Tag: cyber crime against women

Older generation and the risks in the digital era

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Summer vacation has started and all are heading towards numerous destinations, majority heading towards ancestral homes. Since the easy availability of tablets, ipads and smart phones  ( well, not to speak about the laptops which are now considered as the older generation in  digital gadgets), many children insist carrying them to their grandparents places to fight ‘boredom’ , to take selfies in so called ‘exotic’ locations ( well, I got to see children calling a village temple tank as an ‘exotic location’ too) and to instantly put the family pictures in the instagram, Facebook  etc by various ways including whatsapp. Some parents and grandparents feel extremely proud to exhibit their children’s skill in digital technology; some feel children are getting addicted to the digital gadgets and thereby they should be given company in using the gadgets. While parents may make a horrible company in some cases due to their excessive interest in the digital day to day affair of the children, grand parents can make excellent companions, especially when the child understands that the grandparent is completely unaware of the digital tricks and can never play a detective’s role to pierce the privacy of the child. So what happens when an old man joins his young grandchild in exploring and contributing to the new digital communication systems?  Here are some examples:
Ø Taking random pictures of the household things, members of the family ( even if they are not ready to face the camera) and storing them digitally;
Ø Putting them in the social media without knowing what could be the consequence.
Ø Exploring parent’s social media profiles with the grandparent by his/her side (especially when the child knows the password of the parent’s social media profiles) and thereby giving repeated shocks to the old heads.
Ø In course of teaching the grandparent some tricks, the child may start sending friends’ request to strangers, make profiles of the grand parent’s friends without permission, start ‘liking’ numerous posts and share stuffs which may be dangerous both for the adult as well as the children.
Ø Downloading private pictures from other’s profiles and storing them in the gadget (well, it is a ‘fun’ to teach the grandparent how to download pictures).

And why we, net immigrants should be bothered by these habits of net natives ( the children) or the net aliens ( the older generation)?  Well, i have more than one reason to be worried. I got to see the tablet of one such grand parent who had stored my own photo without my knowledge. I am not ‘friend’ to him. Neither he has any profile in any social media. But one of his children is in my husband’s Facebook friend’s list. The tablet consists many more interesting pictures: a lady with face pack sitting awkwardly in her night gown, some naked children ready to jump  in the bathtub and so on….. none of these pictures were taken from proper angles and they looked amateur. When I confronted the owner of the tablet regarding this, he was more than shocked. He instantly asked his children( both under 12 years of age) who proudly told it was none other than their grandfather who became a ‘good student’ of their digital technology class, who had taken these pictures and downloaded many other. After the initial shock, came the time to laugh away the matter. But it was not the matter to laugh away. It needs to be understood that even though a digital gadget may belong to a particular person, it can be misused by numerous persons who may get a chance to handle it according to their own wishes. If it is misused, it can give birth to various issues including identity theft, sending of anonymous offensive communication and not to mention, unauthorisedly storing other’s private data including images and voyeurism (which this grandfather-grandchild duo unknowingly did ). The laws regarding the safe digital communication, safer internet and safety of women and children are developing in India and one thing which every one must note is, any offence done by any digital gadget can first and fore mostly make the owner the gadget primarily liable if he has not established his innocence in such cases by lodging complaints of missing of the gadget or the theft of the gadget or the unauthorised usage of his digital data (including social media profiles). Laws relating to identity theft, sending of anonymous offensive, unauthorisedly storing other’s private data including images and voyeurism etc, are strict when it comes to the gender of the victim as well as the offender. The new Criminal Law amendment Act, 2013 has made several of such offences punishable especially when the victim is a woman. Not to mention about the Protection of the children from sexual offences Act, 2012 (POCSO), which has laid down stricter laws to prevent any sort of exploitation of children, whether physically or digitally. While the 2013 Act targets male  offenders largely for several digital crimes, information technology act as well as the POCSO Act holistically apply to ‘all’. The child offenders are neither spared from punishments, including correctional punishments or fines, irrespective of the fact whether they knowingly or unknowingly do the mistake. Nonetheless, the owner of the gadget becomes vicariously liable in such cases and his/her journey through the whole legal procedure may neither be a cake walk.
Hence be careful. Teach the older generation how to use the gadget as well as the digital data just in the way children are to be taught. Do not make the innocents fall victims of new technologies.
Happy holidays
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2014), “Older generation and the risks in the digital era
”, 24th April, 2014  Published in http://debaraticyberspace.blogspot.com/

