget that there are instances  of honey trapping of government officials by ISI secret services; this may however show that privacy of the government officials may easily be breached if they themselves are not vigilant enough for their social media ‘friends’. There are clearly two arguments which may made in this regard: (i) such government servants may be completely barred from making themselves available to ‘public’ through their private social media  accounts , (ii) being part of  digital India movement they must be approachable to people through social media as well. However, considering the privacy and security aspects, I feel it is high time that government  makes a clear  policy as how they should be protected from predators and how they should conduct even when they are ‘privately public’.

Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018),Judges, cops and civil servants: Can they have Social media friends in reality?”3rd June, 2018, published in http://debaraticyberspace.blogspot.com


[1]LPA No. 163 of 2009
[2] (1998) 2 SCC 72
[3](2005)1 SCC 201
[4]See for more in http://hpsja.nic.in/ethics.pdf. Accessed on 26.05.2018
[5] For example, see Maniar Gopi (2017),Vadodara: Gujarat HC slams VMC commissioner for sending WhatsApp message to judge. Published in India today on Semptember 8, 2017 https://www.indiatoday.in/india/story/vadodara-gujarat-hc-vmc-commissioner-whatsapp-message-judge-1040341-2017-09-08
[6]For better understanding, see Singh Shaziah (2016), FRIEND REQUEST DENIED: JUDICIAL ETHICS AND SOCIAL MEDIA, Published in Journal of Law, Technology & the Internet · Vol. 7 · 2016. Accessed from https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1099&context=jolti on 25.05.2018
[7]For more understanding, see Vaidyanathan.A (2017), Justice Markandey Katju Submits Apology In Supreme Court Over Post Criticising Soumya Verdict, published in https://www.ndtv.com/india-news/justice-markandey-katju-apologises-to-supreme-court-over-post-criticising-soumya-verdict-1645845 on 06-01-2017. Accssed on 25-05-2018
,.
[8]For example, see Bashaarat Masood (2014),J&K DIG’s son posts photos of ‘Dad & I’ enjoying perks of power, published in http://indianexpress.com/article/india/india-others/jk-digs-son-posts-photos-of-dad-i-enjoying-perks-of-power/ on Octiober 29,2014. Accessed on 25.05.2018

Making pregnancy vlog? Beware! You may be feeding the porn consumers

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Often it is told that womanhood comes to full circle when a woman becomes a mother.  Being a mother either biologically or by way of adoption is indeed a unique experience because it not only gives the joy of nurturing another life, it may make the woman more responsible in every sense.  For every woman the phases of motherhood bring special moments. For some, these phases may start right from the day of conceiving, for some it may start when she decides to adopt a baby, for some it may start right from the moment of the birth of the baby. In this digital era many couples (especially women) like to capture the moments of motherhood by making digital photo albums or vlogs . In India this phenomena is rapidly catching up. Pregnancy photo shoots, baby birthing photos and videos, new born photo shoots etc are trending now a days. YouTube  and Instagram are chosen platforms to upload such videos or images. YouTube especially  provides wonderful opportunity to easy creation of amateur vlogs. YouTube users may also use specific tags for listing the video with certain steams like pregnancy and child birth, medical learning, fitness during pregnancy, know hows  of child births and neo natal care by new parents etc. Many of such users love to share such vlogs or images (through other social media platforms and digital messaging apps ) with their virtual friends and groups. I personally have come across several of such videos and images which may have been as old as 2, 3 or even 5 years.
But they may not bring back the good old memories always. Pregnancy and child birthing videos and images are hugely consumed by porn industry consumers as well. Several researches on pornography including non-consensual and revenge porn have shown existence and growth  of different sorts of porn contents which may include black porn, older women porn, nude porn, voyeur, amateur porn, big belly porn and preggo porn. The last one, i.e. preggo porn is actually made with women showing different types of pregnant belly formation, sloth movement of pregnant women with huge belly, (supposedly) movement of the baby within the belly and the corresponding gasping or painful twitching of the body of the pregnant woman and necessarily the breasts which may be half covered. These contents are made by porn actors who may or may not  be pregnant in real life. Generally these porn actors may be clad in under wears right from the beginning of the video to give an impression of real life birthing scenes. Several videos may also show women slowly removing dresses: such videos may actually give impression that the woman suddenly developed labour pain at home or at some place other than the hospitals. All such videos may have similar tag lines like the original pregnancy and birthing videos, i.e., pregnancy, child birth. The ancillary tag line could be ‘fake’ or ‘prank’ or ‘sexy preggo’. As such, these taglines may also pull the real pregnancy and birthing videos in the pool of sexually consumable contents.
Getting sexual gratification from the birthing scenes and scenes of labour pain is indeed a sign of perversion.  But what is more disheartening is how the porn industry has grown preggo porn stream on the basis of this perversion. If one notices the comment sections of such videos, one may see that the woman in the video may be asked to act more accurately in the next video, the woman may also be asked  to make videos with different pregnancy postures and sounds of pain which may create more erotica. The producers and actors of these videos may earn a good profit depending upon their presentation and ‘perfect’ acting. Unfortunately the real pregnancy vlogs may also be consumed with equal ‘interest’. The new mother  may get trolled in the comment section for her belly shape or for taking too much time to make the ‘birthing sounds’ or ‘labour pain’ moments which may be sexually gratifying for the ‘consumers’ of the videos. Some may even get trolled for ‘wasting time’ of the viewer. Often the creators of genuine vlogs may not get time to look into the comments which may be extremely disturbing for any new mother. Even if the creator would have disabled the comments, the links of the videos may still be shared with a malicious object to consume it as porn.
While the ‘victims’ may definitely take the matter to the websites for removing the offensive posts or to the police and courts  for taking action against the comment maker for making obscene, sexually explicit or  misogynist or (as it may happen  in several cases) racist and hate comments, the website, the police and courts and above all, the families may find hard to prevent themselves from ‘victim blaming’ for uploading ‘those private moments’ for ‘public viewing. In remote possibility, the content may even be considered as non-consensual porn (but not revenge porn) in case the police and the courts decide to book the perpetrators who may have made obscene, sexually explicit or  misogynist or racist and hate comments or who may have shared the video as porn content  to others either for unethical gain or just for the sake of sharing ‘another porn content’. The legal provisions for voyeurism may also be applied in this regard along with provisions for making word etc for harming the modesty of women, inappropriate representation of woman concerned etc. But the new mother may not be saved from acute trauma and depression which may arise from this.
Pregnancy vlogs may be considered as unique examples of rights to expression which should not be violated at any cost. But again, we as responsible society must work together to prevent such wonderful moments to be destroyed by perverts and perpetrators.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018),Making pregnancy vlog? Beware! You may be feeding the porn consumers” 27th March, 2018, published in http://debaraticyberspace.blogspot.com/

