Skip to main content


National Security Threats in Cyber Space

Introduction In addition to nation-state players, the cyber world is also filled with well-organized criminal groups, independent terrorist groups, and "just for fun" hackers of all stripes. Each offers a particular kind of threat that calls for a complex, varied response. Since the potential threat is a natural part of the internet and hence cannot be completely erased, we refer to the issue as embedded. In traditional warfare, governments have to spend considerable financial and personnel resources on every front—land, air, and sea—but in cyberspace, a single person may wipe out an entire nation. Nuclear weapons need a lot of work to construct, whereas cyber weapons may demonstrate immense harm without costing a dime. Regarding national security, cyber threats have the capacity to endanger the integrity of crucial infrastructure, disrupt the financial system, permit the theft of intellectual property and trade secrets, and deteriorate ties between the government and its
Recent posts


  “ Crime and bad lives are the measure of a state’s failure, all crime in the end is the crime of the community .”   ~  H.G Wells All of us in the present time must have come across the term cyber crime in our daily lives at some or other time. With the expanding horizons of the internet, criminal activities have also expanded their reach over the virtual world. Cyber crime is the common denomination given to activities which use a computer device to further illegal activities like fraud, trafficking, forgery, breaching privacy etc. With every passing year, the rate at which these activities take place has grown tenfold. Between, 2012 and 2018, cyber crime incidents registered were around 90,000. According to data published in 2020, the rate of cyber crimes against children has increased by 400%.Therefore, a constant vigil is required to keep the cybercrimes in check. Since, the cybercrimes are conducted using technologically advanced tools, a special legislation was required to

New Privacy Policy of Twitter

  Twitter is one of the most commonly used social media networking platforms and is very popular amongst celebrities as well. People enjoy uploading tweets and retweets over Twitter. It is a good platform for social messaging, news and marketing, etc. But recently twitter has been in the news for a change in its privacy policy. Just a few weeks after the announcement that Elon Musk was going to acquire that social media platform, Twitter had revamped its privacy policy. Everyone was expecting something big after that announcement and many were curious to know if there will be any changes in that micro-blogging platform. Later on, Twitter introduced the privacy policy to their users by creating a video guide for users so that they can understand the privacy policy. Also, Twitter has said that its new privacy policy is much more simplified and organized under three new heads namely data use, data sharing, and data collection. The new version of twitter’s privacy policy will take effect f

Criminal Procedure (Identification) Bill, 2022: ALL YOU NEED TO KNOW

This bill was presented in the Lok Sabha & Rajya Sabha in March 2022 & received its consent on April 4, 2022 from both the houses of the parliament. This bill will replace the Identifications of Prisoners Act, 1920. The main motive of this bill is to ensure more efficient & speedy investigation by the use of technology. However, this bill is raising some serious privacy issues & concerns on Right to Privacy of an individual. Prominent Features of this Bill This bill gives the power to the police & other investigating agency to collect, store & analyze the fingerprints, iris & other biological samples of the prisoners. The NCRB (National Crime Record Bureau) will act as the central repository where all these samples along with handwriting & signatures samples will be stored for 75 years It further broaden the scope by allowing the Police to even take the body measurements from convicts, habitual offenders and ‘other persons’ However, the existing law

Cyber Bullying: Depression: Death

In the year 2022, modern-day media and awareness programs have been working tirelessly to educate people and raise awareness about cyber bullying and related online cyber crimes. Even though the internet and online communities in the world have been around since the turn of the century, still the awareness about these issues is not as widespread as it should be. A major incident which prompted extensive campaigns about cyber crime awareness and cyber bullying education was the suicide of Canadian teenage girl Amanda Todd in the year 2012. Today, as we are about to complete a decade after her death, we again try to understand what drove her to take that decision. The Incident  Amanda Todd was a Canadian national living with her parents in Port Coquitlam, British Columbia, Canada. When she was 12 years of age, she was lured into an online conversation by a man and was flattered into flashing her breasts to him on her webcam. The man took a picture of her breasts and followed her around o

Famous Cyber crimes That Targeted People Instead Of Money

  With the emergence in the field of technology, the number of cyber crimes have also emerged. Different types of cyber crimes daily take place such as phishing, email spoofing, data theft, identity theft, bullying, harassment, cyber extortion, ransomware attacks, etc. The majority of the people would opine that the Cyber criminals engage in these activities for the sake of money but there are numerous examples where money wasn’t the only target of the Cyber criminals, rather they targeted people.  The intent of cyber criminals,  targeting the people can differ from case to case. Sometimes it may target a single person or sometimes a large number of persons. Various examples show the instances where the target of the cyber crimes were people, be it belonging to specific religion or age group or sometimes a sole person. Various examples of such crimes are discussed below: Bulli Bai App - This app was created over the platform namely GitHub which is an open software development site owne

Does the Internet Need the Government?

  Data comes with two extremes of itself. At times it can act as one of the most powerful assets, or it could act as a vulnerable tool, in contemporary times, data sharing plays a predominant role, with the associated risk of unconsciously or subconsciously exposing our confidential information like: information related to finances, health, location, frequently visited spots, contacts, etc.  With recent developments, biometrics has been introduced as our digital identities across the globe.  There have been several instances of cyber wars, internet site blocking, and online snooping of customer information by government agencies of countries such as the U.S., Egypt, China, Syria, and India, which raises serious data privacy concerns. ICANN ( The Internet Corporation for Assigned Names and Numbers) came into existence in 1998, is a US-based not-for-profit organization, which coordinates, the global internet’s system unique identifiers, and ensures the secure running of these systems.