When mothers turn dangerous for daughters

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

 I was delighted to find a long lost friend of mine in the social media. She and I were friends right from our early school days and we lost connection when my father got transferred to another city. She found me and I found her after nearly 25 years, and we are mothers of lovely girls. The reuniting story would have happily ended here if not I found a unique coincidence which made me to think about this blog: about times when mothers may turn dangerous for their daughters. Often mothers prefer to make their children introduce to the social media through their own profiles. Many women think it is perfectly all right because the mother and daughter bond would grow, they may get to learn the virtual relationships together and mother will always protect her baby even in the cyber space. Mostly this ‘bringing the child to the social media through the mother’s profile’ takes place when the child is in the age group of 5 to 10/11 , the age when they are vulnerable targets by online groomers who spread their net for trapping children for varied reasons including paedophilia as well as online monetary cheating of the parents through the children. Mothers often think that by introducing the child to the social media through their own profiles they can save the children from such dangers. But how wrong they are….
My friend’s daughter or her mother or many mothers of daughters may never know what dangerous gate they are opening for their daughters. A very recent report from Jharkhand is a living example:  a minor girl was harassed by none other than her mother’s Facebook friend in the Facebook and when the girl confessed the victimisation, the Child Welfare Board suggested that the safest place for the girl should not be with the mother, but with her grandparents (BBC, 13thFebruary,2014). This is but one example as how mother’s profile can invite danger for the daughter. It needs to be remembered that even if it is a mother who would want her daughter to be safe and secured, in virtual world, a mother’s profile can be equally dangerous for her daughter. The profile that may be created by the mother would essentially be an adult profile and such profiles are never completely immuned from predators. Let me sketch a detail about how the daughters are trapped:
  • Tell her the password and she may get to see everything you have ‘liked’…………..including news on genocide , rape, child abuse and domestic violence. Think how she would react by seeing the visual images or reading about the hard truth?
  • Don’t tell me that you have never received any sexually stimulating message in your inbox ( ok.. it is in your ‘other box’ and you have never opened it). Your daughter is smarter than you to check all messages…… including those you never wanted to see yourself and don’t know how to delete it permanently.
  • Thinking that it is you, your ‘friend’ starts chatting with your daughter and passes some bits of adult joke, gossips about you, your neighbour, your school mate or your office colleague. Check the language ….you may have never wanted your daughter to learn or hear those ‘nasty adult language’. Now, imagine her shock when she is rudely introduced to the negative sides of virtual socialising.
  • You are in the middle of separation and you have blocked your ex. But he is continuously stalking you through enormous fake profiles and has spies spread across in your own friends-list.  Imagine your daughter’s shock when she starts getting messages from the person you have taught her to hate the most.
  • You would get worst surprises when you would get to see your profile flooded with requests for friendship from unknown strangers whom your daughter may have unknowingly tagged or talked about.

          Not to forget that the medium of communication can be mobile phones, I pads or tablets, the children are more tempted to enter the adult world when these gazettes are left unattended  with children whom their parents have taught to unlock and use them without any specific teaching about how to handle the whole thing safely. A mother or a father or the grand parents may feel happy and proud to say that their toddler or their young child knows everything about the digital communication gazette and uses it herself frequently. But I really don’t find anything to be proud for that. The mother may become directly responsible for pushing the daughter to the dangerous world of cyber crimes. In India parental responsibility had been questioned many times by the courts when it is the matter of leaving the child alone for beggary, pushing the child for child marriage etc. But laws have changed and so has the criminal justice understanding of the parental liabilities and responsibilities. Besides the Juvenile justice care and protection Act, The Protection of children from sexual offences Act is one such law which is merciless when it comes to parental negligence for child abuse including online child abuse.
Hence mothers, let your daughters see the virtual world through their own eyes and not yours, but of course with your guidance.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2014),When mothers turn dangerous for daughters
”16thMarch, 2014, published in http://debaraticyberspace.blogspot.com/