Right to Love on social media on Valentine’s Day

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Image curtsy: Google
Come Valentine’s Day and social media and digital messaging services like WhasApp or Snapchat are flooded by beautiful heartwarming messages, pictures and emogies. Nonetheless, Facebook, Instagram , Whatsapp YouTube and also some adult networking sites may see more contributions of nude videos, revenge porn, fake avatarsas well by jilted lovers. The other type of messages that one may get to see in these platforms are those from moral policing groups asking people to refrain from ‘celebrating Valentine’s day’ in Facebook, Twitter  and other social media . Such message can be ‘shared messages’, can be opinions or even can be clear  threats to ‘whoever’ ‘celebrates  ‘Valentine’s day’.
The question is, do we have something called Right to love? Can this right be considered to  be violated if someone posts messages against celebration of Valentine’s day ?  Universal Declaration of Human Rights (UDHR) does not specifically speak about right to love, but it flows from Article 16 (Right to marriage and family) and Article 19 (freedom of opinion and expression).  All most all countries with modern constitution including India, UK, Singapore, US, Canada, Australia, countries from European union including Germany, France, Spain  etc  do recognize the right to choose and communicate with   dating partner, live-in partner , same sex partners and heterosexual partners for emotional bondage including marriage  because these countries  recognize right to express opinion, freedom of speech and expression and also right to marriage and family. While right to form family by way of live-in relationships or  homosexual partnerships  have been recognized by  several countries by way of legitimizing  the rights of children born out of such union or  adopted in such marriages, some countries may  not recognize Live-in relationships or same sex marriages in real life
But right to chose emotional partners and right to communicateto the same on cyber space are not barred by any law. For example, even when Indian Supreme court did not apply doctrine of severability to S.377 todecriminalize same sex union and consider the rights of transgender people to be recognized as 3rd gender people, or even when the US did not legalize gay marriages,  Facebook had pages and groups meant for socializing and creation of emotional bonding between  LGBTQ people.  Right to love is rather an abstract idea which may be expressed when a person starts expressing the love to his/her chosen person on a specific platform. Seen from this aspect, right to love on cyber space may be barred only  under specific circumstances, i.e., when the same expression offends the ‘target’ person because he/she may not like to develop any emotional relationship with the person expressing  the feelings either because the relationship falls under the concept of stalker and victim, ex lover or spouse where the victim ex does not want to be connected with the other person anymore, or  a real life acquaintance including workplace acquaintance who had accepted to be friends with the other person  expecting reasonable distance and privacy , or a stranger  who may not like to be approached by way of expressing  eros.  Similarly, positive reciprocation of love on cyber space may not be offensive unless the receiver/reciprocator is knowingly committing any mistake like that of  breaking  trust  of a married partner.
A person may however be deterred from exercising his/her right to love an acclaimed criminal only when such relationship may prove to be hazardous for the security of the nation or for the society at large.  But he/she may not be held guilty for such love affair on cyber space when he /she can prove his/her innocence in knowledge about the particular acclaimed criminal. He/she may even claim compensation under certain circumstances when such fraudulent relationship causes damage to him/her as well. But note that I am speaking about being offended from the perspective of the receiver of the message carrying an expression of love and not the bystanders in case such message are posted on some one’s timelines or in a common group or in a page and it is publicly visible. Moral policing groups against celebration of Valentine’s day may go ahead with their propaganda of   threats of ‘devastating results’ on the understanding that whoever  exercises right to love either by way of expressing love for some one, or by  showing a status ‘in love with X’ or by even reciprocating to such message by  words or emogies or even by thumbs up  should be considered as ‘dangerous’ for the society as a whole.  Some radical groups have even come up with warning that people exercising their’ right to love’ will be straightaway married  off  or they will be warned to stop displaying (exercising their right  to) love. Understandably  such sorts of warning messages may have been made to create fear in the minds of  individuals who may belong to orthodox patriarchal families where love marriages are not allowed  or where threats of honor killings exists . Such radical groups  are targeting those individuals who may be new generation social media users and whose families including parents may not know their digital whereabouts.  
The question is, would such announcements by such radical groups be considered as hate speechor threat speech? There may be varied opinions for this.  If the statement/s show that the commentator/s  may track the whereabouts of the persons  who are expressing their love on Facebook or any other social media  on valentine’s day to commit some harm, the speech may be considered as threat speech especially because they may indicate violation of privacy and also intention to commit harm (even if it is arranging marriage, which may be the ultimate the aim of the love birds). Women especially may feel threatened because this may result in offline and online reputation damage, rape threats (especially if it is an inter religious affair) or even   grave threats to their lives.  Some , including the   social media website may consider  such speech as absolutely normal because such speech may seem to be very broad  to be fitted within  the meaning of hate speech or threat speech because such speeches may be ‘general’  and may not target any specific individual, class or community of people.  But we must not forget  that online mob violence may become extremely dangerous especially when such instigating comments or posts are made. Concerned authorities therefore must not ignore such ‘warnings’.
But I would have been happiest would the moral policing groups turn their attention to evils done on cyber space and send messages to the world including possible perpetrators to refrain from creating revenge porn on the Valentine ’s Day. In my observation I have seen that on such days several jilted lovers, revengeful persons and stalkers may create revenge porn stuff to grossly violate women’s reputation including rightsto privacy.
Let us join hands to prevent spreading of hate and threats through social media. Let us grow love and not hate.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018), “Right to love on social media  on Valentine’s Day ” 10th February, 2018, published in http://debaraticyberspace.blogspot.com

