Anonymity promotes democratic debates…study

A study of You Tube Videos has been presented by Mr Nn Laeeq Khan of the Michigan State University has thrown up a interesting thoughts on the “role of Anonymity” in online socializing. In the background of Internet Censorship controversies in India, the findings of the study are relevant for India.

It is well known that “Anonymity” was one of the main reasons for the Internet to be popular as a medium of communication. The raise of the social media has also been significantly assisted by the fact that people participate in discussions through “Comments” and enrich the thoughts presented by one person.

The study of Lqeeq Khan on Comments made on You Tube videos indicated that both praises and criticisms were significantly high in the anonymous mode rather than an identified mode. During the study it was observed that 863 appreciative comments were made of which 856 were anonymous. Out of the 252 critical comments, 251 were anonymous. Out of 93 flames and 176 spam comments, 93 and 166 comments were anonymous. In summary, 99.4 % of all comments were anonymous.

It is not surprising that the critical comments, Flames and spams are anonymous. But the fact that 856 of 863 appreciative comments were anonymous is indicative of a distinct preference for anonymity by Netizens.

This finding negates the school of thought that Netizen’s comments are aimed at stroking “Self Ego”. They appear to be more honest in objectively expressing their opinion. The fact is that Netizens continue to consider that “Anonymity” is the way of life on the Net.

This should be a good feedback to the regulators who move heaven and earth to curb Netizen’s freedom of expression through misuse of legislation.

Recognizing the two divergent views, Naavi continues to favour his thought of “Regulated Anonymity” as a way forward. It is a concept where “Anonymity” is preserved by a “Non Governmental” body of Netizens which in exceptional circumstances cooperate with law enforcement to ensure that the Cyber Society lives in harmony with the physical society.

Naavi

Related Article: Theory of Regulated Anonymity by Naavi

Posted in Cyber Crime, Privacy | Leave a comment

Is this a part of a Nigerian Scam?

Recovery of US$5 billion worth US treasury papers in the custody of one Mr Ramalingam of Coimbatore by IT authorities has raised doubts whether these could be part of the Nigerian Scam proceeds that Mr Ramalingam might have received. There is also a speculation that he could be a front for some body else.

(Refer details here): Also here

It is also likely that the Bonds are fake. There was a time when Coimbatore was famous for fake currency notes. If the industry have graduated to printing of fake Foreign Government securities, it could be a natural progression of an old skill.

The IT authorities are presently ascertaining the genuinity of the bonds which will throw valuable light on the nature of the crime involved here.

The Nigerian scams have been in the region of US$ 100 million and have never known to have been carried out with an exchange of genuine looking US securities. Hence this possibility is not considered plausible.

The possibility of Mr Ramalingam as a front man is a possibility but if so the principal has to be a Tamil Political leader. Considering the value of the assets seized, it appears that the amount is beyond the value of any Tamil industrialist or politician.

The most likely possibility is therefore that the bonds are fake bonds and may be a preparation for a massive fraud involving international dimensions including an LTTE angle.

Amidst all the speculation, it is also theoretically possible that the person might have make a killing in commodity market of unimaginable proportions. However even such earning becomes an acqusition against the law of the land at least from the IT angle.

We need to wait and see the developments as it appears to be a very interesting crime with different dimensions.

Naavi

Posted in Cyber Crime | Leave a comment

Cyber Law Predictions-US-Patent issues

The BNA’s Electronic Commerce & Law report predicts a fresh look at Software Patents.

Experts are of the view that US Patent law is stiffling innovation and driving up costs through excessive litigation. Some of the cases which will be argued during the year are expected to result in major changes in patent law in US.

In the EU countries, a “Uniform patent” structure is expected to emerge during 2013.

Computer technologists are expected to continue their fight against Software patents as reducing opportunities of innovation. The developments appear interesting to follow.

More details can be found here.

Naavi

Posted in Cyber Crime, Cyber Law, Information Assurance | Leave a comment

Cyberlaw Predictions-US-Privacy Litigation

BNA’s Electronic Commerce & Law report which has gathered views on the predictions in Cyber Law from experts has predicted that Privacy litigation is going to increase during the upcoming year.

During 2012, i a notable litigation Google agreed to pay a record US$22.5 million civil penalty to settle charges about misrepresentation of tracking cookies used in Safari browser. Hacking of LinkedIn attracted attention of the Information Security professionals. In the coming year more class actions may be expected. This is also an indication that emphasis on Information Assurance and privacy protection may also increase.

A detailed report on this aspect is found here:

Naavi

Posted in Cyber Crime, Cyber Law, Information Assurance, Privacy | Leave a comment

Cyber Law Predictions-US

An opinion gathered in a survey in US has tried to predict the direction in which Cyber Laws may take in 2013 in US.

One of the areas that is attracting attention is the Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA) which are under opposition from those who fight for freedom of speech on the Internet. Though the earlier version could not be pushed through a revised version is expected to be back in circulation in 2013.

More on the expectations on SOPA/PIPA in 2013 can be found here.

The SOPA/PIPA protests have also provided a recognition for the strength of Netizens in getting their voices heard. This is a welcome development since Netizens want Laws to be made in consultation with them taking into account the impact of laws on the Cyber Space. They cannot be ignored. This is the first step in Cyber Laws by the Netizens and For the Netizens.

Naavi

Posted in Cyber Law | Leave a comment

Security issues delay Academy awards voting

Information Security measures put in place to keep hackers from disrupting the Oscars’ online voting system is reported to have created hurdles for voters. Many voters have expressed difficulty in using the system and being locked out by the system because of password failures. This is an example of how the objective of “Availability” which is also part of the Information assurance often gets neglected in the overall implementation.

Related Article

Posted in Cyber Crime, Information Assurance | Leave a comment