Viral contents, safety and privacy of women

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

After two days of International day for elimination of violence against women  (November,25)and a day after India celebrated Law Day on November 26, I write this blog with a mixed mind of happiness and confused state. The past weeks were noteworthy: a woman bank employee was attacked inside the ATM in Bangalore by a man who is still playing hide and seek when I write this blog and  the sensational Tehelka  journalist’s  sexual harassment case. Both to me are interconnected; all of them relate to the violence against women in different forms. All three incidences became sensational national news within no time due to viral sharing in the social media. The woman bank employee was attacked by man who was hiding inside the ATM counter with a weapon when she was operating the ATM machine. She fell down in a pool of blood. The attacker left the scene by pulling the shutter down. This was viewed by  millions of viewers again and again who watched the CCTV footage that was first aired by the news channels and then shared by almost every third social media user.  I can’t stop appreciating the two school boys who alerted the police men first. They are the internet generation kids, but  they  probably were more concerned about the crime and the victim whose blood was trickling down from the closed ATM kiosk, than wasting time in recording the scene in cell phones (remember the cartoon that is  doing rounds in  the net where people are taking picture/video -graphing  two hands slowly drowning in a water body?)  . Thanks to the school policies in many cities in India which prohibits children from bringing any digital communication devices to the school including the cell phone.  We are getting wonderful citizens for the future indeed. However, no sooner, there were floods of debates in the Facebook as well as in the news channel web links as to whether the CCTV footage should have been aired at all as this is brutal, violent attack and above all it may alert other such ATM attackers as to how to protect their identity when carrying on such operations. On the other hands many shared and showcased the video to spread the news and alert the police wherever and whenever the attacker can be seen.  Ironically i was also asked by some of my friends to see it and share it. I did neither.
        Following closely this, came the Tehelka journalist’s case. A woman journalist of the Tehelka news group complained to her seniors that she was sexually harassed and assaulted by the editor in chief of Tehelka .The news became extremely scandalous, yet sensational due to the reason that only this year India has finally got a bunch of strict laws against sexual harassment of women, including the Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal) Act, 2013 and Tehelka had been a news channel which carried many notable sting operations to reveal many closely kept scandalous secrets. Before the victim or her complaint could become a ‘hot item’ for the web, the police considered the legal safeguards for the victim which is freshly embedded in S. 16 of the Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal) Act, 2013 and warned the general public to not to circulate the details of the victim in any social media. (http://www.thehindu.com/news/national/goa-police-record-statements/article5386247.ece). A very much needed warning indeed. When the Delhi gang rape happened almost a year back, the fury of people led the government to consider stricter punishment for rape. Internet was flooded with pictures of a woman in nebulizer who was described as the victim. no one, not even the police could stop such circulation of false, half known details of the victim especially when the penal laws prohibit releasing the information of the victim of sexual assault cases.
        I consider all women victims with equal concern when it comes to the issue of their privacy. While police has taken a brilliant historical step in prohibiting general public from posting any details of the victim, I feel this wise decision should be used for all cases of victimisation of women. The limitation off course exists as the law which closes the chances of floating the information is limited in its scope. But this was one of the main reasons that I preferred to share the ATM attack video as well. Why should a brutal attack on a woman video be shared by general public at all?  I feel it is extreme disgracing for the victim, even though this could have been considered as the right way to alert the general public about the image of the attacker by some. I ask, why not only the image of the attacker? Because the woman in the ATM attack case was not sexually harassed, no one considered sharing of the video as something which should not have been done. A sheer example of when law of the land stops its words, law of human psychology takes place.  Consider when the ATM attack victim would get to see the circulation, she or her daughter/s or her granddaughters may not feel happy about it. Would you reader feel happy to see the viral pictures of your mother/sister/daughter being attacked and lying in a pool of blood?  You may not !
        If you are the one who has posted the ATM attack video or thinking of sharing any information about the Tehelka journalist. Please do consider. Viral contents can show that you are concerned about the issue, but equally it may endanger the victim’s life, her privacy and safety.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2013), “Viral contents, safety and privacy of women””, 27thDecember,2013, published in http://debaraticyberspace.blogspot.com/