Why cyber bullying should never be taken as a holistic term for cyber harassment

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

In a recent academic conference where I was speaking on cyber bullying, I got some ‘strange questions’ as why I am not covering topics like pornography and obscenity.  To me, these questions were ‘strange’ because I was delivering lecture specifically on cyber bullying. But to the individuals who asked the questions (and this group included academicians and practitioners from women’s rights group as well), this seemed to be a genuine concern as why cyber bullying does not mean cyber pornography, cyber obscenity, revenge porn, cyber stalking or the concept of cyber harassment.
Decoding cyber bullying:
Many of us believe that cyber bullying is the holistic term to explain the concept of cyber harassment. In reality it is not. 
 Cyber harassment or online harassment is a holistic term which may include various types of harassments including cyber bullying. The term cyber bullying is defined as “abuse/ harassment by teasing or insulting, victims’ body shape, intellect, family back ground, dress sense, mother tongue, place of origin, attitude, race, caste, class, name calling, using modern telecommunication networks such as mobile phones (SMS/MMS) and Internet (Chat rooms, emails, notice boards and groups)”(Jaishankar, 2009).
www.Stopbullying.gov explains cyber bullying as “………Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.”
A clear reading of the definition of Jaishankar and the explanation provided by Stopbullying.gov  would suggest that cyber bullying includes conveying or posting of insulting, degrading, teasing, messages in the victim’s timeline, in groups or forums etc. Bullying messages are also conveyed through one-to one chatting mechanism. Bullying messages may typically be like “ you are a liar”, or “you look ugly”, or “ you are worthless”, or “x is a black spot in the team”, or “x is a big zero when it comes to trendy fashion” etc. Presently, India does not have any cyber bullying prevention law.
However, it would be wrong to say that cyber bullying happens to children. Adults may also be victims of bullying, including workplace bullying.
So when does bullying turn into stalking?
Often people confuse cyber bullying with cyber stalking. We at Centre for Cyber Victim Counselling had provided a functional definition of cyber stalking in our 2010 research report which is as follows:
“In one word, when ‘following’ is added by Mens rea to commit harm and it is successfully digitally carried out, we can say cyber stalking has happened” (Halder &Jaishankar, 2010).
S.354D of the Indian Penal Code (inserted via Criminal Law amendment Act, 2013) defines cyber stalking as follows:
“Any man who follows a woman or contacts or attempts to contact such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman or whoever monitors the use by a woman of the internet, email or any other form of electronic communication or watches or spies a person in a manner that results in fear of violence or serious alarm or distress, in the mind of such woman or interferes with the mental peace of such woman, commits the offence of stalking.” 
Seeing from the above perspectives we can see several stages of cyber stalking

The first stage of cyber stalking can be Repeated Pursuing

The second stage can be data mining and/or monitoring.

