Was the email message the real bomb?

BY Kishore Budha| IN Media Freedom | 19/09/2008
The media, in its infinite wisdom, has taken on the task of persuading us to secure our wireless networks. And it is pulling out all stops!
KISHORE BUDHA on the repercussions of promoting a Wi-Fi scare. Pix: HT report.

                    Reprinted from  http://subalternmedia.com

 

 

In the wake of the Ahmedabad, Bangalore, and now the Delhi explosions on Sep 13, the media is putting the newshole to effective use. No, I am not referring to the pesky journalistic poking the state in the eye with questions or conducting their own investigations to embarrass them. No sir and

madam, that is old school! Instead, the media, in its infinite wisdom, has taken on the task of persuading us to secure our wireless networks. And it is pulling out all the stops! To begin with, a brief news report does not suffice for this effort. This requires a multi-column spread, graphics, infoboxes, and some panic thrown in just in case we are lazy ketchup. The comedy part ends here.

 

As argued by sociologist Robb Willer (2004), terror warnings only increase the fear and insecurity leading to popular support for tough views. Here an unescure private network is deemed part of the "threat infrastructure". These media reports not only normalise intrusion into the private affairs of citizens by making private uses of technology a wider issue of public good, but also justify police suspicion of ordinary citizens, as exemplified in Hindustan Times¿ warning to its readers: "If you have a Wi-Fi connection at home or office, get it password-protected immediately. Or get ready to face the police at your doorstep". The direct address to every citizen creates a climate of fear, insecurity, and paranoia.

 

The police statements in the reports reflect their anxieties as they grapple with two contradictions. On one hand, freeing up the economy has also led to a communications revolution, which transforms individual expression. Communication is no longer the preserve of the state or the media elites. On the other hand is the desire of the state to administer and protect its citizens, which can inadvertently lead to intrusions and controls over its subjects. The media relay of the authorities¿ viewpoints, without comment or question, raises problems of furthering the latter¿s authority over citizen¿s private sphere.

 

The pressing issue of agenda is the police responsibility in bringing the attackers to justice rather than trying to establish its writ over private communication networks. Why is the media wasting its time over frivolous issues instead of questioning the state and challenging its moves to curtail private activity? Instead, as this post shows, some media reports end up furthering the discourse of the police authorities, even justifying it in some cases. This current episode fits with the view expressed by Daniel Béland that "political actors, not only the mass media, are instrumental in shaping the perception of collective threats" (2005). In this case the police and the media are engaged in shaping public opinion.

 

This is what CNN-IBN had to say:

 

Before five bomb blasts ripped through Delhi on Saturday, an Islamic outfit known as the Indian Mujahideen sent an e-mail to various news organisations threatening a terror attack. On July 26, the same outfit shot out a similar e-mail minutes before the Ahmedabad blasts.

 

According to cyber crime cell, terrorists hacked into the wireless or WIFI Internet accounts of innocent citizens to send the e-mails.

 

This has become a big cause of concern in the IT community, as well as for the home user, since most have wireless networks.

 

Security Brigade - an information security solutions company - has come up with a brief guide on how to secure home wireless networks. Here¿s a look at the top ten tips:(IBNLive:2008)

 

 

As can be noted, the report begins by framing devices used in private settings as potential portals for socially undesirable elements to infiltrate and cause mayhem. This reflects the view that technology is susceptible to misuse, which is an admissible argument. The irony is the mayhem was caused by the explosions and not by the email message.

 

However, by framing the entire issue within the larger discourse about terrorism the real issue of the blasts is sidetrack and instead private with the public are conflated. This opens up the doors for intrusion into the private domains of the citizen as is highlighted by the Hindustan Times report:If you have a Wi-Fi connection at home or office, get it password-protected immediately. Or get ready to face the police at your doorstep.

 

In their desperation to come up with new ways to counter terror attacks, security establishments have turned their attention to this new-age technology that has, of late, proved handy for terrorists blamed for blasts, most recently in Delhi.

 

The Gurgaon police has started tracking all hotels, houses and offices with WiFi-enabled networks. "We¿ll curb its misuse," said Anil Dhawan, DCP Gurgaon. "All station house officers have been asked to furnish a list of buildings with Wi-Fi facility in their ar- eas at the earliest," Dhawan said. (Dastidar:2008)

 

These reports suggest that the state is anxious to intensify controls over flows of communicatin. Logistically, this is a nightmare at worst and resource intensive at least. How does the police intend to regulate wireless networks? During 2004 George Bush¿s presidential campaign team ran an advert showing wolves with a voiceover that said: "weakness attracts those who are waiting to do America harm."

 

For past media reports on terrorism and wireless networks read here, and here.

 

The author is a researcher at the Institute of Communications Studies, University of Leeds. He blogs at http://subalternmedia.com

 

 

References

Associated Press (2004). "Bush Ad Uses Wolves to Imply Kerry Weak: Democrats Counter with Eagle-Ostrich Spot," MSNBC News, October 22. http://www.msnbc.msn.com/id/6308153/

 

Dastidar, Avishek G. & Ahuja, Sanjeev K. (2008) ¿Have a Wi-fi connection? Get it password-protected immediately¿ Hindustan Times Delhi Edition Sep 17, Page 3

 

Béland, Daniel (2005) ¿The Political Construction of Collective Insecurity: From Moral Panic to Blame Avoidance and Organized Irresponsibility¿, Center for European Studies Working

 

 

 

 

 

Subscribe To The Newsletter
The new term for self censorship is voluntary censorship, as proposed by companies like Netflix and Hotstar. ET reports that streaming video service Amazon Prime is opposing a move by its peers to adopt a voluntary censorship code in anticipation of the Indian government coming up with its own rules. Amazon is resisting because it fears that it may alienate paying subscribers.                   

Clearly, the run to the 2019 elections is on. A journalist received a call from someone saying they were from Aajtak channel and were conducting a survey, asking whom she was going to vote for in 2019. On being told that her vote was secret, the caller assumed she wasn't going to vote for 'Modiji'. The caller, a woman, also didn't identify herself. A month or two earlier the same journalist received a call, this time from a man, asking if she was going to vote for the BSP.                 

View More