Virtual women trafficking sets in : be aware

CYBER CRIME AGAINST WOMEN BY DR.DEBARATI HALDER

Using commercial web portals for on-line buying and selling is the new trend that is gripping India fast. For long there were questions of credibility of the on-line classifieds and e-commerce portrayals and many had complained after they were duped by such on-line classifieds. I myself had received and still receive many complaints of fraudulent promises on such web portals, awful customer care responses, delay in completion of the contract or even duping of prospective buyers by ‘vanishing sellers’  once the payment has been made. Typically there are several categories of perpetrators and basically one group of victims; namely the prospective buyers; rather there ‘were’ !  but the power of world wide web proved more than legendary criticism by jean Louis De Lolme  about the  British parliament which says “Parliament can do everything but make woman a man and a man a woman”. Numerous instances are there where World Wide Web had brought in huge surprises including declaring alive men dead, turning innocent children into porn materials and making brilliant students millionaires. But not to forget, it has also brought in virtual women trafficking; a trend that may not have gained major highlights due to erasing nature of the evidences. In the west, Craigslist was one such site which was being used for victimising women by creating the victim’s fake avatars (Halder Debarati,Examining the Scope of Indecent Representation of Women (Prevention) Act, 1986 in the Light of Cyber Victimization of Women in India (May25, 2013). National Law School Journal,Vol. 11, 2013, pp. 188-218 . Available at SSRN: http://ssrn.com/abstract=2270061) as one who solicits for sex; the on-line classified site was being misused  by perpetrators who for taking revenge over jilted affair, floated women’s private address, phone numbers and sometimes their very private sexual preferences which would have known  only by the perpetrator himself. There had been instances when such advertisement had lead to rape of the victim by strangers who dropped in at the address provided by the perpetrator. Criaglist started monitoring the contribution of such kinds, especially usage of the same as a dating site when some researchers pointed out how the site was becoming a notorious choice for sexual victimisation women.
        In India for long, on-line victimisation of women had been restricted to social networking sites like Facebook and some adult dating sites. Usage of commercial web-portals for victimisation of women was not  a  ‘trend’ until recently when some one used popular on-line classified Olx.com to actually advertise for  selling  a woman for a paltry sum of Rupees two thousand (see http://articles.timesofindia.indiatimes.com/2013-10-30/india/43526620_1_advertisement-police-station-portal). The advertisement was complete with a photograph of the woman and a corresponding name and phone number of the ‘agent’. Interestingly, the ‘agent’ was none other than another victim of identity theft who claimed that his name has been maliciously used to victimise him. The news media contacted the victim of identity theft and later the country manager of the online classified; subsequently the ad was removed. But now, consider the fate of the woman whose photograph was floated as the main subject of virtual women trafficking. May be, the photograph could have been taken from adult sites to victimise the man who had been shown as the agent; may be it is a real picture of a real victim; but the truth is, campaigning for virtual women trafficking for victimisation of women has set in and it has created a huge example for new trends of cyber crimes and on-line victimisation of women. In India human trafficking, including women trafficking is considered illegal and the Indian Penal Code offers various penal provisions to prohibit sale of women ( see pg 6 in Nair (2007), Trafficking women and children for sexual exploitation : a handbook for law enforcement agencies in India , URL: http://www.unodc.org/documents/human-trafficking/India_Training_material/Handbook_for_Law_Enforcement_Agencies_in_India.pdf). Nonetheless, these provisions are proving to be mere written laws especially when the online sites traditionally do not monitor the contributed contents. However, this particular site deserves a special applause since they had withdrawn the offensive advertisement within record time after being notified. But still then, the trend of on-line victimisation of women has taken a new path with this incident and I fear this is going to stay.
Hope my fear is proved baseless very soon.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2013), “Virtual women trafficking sets in : be aware, 10thNovember,2013, published in http://debaraticyberspace.blogspot.com/

Whose photo is it when you have a “cover photo” ?