The third stage can be creating threat /fear in the mind of the victim.
Repeated pursuing can be in the form of sending /posting messages which may not be insulting or degrading or annoying at the beginning. This is because the stalker (especially in case of interpersonal stalking) may not necessarily like to insult or humiliate his ‘target’. The main aim of the stalker may be to persuade the victim to enter into an emotional relationship where the stalker may be a dominant figure. The messages may turn insulting or degrading when the process reaches the third stage, i.e., when the sender wants the victim to feel threatened. Stalking may adopt the process of cyber bullying when the victim refuses to abide by the ‘commands’ or ‘demands’ of the stalker. The later may then start sending insulting, annoying, degrading messages in order to create a fear of constant harassment and defamation of the victim. Bullying therefore changes into the phenomena of cyber stalking when the bully becomes obsessive with his victim and continues to post hurting, degrading, insulting messages as long as the victim does not start developing a sense of fear; when he starts monitoring his victim to see the outcome of bullying or rather, to see how far the victim is affected by bullying.
Revenge porn and bullying
Again, revenge porn and bullying can be completely different forms of online harassment. Revenge porn “……….is an act whereby the perpetrator satisfies his anger and frustration for  broken relationship through publicizing false, sexually provocative portrayal of his /her victim by misusing the  information that he may have known naturally and that he may have stored in his computer, or may have conveyed to his electronic device by the victim herself, or may have been stored in device with the consent of the victim herself; and which may essentially have been done to publicly defame the victim.”(Halder &Jaishankar, 2013).
Revenge porn may necessarily include unethical using of images of the victim for taking revenge and creating a fake avatar of the victim which may signify the later as that of bad character. Unfortunately many countries including India do not have any focussed law to prevent and punish revenge porn. However, several legal academicians including cyber civil right activists in the US  have proposed revenge porn legislations and such proposals have been considered as legal provisions to criminalise revenge porn. In case of revenge porn, the perpetrator may or may not include bullying tactics to create extra humiliation to his/her victim. I have observed that in several revenge porn cases, the perpetrator may limit his act to posting to his own time line with a tagline indicating that the victim is of bad character, or may create a fake avatar either in the social websites like Facebook or Twitter etc indicating that the profile owner may solicit sex, or may upload the image to adult networking websites where all images may be ‘consumed’ as erotica. Revenge porn and bullying may be clubbed up only when the perpetrator posts/sends annoying, insulting, degrading messages to the victim or to a group to humiliate the victim with the revenge porn content, i.e., after he has already created revenge porn and wishes to continue harassing the victim with teasing messages. However, I would still not agree to call it cyber bullying; it would be categorised as defamation if seen from the perspective of defamation laws. S.499 of the Indian Penal Code which states as follows:
“Whoever, by words either spoken or intended to be read, or by signs or by visible representations, makes or publishes any imputation concerning any person intending to harm, or knowing or having reason to believe that such imputation will harm, the reputation of such person, is said, except in the cases hereinafter expected, to defame that person. Explanation 1.—It may amount to defamation to impute anything to a deceased person, if the imputation would harm the reputation of that person if living, and is intended to be hurtful to the feelings of his family or other near relatives. Explanation 2.—It may amount to defamation to make an imputation concerning a company or an association or collection of persons as such. Explanation 3.—An imputation in the form of an alternative or expressed ironically, may amount to defamation. Explanation 4.—No imputation is said to harm a person’s reputa­tion, unless that imputation directly or indirectly, in the estimation of others, lowers the moral or intellectual character of that person, or lowers the character of that person in respect of his caste or of his calling, or lowers the credit of that person, or causes it to be believed that the body of that person is in a loathsome state, or in a state generally considered as disgraceful.”
As may be seen from the above, cyber harassment or online harassment therefore is a bigger term which includes forms of harassment including cyber bullying. It is essential to understand the differences because the terms may signify different types of criminal or civil wrongs and as such may attract different types of punishments by courts of law. For instance, if a victim who has encountered impersonation (not amounting to revenge porn, but an ordinary impersonation whereby his/her image had been used to create a profile in the matrimonial site), he/she should not report the incident as cyber bullying to the concerned website. It should be ‘impersonation’, meaning the perpetrator has unethically and unauthorisedly used the personal picture and information of the victim to create harassment. Depending upon the mens rea, nature of the profile and impact of the same on the victim’s reputation, the police may book the offender under various provisions under Information Technology Act and also under Indian Penal Code for impersonation(for example, Ss 66D of the Information technology Act, 2000(amended in 2008), Ss. 416 & 417, 499, 500 IPC, etc) . In case the victim is a woman, the police may also include provisions meant for harming the modesty of women (S.509 IPC). Similarly, in case of stalking, the victim should rather report the crime as stalking and not cyber bullying because the legal provisions in India do not recognise any offence of cyber bullying, but prescribes stringent punishment for stalking. Whereas, in other jurisdictions, where both cyber stalking and cyber bullying are recognised as offences, both may have different types of punishments. Further, the social media websites may also have different reporting mechanism for cyber bullying and cyber stalking.
  However, cyber bullying still remains in a grey area from legal perspectives. More research is needed to develop a good universal understanding which may help to demarcate why cyber bullying be considered as Bad Speech. Further, research is also needed to create deeper demarcation between different forms of online harassment for the purpose of better policy developments.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018), “Why cyber bullying should never be taken as a holistic term for cyber harassment” 4th February, 2018, published in http://debaraticyberspace.blogspot.com

