GNS ONLINE NEWS PORTAL

Teenagers’ misuse of Social media is equivalent to cyber terrorism, mirroring the dangers of narco-terrorism.

Facebook
Twitter
WhatsApp
Email

GNS ONLINE NEWS PORTAL

SHAFQAT SHEIKH

CHENAB VALLEY NOVEMBER 13:

In today’s digital landscape, where artificial intelligence and digitalization prevail, social networking sites have rendered global connectivity effortless. Yet, teenage fascination with these platforms has culminated in their exploitation, manifesting as fake or unidentified profiles, a concern of comparable gravity to illicit substance use or other injurious behaviours.

Some social media account holders have generated profiles using false identities and incorrect information, thereby utilizing these profiles to perpetrate unwarranted harassment, harm, and blackmail against individuals.

The proliferation of false profiles on social media platforms, including Facebook, Instagram, Twitter, and others, has become a disturbing trend among teenagers, with Instagram being exploited as a primary tool for harassment, harm, and blackmail through the sharing and updating of individuals’ details among followers and friends worldwide.

I am transparently disclosing a situation involving a fictitious Instagram account created by an individual posing as a female using heractual name and image. The account holder established connections with friends and followers before sharing inappropriate content, including explicit photos and messages, with the associated network.

The fake Instagram profiles were rapidly brought to the attention of real individuals, and upon becoming aware of this, the affected person felt deeply disturbed as her genuine friends started sharing messages from the fake profile, causing considerable mental trauma for both her and her family, who were uninformed about the harmful actions taken by an unknown and unauthorized individual.

The students below the Higher Secondary level are underage, and teenagers who are easily involved in this heinous crime, which they are doing in front of their family members and parents, and somehow, their teachers are also well aware of this. They easily get a smartphone from their parents, or some have their own for study purposes, which are being used as a tool to promote and do wrong things on the pretext of students.

Parents must recognize the potential risks assciated with their teenagers’ smartphone usage and take proactive measures to monitor their activities. Notably, having a smartphone can provide unlimited access to information and connectivity, rendering traditional social interactions obsolete, as ‘one’s smartphone can serve as both reserved enemies,’ regardless of whether it is utilized positively or negatively, a fact of which many individuals, including parents, remain unaware.

According to the report, cyber experts successfully tracked down the creator of a fake Instagram profile within 24 hours of receiving the formal complaint from the victim, despite the account being operational for six months. When confronted, the fake profile user attempted to exert influence by citing family connections, specifically mentioning a relative holding a prestigious position in Jammu and Kashmir, who Subsequently intervened to prevent any further action or complaint registration against the accused.

Confronting impersonators requires acknowledging the parallels between their harmful actions and narco-terrorism, which ravages society through substance abuse. Moreover, teenage users create social media handles with pseudonyms, impersonating others while hiding their true identities, and subsequently attempting to tarnish the reputation of genuine individuals. This impersonation tactic, popular among teenagers, operates under the radar of societal awareness.

Social networking site owners should review and revise their KYC forms to require identity creators to provide updated Proof of Identity, Date of Birth certificates issued by competent authorities, and Proof of address to combat this societal issue effectively. Experts working with victims suggest implementing and mandating comprehensive protocols for social media handle creation, similar to SIM card activation, which would utilize live photograph capture to promptly identify and address the root causes of these issues.

Confronting impersonators requires acknowledging the harm they inflict, comparable to narco-terrorism, which exploits vulnerabilities to destabilize society. Moreover, teenage users create multiple social media handles With pseudonyms, engaging in a covert impersonation that jeopardizes the reputation of actual individuals, unbeknownst to the general public.

The controlling authorities must review their criteria for the creation of social media handles to avoid cyber terror activities in future as we, the society, have become the worst sufferers due to a lack of awareness.

(The author is a Freelance Writer and Columnist from Bunjwah Kishtwar and can be reached at freelancershafqat@gmail.com 09419974577)

Leave a Comment

Poll

[democracy id="1"]

Share Market

Also Read This

Gold & Silver Price

today weather

Our Visitor

1 0 1 3 6 8
Users Today : 124
Users Yesterday : 220