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER, PH.D

Every year October brings in nice surprises: the weather changes, festive season starts and women feel more encouraged to stay fit to look good during the festive season. This enthusiasm makes one eager to do lots of outdoor activities and showcase the same in their social media profile cover pictures or profile pictures which would gradually become an identification mark for the profile owner; for example, I got to see beautiful nature photography, painting exhibitions, festive photos in numerous Facebook profiles, which were further shared by other specialised social media profiles meant exclusively for photography or for online painting exhibitions.  Nonetheless, these pictures may include human faces including the profile owners in their finest attires. Needless to say, cover photos or profile photos do provide a glimpse of what the user wishes to showcase to the world; I myself made a cover photo for myself which has my convocation photograph where I was receiving my Ph.d Degree from the hands of the Hon’ble Chief justice of India.   Well, this is the age of “sharing and viewing” and those who have social media profiles should expect minimum privacy when it comes to sharing their lives with their virtual friends. But does that mean that when the social media platform does not guarantee any privacy, our pictures or contents really become public properties?  Even though there are many research papers and works are available on this issue, I thought to contribute my own thought as well.
         As we all know, any social media is duty bound to provide privacy rights to the users. But at the same time, no service provider would actually allow a user to lock everything for him/herself. This defies the ultimate purpose of the social media, i.e. to connect and reconnect people. Hence every user is given options to choose privacy set-ups that a social media channel can offer. This includes self exposure, exposure of friends and exposure of others (who are not listed as ‘friends’ of the profile owner) through one user in various levels.   The most sensitive part of such exposure is definitely the photographs. When a user uploads a picture (whether a nature photography or a picture containing human images), to his social media profile, it is generally expected that he owns the photograph; very technically, he has copyright over it; but not always! There are numerous instances of ‘possessing’ over other’s photograph and using as well as misusing it through one’s social media profile. I myself got to see many such cases which unfortunately involved creation of “Fake Avatars”  (See Halder Debarati,Examining the Scope of IndecentRepresentation of Women (Prevention) Act, 1986 in the Light ofCyberVictimization of Women in India (May25, 2013). National Law School Journal,Vol. 11, 2013, pp. 188-218 . Availableat SSRN: http://ssrn.com/abstract=2270061) of women with ‘possessed’ pictures. But there are instances when photos of profile owners have been ‘stolen’ and showcased in other’s profiles and such photo possessing does not actually intend to harm the reputation of the actual photo owner. This happens especially when the photograph is exhibited in open access platforms like the ‘cover photo’ of Facebook, or photo albums made intentionally open for public in either Facebook or Twitter.
 It needs to be understood that social media impliedly enters into a contract where it becomes duty bound to respect a user’s copy right. This is evident from not only the Terms that any social media asks a user to go through, but also from  the report option where you would get to see a small note at the bottom “is this your intellectual property”?  In India such sorts of mischievous activities are mostly regulated by the Copy Right Act, 1957 (which has been further amended in 2012). But usage of this law for social media photo right infringement is extremely rare. The reason could be that this Act is mostly used when the intellectual property infringement involves loss of profit.  However, I have seen many people get confused as to whether they can really claim their intellectual property right when the picture is showcased in open access platforms of social media and it had been ‘stolen’. I ask ‘why not’?  But I am very much aware that to prove a claim, a victim may have to run out of her patience especially when the social media itself may ask for the proof to show that the photograph was originally owned by the victim. But still then, it may prove worth fighting for and sharing the experience  as this will actually benefit not only the intellectual property researchers, but netizens in general.

Do let me know your views.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2013), “Whose photo is it When you have a “cover photo” ?
, 25thOctober,2013, published in http://debaraticyberspace.blogspot.com/

Security of women in whose hands?

CYBER CRIME AGAINST WOMEN BY DR.DEBARATI HALDER,PH.D.