Cyber ransom attack: why lawyers and courts should worry more

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER
When I was a student of undergraduate Law college, we were never sent for internship by colleges, to be more specific, the traditional university –colleges, whose duty was limited to hold classes, yearly(and not semester) examinations and give us the students the degree certificates. Children of lawyers and judges had a smooth path to the courts and to the practice through their parents. Many of us whose parents were not lawyers, used to hang out with these friends to get reference to join other law-firms or lawyers. We juniors had to do a lot of paper work and physical work to retain our jobs: we had to take notes from our seniors, their clients, make files to put the papers in proper sequences, make noted from the books for helping the seniors for next day’s arguments and sit with the stenographer –cum-computer operator to help him understand our illegible handwritings to make notices, petitions, affidavits etc. Most of the times, these computer operators had their own files saved for specific formats. We had to narrate him/her the names of the parties, the case numbers, and special points that may make the case very different from the format stored in there. 90% of these computers were not connected with internet. They were used for file storing only. I doubt way back in 1999-2001 how many government offices had computers used for anything other than file storing. It was mainly for this that the earlier version of our Information Technology Act,2000 did not have specific provisions damaging computer network system or hacking or unauthorised access to the computer through spreading malware etc. This is evident from the modern version of S.43 of the Information Technology Act (which was amended vide Information technology Amendment Act, 2008), which speaks about penalties and compensations for damage to computer, computer system etc. However, these “file storing” computers were prone to get virus attacks by external devices including floppies. We also did have some few personal computers lawyer’s offices which were connected with internet to receive mails, mainly instructions from overseas clients or clients staying in outstation. But these were considered as “luxury” and these lawyers were considered as that special group of lawyers who were “cyber savvy” not because they could produce electronic evidences because at that time mails/messages/ call logs were hardly recognised as proper evidences even though we had the amendment –wave touching the traditional evidence Act as well; but because they could go back to their chambers and see instant communications/instructions  from their clients and were able to bring back some thing called “printed  emails” not as an evidence, but as a reference-note. Quite at this time 9/11 happened in the US and everyone including we the lawyers also suddenly became alert about cyber security. But still, we got to see heavily protected lawyer’s bureaus and desks which contained most confidential data about their clients. It was not the soft copies, but the papers and in some cases, some physical objects like the knife or a piece of cloth etc which used to attract our attention as “sensitive” “confidential” materials which may turn the lives of the clients as well as ours if we assist our seniors in protecting these as best evidences.  With change of time, almost all lawyers became cyber savvy in this way or that especially because we started storing the confidential data of the clients in soft copies. Now, let us understand what is meant by sensitive information which may be considered as part of confidential data. S.3 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 defined sensitive personal data as 
 (i) password;
(ii) financial information such as Bank account or credit card or debit card or
other payment instrument details ;
(iii) physical, physiological and mental health condition;
(iv) sexual orientation;
(v) medical records and history;
(vi) Biometric information;
(vii) any detail relating to the above clauses as provided to body corporate for
providing service; and
(viii) any of the information received under above clauses by body corporate for
processing, stored or processed under lawful contract or otherwise.
But importantly, this definition also includes a third party, i.e., the “body corporate” for providing services. Now, let us check the definition of body corporates which is defined under S.43A of  the Information technology Act, 2000(amended in 2008). It says in explanation (i) “body corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities. Very broad interpretation of this may include lawyers as well who may provide professional counselling. 
But without going into the examination of whether lawyers may held responsible as body corporates in the straight sense, I would like to emphasise on the point that lawyers also collect confidential data and they are at risk of  security infringement too. In my recently published writeup “the ransom attack that may make the women cry” published in the WION news @ http://www.wionews.com/south-asia/the-ransom-attack-that-may-make-the-women-cry-15726 I mentioned that every data saver including lawyers may also be at risk for any sort of malware attack. As such, when lawyers store confidential including sensitive data about clients, they must be ethically bound to protect it against any such cyber attack as well. 
Now, we may also need to shift our attention to the courts as store house of data as well.  Presently, courts have widened options for filing of cases or getting access to the judgements or orders by creating court websites which may not only work as a store house of information for millions of justice seekers, but also an information house of millions of lawyers, law students as well as researchers. Unlike lawyers, who may maintain strict confidentiality about the data /information provided by their clients to them for litigation purposes, we often get to see information being exposed in the court websites, especially in cases of judgements. The recent understanding of the courts have however made it mandatory to keep the party’s name confidential when the case is about child sexual abuse or victimisation of women. But still then, the courts play major role in storing confidential data about the litigants, which if exposed, may make the lives and reputation of justice seekers at stake. 
Surprisingly, the Information Technology Act, 2000(amended in 2008) has not emphasised on this issue separately. The chapters including chapter IX which speaks about penalty, compensation and damage to the computer, computer system, network etc, liability to protect the data penality for failure of the same by the body corporate etc, power to adjudicate etc, and chapter XI which speaks about the offences  speaks about liability of the data string houses, individual perpetrators and government stakeholders to intercept etc, but does not specifically mention about categories of service sectors and their liabilities. 
While it has been upheld that lawyers will come under the scope of Consumer protection Act unlike doctors or health sector stake holders like the hospitals or clinics, we must understand that by saying this, we can not escape our moral duties to protect the clients or litigant’s vital information which may be stored with lawyers or digital store houses of the courts. Infact as I mentioned in the write-up mentioned above, each of these sectors including lawyers and courts may be attacked by cyber perpetrators who are now playing a crucial role in “hacxtortion : hacking and extortion” (as was coined by me in the above writeup) of money for giving back the encrypted files. We have already seen that National Health services in the United Kingdom had been badly affected by this ransom malware. It is high time that lawyers, law firms and courts must audit their cyber securities to save the valuable data and take preventive steps against such ransom attack.

How ‘yellow journalism’ and internet is failing the women victims of online harassment and revenge porn

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Almost a month and half back the whole south India woke up to a rather “juicy news” of “Bhavana” molestation case. She is not “Nirbhaya.” Her name was not given by the any legislator or judge or executive to protect her identity. Bhavana is a Malayalam female cine-star whose real name can be found in Wikipedia and numerous film magazines. She was apparently molested in a moving car by some including her former drivers. As the news report suggests, the perpetrators also took ‘objectionable’ photos of her while the incidence was going on. The news surfaced exactly when I was enjoying the sweet success of publishing my latest article “Celebrities and cyber crimes:an analysis of the victimisation of female film stars on internet” published in Temida: Journal on victimization, human rights and gender Volume 19 • Issue 3-4• 2016 .
We the movie fans often understand that actors or actresses may themselves attract negative publicity by voluntarily getting into troubles or playing the victim card. But in some cases this may not be true. Women actors may face numerous problems, harassment and threats in real life as well as virtually. One of such problem is facing voyeurism and revenge porn almost on daily basis. Some actors turn numb to such harassment as they take these as (negative) part of  their work. Some may reach out to police to show genuine concern. In Bhavana’s case, a minute analysis would show that she was not only physically violated, but also she became a victim of ‘revenge porn’, a term that our laws still do not recognise and tries to cover it up by numerous legal provisions which may not provide  the actual answer. I call it ‘revenge porn’ because once such ‘objectionable’ pictures were taken; it would not take more time to get it  circulated through WhatsApp. These contents may then land in various ports including to the secret sellers of porn clippings and obviously to the XXX rated sites. No one, not even the police may do anything to prevent secondary victimisation of the victim in such cases.
What concerns me more  is publication of her name. S.228-A of the Indian Penal Code prohibits publishing, printing etc  of the name and information of the victim/s who may have been victim of rape or sexual molestation. This protection is brought in to protect the privacy of the victim and more so, to encourage women victims of sexual violence to come up for reporting of crimes without the fear of ‘recognition’ and resultant possible social exclusion. But this provision also has a loose noose : when the victim herself allows to publish her name or identity, this provision will cease to help the victim. We don’t know whether Bhavana herself permitted the reporters to use her name and photograph but I can definitely understand that this has again created a bad example of ‘no identity protection’. Common people who may not be expected to know the pigeon holes of law, would understand a completely different story: reporting would bring media highlight which will destroy the physical and mental   privacy of the victim and her family. But this does not mean that I am ignoring the provisions of S.228-A, IPC. Women victims must also be made aware of this twist of law relating to identity protection. We may expect good and bad results of this: the provision may be misused, women may be able to take a rational decision.