It was an anxious moment for almost every citizen in the country who was waiting to see what awaits the rapists of Nirbhaya, the Delhi gang rape victim. Right on the eve of the judgement day however, I came across another news which led me to think more than I was expected to think on the gang rape verdict: the electronic personal safety device (Epsd) which is on its way specially to protect women in distress ( See http://www.thehindu.com/news/national/watchlike-device-to-alert-kin-of-women-in-distress/article5107722.ece) . I would have forgotten the information as‘regular news’ which kindles our mind only for a minute or two had I not been  called for an interview by PuthiyaThalaimurai, a Tamil News channel, on the judgement day. The breaking news that this TV channel was airing after 2 in the afternoon obviously braced the issue of the verdict, especially the death penalty and people’s emotions related to it. I was asked about my opinion as an advocate, a woman advocate rather. The reporter, while giving his details and interviewing me, told about the 12 year old school girl in Tuticorin, who was brutally raped and then killed by the rapist almost within a week after the Delhi gang rape case happened. While I was giving my views as to what sentence can be expected in this particular rape case, I started realising how far the society has become blood thirsty for rapists. As a woman and a mother of a girl, even I myself would have wanted any one who sexually abuses or assaults another woman or a minor girl, to go through similar or even more physical pain and mental trauma that he would have caused to his victim. However, as an advocate and a legal researcher, I need to be more rational.
But an ‘EPSD’ for protecting women from sexual abusers?
 After going through hoards of news reports about the Delhi verdict and knowing how brutally the little girl in Tuticorin was killed, I could not stop thinking the ‘watch like device’ as similar to geolocator loggers or collars used for tracking migratory birds or wild animals and the women who would be wearing it, as experimental guinea pigs trapped and tracked for no fault of theirs.
I have some points to think it as anti feminist:
i.Even though the operation of it would be manual, i.e, the woman can switch on the device only when she needs to alert her people, what happens when the it gets accidentally ( or even intentionally) switched on by the  harasser if he wishes to show the harassment, disrobing or even rape of the victim to the select audience through even smarter technology ?
ii. Given the fact that laws in India are still confused about tracking a non-criminal person by private individuals including the parents, husbands or other immediate family members, would the privacy-infringement laws be amended again to include this exception? In that case, we need to be ready for the misuse of the law also.
iii. Nonetheless, our Indian society is changing. Won’t this device present another debatable issue similar to dress-code or gagging the right to use mobile phones or internet for women ( I discussed about this in one of my earlier blogs @ http://debaraticyberspace.blogspot.in/2012/12/gagging-right-to-digital-communication.html)?
Well, I am not the only one who is thinking in these lines. Some of the comment –contributors of the news report on the device did express similar concern.
But I must say, the device is a safety device and apparently women would be given freedom to use it or not to use it since The Constitution of India has given equal rights to women to live their own lives. Saying this, I can neither ignore the benefits of the device. Tracking of criminals through GPS system is introduced to Indian police system quite a long ago. Almost all the police head quarters and police stations including stations situated in interior parts of India are expected to stay connected to track the criminal through this; and this device can be an extended mobile version of criminal tracking system, which would be carried by women. It can be expected that in future everyone, irrespective of their gender can use it for alerting the police about the crime and the criminal.
But still then, I can’t stop thinking: has our society gone so low that it has to tie the crime detector on women (my angry soul  can’t stop myself from giving the name to our gender in great dismay ‘the sex-thing’)?
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2013), “Security of women in whose hands, 15thSeptember,2013, published in http://debaraticyberspace.blogspot.com/

An Impressive Independence Day news

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

While the whole nation celebrated the  independence day today amidst various positive ways I found an extremely encouraging information which I intended to share with my blog readers, especially women. The Hon’ble Principle Sessions Judge of Chennai has finally  denied bail petition for an offender who dared to create a fake profile in the Facebook. No, it was not a case of typical victimisation of women through creation of fake profiles; but  it is the other way round: this youth acted as an actor in the Facebook. He impersonated the actor by taking up his screen name “Shantnu Khan” with a slight modification by adding an ‘a’ after‘t’ in the name. When the unreal Shant(a)nu Khan contacted the fans and acquaintances through the fake profile, little did any one notice about the spelling mistake.  When he finally won the confidence of his targets he posed as an actor in distress who needed monetary help to redefine his life; something typical that we get to see in Nigerian phishing cases through emails. By his appealing presence in the Facebook, he could finally gain a little fortune.(See http://www.thehindu.com/todays-paper/tp-national/tp-tamilnadu/youth-denied-bail-in-fake-facebook-account-case/article5024422.ece). He was arrested by the central crime branch of the police in Chennai who mainly applied S.420 of the Indian penal code which prescribes punishment for cheating and S.66 of the Information technology Act, which prescribes punishment for computer related offences which are referred in S.43 of the information technology Act. The words that are highlighted by both these provisions of the information technology Act while emphasising upon offences are ‘fraudulently’ and ‘dishonestly’. This made up actor duped some for unethical gain through these two ways and he was rightly booked under these provisions. Now note that while S.66 of the Information technology Act is a bailable offence, S.420 of the Indian penal code is a non-bailable and cognizable offence. Interestingly many times crimes booked under both these provisions may be similar in nature, but due to the drafting the laws, the traditional law prescribes stricter punishment than the new law meant for cyber crimes. But this is not a new type of  case. If the readers (especially from the Chennai region) can remember the Chennai Romeo case ( See http://newindianexpress.com/cities/chennai/article543074.ece) , the similarities in the pattern of trapping the victims can be found. But in this case, the youth is intelligent enough to do a better homework. The Hon’ble judge has taken right decision in denying the bail. He actually created a good example to show how crime reporting by victims can influence the reporting agency, i.e, the police; and how proper application of the best provisions of laws can finally help the judge to decide the fate of the case.
 I have seen that many cases of victimisation of women through creation of fake profiles die premature deaths with the victim unwilling to report. Nonetheless, few cases targeting the reputation of women take a turn such as this one where S.420 of the IPC can be applied straightaway. But at the same time, it would neither be correct to say that provisions meant to safeguard online reputation including that of women are worthless laws. Needless to say, women victims can make a huge change in sentencing in such cases if they clearly narrate the whole victimisation and the police cooperate accordingly.  Belief in criminal justice system as well as awareness of the police and the victim are key elements to prevent crimes and this is no exception in cases of cyber victimisation of women. Let this 15thAugust reinstate the courage in women.

Happy Independence Day!
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2013), “An Impressive Independence Day news, 15th August,2013, published in http://debaraticyberspace.blogspot.com/

In the name of “surveillance”