Let us, the civil citizens take a preventive decision to not to spread any offensive videos/still images of women actors even if it may surface as apparently (ugly, unethical movie promo) genuine. Let us respect all women as equal irrespective of their job.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2017), “ How ‘yellow journalism’ and internet is failing the women victims of online harassment and revenge porn”  1st April, 2017, published in http://debaraticyberspace.blogspot.com

Hacking is no fun

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

This December we got to see a bout of hacking attacks on renowned politicians, journalists, business magnets in India. Apparently their purpose was to reveal corrupted people who are disrupting good governance in India. Almost all the news media channels ran stories on who these hackers are, why the targeting specific people are and what may be their next target etc.  Very recently I got to meet  a group of people who hack for various reasons. While most of us are concerned about our own digital data security, it is interesting to know why our accounts in social media or email may get hacked.  There is a difference between unauthorised access of financial data, social media profiles, emails and digital data that may be stored in our own devices. They may be interconnected. But definitely their motives may be different. In my recently published monograph “Cyber crime against women in India’ (https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900) I showed that  revenge porn may be a result of unauthorised access of social media profiles as well as digital albums for revenge to destroy the reputation. Similarly there are hackers who may access  financial data for illegal monetary gain.
However, there is a group of people who hack for fun. This ‘voyeuristic pleasure’ is exercised especially when the hacker/s may want to establish how an organisation or particular individuals may poorly maintain their  cyber security . I do often get to hear from senior citizens and women that their social media accounts or emails or Whatsapp profiles have been hacked.  An in-depth research may reveal that hackers may have done this for fun. To me, it relates to those pre internet  days when youngsters took pleasure in peeping into well guarded private diaries maintained by young girls and boys or individuals who loved to treasure their secrets. But hacking is no fun especially when the information thus gathered can be used for various detrimental causes including extortion and sextortion. Especially Women may feel extremely traumatised when such hackers for fun target them. The reason is, if a woman’s digital data is unauthorisedly accessed, it may misused and damage to her reputation may compel her to take extreme steps like suicide due to fear of social taboo. What I strongly condemn is teaching school children about hacking with the tag line that hacking is for fun. It is like giving a loaded gun to children to experiment it and learn it for fun. It is indeed a fact that ethical hackers are used for many positive reasons and internet companies may pay them a hefty amount too. But, teaching hacking to children must be done with utmost concern. We definitely do not need Frankensteins . It must be understood that any individual who may not understand the responsibilities attached with power may definitely misuse the power.  We need to understand that our Information Technology Act, 2000(amended in 2008) has recognised unauthorised access to digital data, tampering of the data etc as penal offences and the provisions are wide enough to cover offenders of all age. Further, our Indian Penal Code also recognises cyber stalking and voyeurism as an offence which may necessarily involve hacking. Any child psychology expert or educator may understand that children tend to experiment (often with disastrous first few results) for a better understanding of the subject. Hacking is such a tool which may at the outset show the child how to gain illegal profit by using it if he/she is not told about the risks that may be caused to others as well as to his target victims.  
This Christmas let all take a vow that our knowledge must be used for positive purposes and not for victimising others. We must remember that if we use our knowledge and expertise to check the weakness of others, that must be done in a prescribed way and not to humiliate the later.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2016), “Hacking is no fun
25th December 2016, published in http://debaraticyberspace.blogspot.com/

Why mobile number portability services may prove to be an absolute hypocrisy for women? A dirty dark secret

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

I belong to that generation who have grown up with one landline telephone connection, just to realise that the same can become ‘just a set’ to support home internet connection for some, or a “life support” for senior citizens who love to feel nostalgic by such sets.  I have stayed in three major cities in three parts of India and finally decided to own a telephone number which (much to the surprise of my older generations) started ‘travelling’ with me to keep me connected with the world. Yes, we call it ‘roaming’. But the older generation still loves to call it mobile phone instead of ‘cell phone’ because (as one my grand-aunt once commented), ‘you need to be mobile while using it’. I gradually owned a smart phone and the SIM card changed its ‘place of residence’  from my ‘unsmart’ phone to smart phone . I also witnessed the era when roaming charges got reduced from a (shocking) exorbitant price to a nominal price which we were happy to afford.
Then came the announcement for mobile number portability system.  One of the telecommunication service providers define this in the following words “  Mobile Number Portability (MNP) is the facility for users to switch to any mobile operator in any Licensed Service Area (LSA) of INDIA, while retaining their existing mobile number . Sim card and all services on the mobile connection will change and will be provided by the new operator.”( see http://www.bsnl.in/opencms/bsnl/BSNL/services/mobile/mnp_intro.htm) And how will the customer avail the services for ‘change of port’? The telecommunication regulatory authority of India gives a detailed guidelines regarding this @ http://www.trai.gov.in/WriteReadData/userfiles/file/measuresto%20protectconsumerinterest/Customer_Guide.pdf.
One of the essential eligibility criteria is owning government authorised local residential information. This can be either the voter’s ID card, or the ADHAR card or the PAN card or the Ration Card which may have the local residential address of the customer. In case the customer has shifted from his own home, the requirements must be satisfied with the Rent Agreement, which may show the names of the genuine tenant ( the customer) and the genuine property owner (the house owner). However, in case the customer has shifted his jurisdiction from one city to another, he may necessarily need to show all papers which prove that he has shifted the jurisdiction.
I was fantasising the idea of availing mobile portability system especially because I shifted from one State to another and I was under the impression that I can still “own” the number  without paying roaming charges since mobile number portability also offers for change of geo-location of service area. In short I greedily wanted to localise my number, which has almost become my identity. I applied for mobile number portability only to realise a rude shocking truth. It is nothing but a hypocrisy especially for women who are not ‘single’.
          When one enters a new State he/she  can not be expected to change his/her government authorised identity proofs within one day unless he/she is a government officer who has been transferred from one post to another (you may still need to wait for getting your new id card); and if the person wants to retain the identity proofs because he/she plans to get back to his/her own home state, then it is only the rent agreement which may support his/her claim for ‘authentic identity’.  Most of the times, the house owners would prefer to rent out their properties in the name of the “Karta” (o, common ! forget about the recent judgment which says even women can also be heads of families. In such situations, Karta always denotes male heads of families) and not the “Katri”(women heads or spouses) in case the so called karta wants to be lenient enough to include his wife’s name. The reason is obvious: our society still can’t accept women as equal to men.  As such, if a woman who may or may not be working (I am excluding women  government servants), and who has travelled with her husband  to another State, wishes to avail the ‘digital magic’ called mobile portability system, she may need to rely upon rent agreement and needs her husband’s signature (and in some cases the physical presence as well) for all the formalities, reducing her existence as a mere presence  of the human body without any identity. Practically, she actually may need to denounce her ‘ownership’ over the digital identity and phone number that would be allotted to the new subscriber, i.e., her husband.  I really wonder, then what is the necessity of workplace identity cards, the biometrics and the (numbness of the) ADHAR number uniqueness if these are not needed  for causes such as mobile portability system?   Are women to be considered as fugitive criminals if their existing new workplace identity cards, unchanged passports or ADHAR cards do not match with the new residential information ? what may be other unique grounds to deny women the right to avail mobile portability system when they are otherwise eligible ? It is unfortunate to note that examples of terrorism or antisocial activities carried on with the cyber aide had lead to create some policies which do not support the concept of gender equality always.  No matter how much loving and supporting the husband may be, the rules will  always be the rules and the service provider  company would always remain ‘unanswerable’ to the wife or the dependant woman (in case she is the mother or daughter or sister of the man) even if she is highly qualified professional.
The dirty dark secret behind the glaring concept of mobile portability system: gender equality and gender empowerment remains an unanswered question as ever.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2016),Why mobile number  portability services may prove to be an absolute hypocrisy for women?  A dirty dark secret “published in http://debaraticyberspace.blogspot.com/   on 02.09.2016

Risky private talks: what women must be aware of

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Gone are the days when young women preferred to secretly seek information from friends, cousins or aunties residing in neighbouring houses about periods, sexual behaviour of men on nuptial nights or about pregnancy and related issues. Hush hush talks about delayed periods,  sex etc  slowly shifted to digital communication mediums and gradually women are now talking about these issues openly, breaking gender  based myths  that periods make women ‘untouchable’ or delayed periods may signify obvious pregnancy. This would not have been possible without the social media as a positive platform for letting women express their feelings and seek information from various groups , pages, websites etc. This is the main reason that social media is also called infotainment as well, which signifies information-entertainment. While this is the worldwide trend now, in India women are still gathering courage to speak about these issues openly on social media platforms.  For many women, it is still a matter to be shared either by phone calls or by way of Facebook, Yahoo, Gmail chat messengers, or by way of WhatsApp, Vibe, WeChat etc.  Often women may not only seek to gain information on these information by sharing ‘private secrets’, they may also like to know about fellow women’s sexual relationship with their husbands or boyfriends. There was this report by Porno-Hub which showed that women in India are no less porno viewers compared to their male counter parts (http://www.telegraphindia.com/1160103/jsp/7days/story_61762.jsp#.Voj9msLUnQ0.facebook). Women, like men are inquisitive to know about the sexual behavior of other couples and truely speaking, there is no wrong is sharing such secrets.
But wait!
There are risks involved in sharing sex-secrets with other women even in closed groups.  The language used by women inquisitive to know about sexual behaviour of friends  may not always be comfortable for others; such communications are supposed to be ‘not serious’ and women may tend to use ‘sex jokes’ which are supposed to be exclusively meant for men. But do remember, women have equal right to expression: then where is the problem?  Many a times, women friends may pester each other to share private photos on WhatsApp or similar mobile messaging platforms. These are not typical sexting, but clearly photos in a compromising position with the male partners , or simple photos of embracing or hugging each other on bed . While the earlier may be extremely risky since it may attract legal liabilities of creating sexually explicit images and distributing the same (if not kept in the owner’s own possession for private viewing), the later may look perfectly safe to create and distribute. But when seen from the perspective of online safety of women, distribution of both sorts of images may be risky. This is because, the recipient of the message asking to share the photographs, may never know whether the message was generated by the friend whom she knew since her childhood or she is truly her best friend. The sender may be the adolescent child of the friend who helps the ‘cyber illiterate mom’ to send messages, may be her husband who wishes to monitor her and her friends or may be any other stranger who may have gained illegal access to the phone either physically or digitally. The caution note for sharing sex-secrets by plain texting is also similar. The information that is sent out may be misused if the same is shared with public by others who may want to harass or blackmail the sender of the information. It takes a few seconds to text a sex joke or share the ‘bed secrets’ with friends, but may take huge time to remove the unwanted information from public viewing and manage reputation damage. Women who may pester their friends to get indulged in such secret talks through digital communication platforms may not be fully aware of safety risks. It is therefore better to be aware than to be ‘less serious’ and ‘popular’ only to attract more danger for oneself and her friends. Let us keep our secrets to ourselves and let us enjoy real life socialising for the sake of online safety of us, the women.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2016), “Risky private talks:  what women must be aware of
11th March, 2016, published in http://debaraticyberspace.blogspot.com/