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

The past week had been extremely disturbing week for couple of issues: the controversial death of the Dalit boy Ilavarasan and then the Delhi Metro intimacy tape. For those, who do not know about the first case, Illavarasan a Dalit boy, loved and married Divya, who belonged to another Hindu sub-caste. The love marriage did not end happily. It created caste based tension and Divya decided to return to her mother to end the ongoing tension which started harming other people as well. The case took a critical twist with Illavarasan’s controversial death in the beginning of this July.   While this is a knee jerking example of united we try to stand but caste makes us apart, there was one more disturbing factor that was noted by the High court when the autopsy results were scrutinised. As this report suggests, the autopsy of the body of the youth was seen by many outsiders and there are possibilities that the whole process was recorded in private cell phone devices ( See Staff reporter (July 10, 2013), Experts find defects in process, published in The Hindu. URL: http://www.thehindu.com/news/national/tamil-nadu/experts-find-defects-in-process/article4898841.ece). The report also clarified that the experts observed that this recording was done by some police constables. Shocking!  If this report is true then one can understand how much possibilities are there for these clippings to become viral in the net if not checked right now. No law permits private recording of autopsy unless such act is specially permitted for further court cases or research work. Also if this becomes viral, there is every chance that there could be wide range of violence.
I derive at this conclusion that such clipping captured by the internal mechanism system can become viral from the observation of the second case, i.e, the Delhi Metro sex tape case . 
On July 9 almost all the leading newspapers reported that  CCTV footage of couple’s intimacy in Delhi metro stations have reached the porn sites and the cyber crime cell is roped in to probe the matter( See PTI, July9, 2013, Probe ordered after CCTV footage of couples petting in Delhi metro lands in porn sites. URL: http://timesofindia.indiatimes.com/city/delhi/Probe-ordered-after-CCTV-footage-of-couples-getting-intimate-at-metro-stations-lands-on-porn-sites/articleshow). CCTV footage of protected areas  in porn sites ? Another knee jerking reality that internal system has been unauthorisedly accessed to separate such ‘private moments’ from other regular scenes in the metro stations. It is indeed true that metro stations may have areas which are not illuminated properly and CCTV is essential to check any unsocial activities that may occur in public places including such darker places.  But look at the other side of protective technical system which must have been mishandled by some one who intentionally monitored the footage to take out only these clippings. Government surveillance system has now brought huge embarrassment for these young couples. More so, it would obviously be the woman who would be focussed more than the man in the porn sites.  there are now huge debates going around questioning the behaviour of the young people in public places, government surveillance mechanisms and the law’s double edged effects.  CCTV surveillance has helped to detect many crimes, but this would be one of the finest examples as how the mechanism can be affected internally to defy the surveillance law’s meaningful purposes. Further, I must tell that the victims are lucky as the footage is now under investigation after the Delhi metro rail corporation immediately stepped in for damage control. But imagine the fate of other victims who find their awkward pictures/clippings in porn sites due to intentional mishandling of the data received from internal surveillance mechanism in public places including hotels, shops etc, and have to run from pillar to post to get justice. I was extremely shocked to find that many city police websites do not give proper contact details of cyber crime cells where the victim can physically go and report the problem. Emails and phone numbers given there are mostly non-operative and the victim often gets no response.

Time has come that the officials must be saviours and not another element to escalate the crime.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2013), “In the name of “surveillance”, 11thJuly,2013, published in http://debaraticyberspace.blogspot.com/

Too much exposed too less to expect

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

When an individual gets a virtual  home through his/her profile in the social networking sites it is most expected that he/she will open the windows to showcase his/her own self. While this can be an extremely positive gesture to let people know about oneself and market oneself to be one of the potentials, this can be extremely dangerous as well. As the US report on the internet and computing trend suggests, Indians are the second largest sharers of personal information after Saudi Arabians( See http://timesofindia.indiatimes.com/tech/social-media/Indians-second-most-likely-to-share-everything-online-Study/articleshow/20376051.cms), I partly justify it with my own observations in the internet. Many women in India tend to reveal personal information in online pockets including social networking sites, groups, news forums etc. I was one such exposure when I first entered this big (bad) World Wide Web. The typical ways may include revealing residential address, phone numbers, school names, pet names to even secret bashes. Not to mention, the regular updates themselves may make private life revealed for many women. I had this chat friend couple of year’s back, who insisted to know what I eat in the breakfast, what I wear for formal gatherings and why do I wear them. Slowly, I understood that I was feeding this particular individual more than what is needed. Well, I had sensed danger. But not many can really sense it. At the best, many women protect their information by making their profiles open for ‘friends’. But what these women may not understand is, these ‘friends’ are neither ‘anti-chambers’ from where information can not be leaked.
        Similarly, this sharing tendency can prove beneficial for online phishing teams who can easily track out the potential victim. It needs to be remembered that women are equally becoming victims of phishing as men and may be this may be one of the reasons. Off course, how can one forget about other typical online crimes which happen mostly to women like stalking, creation of defamatory profiles etc ? All of these may be results of too much sharing.
        But then what can be the solution? While opening the windows, you can not close your doors and expect the ‘unwanted’ to show up any-time. Only thing is, you need to be prepared to face the unwanted and learn from your mistakes. I have some wonderful friends who had learnt from their past experiences due to too much sharing; some have stopped frequent updating, some preferred to maintain offline connections than carrying on virtual connections. What I have learnt from them is, the more you expose yourself, the less you should expect from privacy shields; for nothing can protect your privacy when you yourself have opened doors to let the world know what they should not have known about you.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2013), “Too much exposed too less to expect
, 5thJune,2013, published in http://debaraticyberspace.blogspot.com/