The irresistible misogynist trolls in the social media

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

With another new year, I enter the 9th year as a blogger. In these 9 years I got to see emergence  of different sorts of crimes against women on the cyber space. While in India the most bothersome type of victimisation targeting women is definitely creating fake avatars in the social media or in the adult networking websites, one can understand that emergence of irresistible misogynist trolls in the social media also claims attention of every one now. Way back in 2013 in my article “Examining the scope of Indecent representation of Women (Prevention) Act, 1986, in the light of Cyber Victimization of Women in India”, published in National Law School Journal, 11, 188-218, I researched about fake avatars and trolls. These topics later found vital places in my Ph.D dissertation thesis only to remind me that these issues will never die until the victim lets them die a natural death either by ignoring them or by reporting the matter to the concerned authorities.
          Trolls find a unique place in social media especially in India because they are not ‘recognised’ by any laws in India as specific ‘offenders’. They feel ‘overpowered’ because of this to express their opinions in several threads, blog posts, media news clippings etc. However, they stand apart from other individuals who express their opinions because of their language in which they communicate: it is impolite, arrogant, hateful and often misogynist. There are different types of trolls who communicate their expression in such way. These may include workplace place trolls, information seeking trolls, lime-light seeking trolls, fan-club trolls, educational institute trolls, activist trolls racist trolls, political trolls, State sponsored trolls and also misogynist trolls in particular. The list may include many other types of trolls existing in social media and on internet in general. Misogynist trolls take to internet and social media to disrupt discussion about women, which may include discussions about welfare measures as well. One such example is this continuous publication of troll posts, which appeared in the official Facebook page of ministry of women and child development (MWCD) when the concerned minister Ms.Maneka Gandhi, announced for several welfare measures for women including the publication of Handbook on sexual harassment of women at workplace. While many stakeholders expressed their opinions in these threads in Facebook, misogynist trolls found their own way to entertain themselves by insulting others, especially women. Among these, one troll post which repeatedly targeted women, expressed anger on the issue of safety of women in the workplace, other expressed anger for the issue of special treatment of women . The bone of the contention was, if women can not endure workplace politics and back biting, which is often seen as ‘workplace harassment’ by researchers and activists, then it is best for women to stay at home and cook for their husbands.  Some women protested the troll posts. Some chose to ignore. But these troll posts started growing in number because no one actually banned them , but may have chose to block them personally. I noticed one such troll post and reported the matter to the Facebook as well as the Facebook page of MWCD.  Fortunately my report was accepted with a positive note from Facebook which removed the misogynist troll posts. But this may be a temporary arrangement for no one was booked for any ‘offence’ and as such, the opinions thus expressed in the FB page of MWCD  may not actually invite any penal sanctions because they are not targeting any particular individual, but women as a whole. Resultant, the troll posts are back in the same FB page in different forms, showcasing hatred towards women in different forms. Their omnipotent presence is felt everywhere even in Twitter or Google hangout and they are becoming more powerful understanding that using hateful words targeting women may make them more (in)famous to gain easy lime light.
          While S.66A of the Information Technology Act was in use, many people had used it as well as misused it. But hardly any one, including the police could properly use it for preventing such misogynist trolls or opinions. I being an ardent fan of positive use of S.66A argued for using it to prevent such misogynist opinions, racists’ comments, personal defamatory remarks etc on many occasions. Unfortunately  in many occasions, either victims were not ready to take the matter to the court and press for a good experiment of this law, or the police showed complete apathy to such issues, which they felt were trivial. Many activists suggested that trolls and bullies may be regulated under different provisions, and S.66A should not be made alive because of this. But I opine differently. In my recent article “A Retrospective Analysis Of Section 66 A:Could Section 66 A Of The Information Technology Act Be Reconsidered For Regulating “Bad Talk” In The Internet?” Published in Indian Student Law Review (ISLR), 2015(1), pp 98-128, I documented my opinions in this regard. But as I researched in this particular article, if misogynist trolls can not be regulated because their posts  may not give rise to threat to any particular woman ( as it had happened in the case of Elonis decision), it does not mean that they can grow with no fear of checks and balances. The moment troll posts step into defamatory posts, the victim can and should consider taking the troll to the proper authorities.
          But here again lies the problem of understanding: if the troll posts affect a more ‘powerful victim,’ say for example, a corporate house for any particular product of them, or a particular group of people, they may decide to take action against troll collectively. But if it is an individual victim, the apathy of the social media as well as the police may make the trolls more powerful.  When social media does not take any heed to the plea of the victim to prevent the troll from his activities, the troll may start posting more vigorously with a twisted message as how he remains literally ‘uncontrollable’. It is nothing but provocation to the victim to counter response so that the troll can counter attack.  Unless the police take a serious note by not considering this as trivial, the trolls may continue attacking their victims unless they get bored. It is expected that the concerned authorities, especially the MWCD may take note of the situation and implements regulatory provisions to control such disruptive activities in the name of free speech.
 Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2016), “The irresistible misogynist trolls in the social media”
8th February, 2016, published in http://debaraticyberspace.blogspot.com/