[Itpolicy-np] Mumbai Terrorists Used VoIP, Satellite Images and GPS to Help Plan and Carry Out Attacks.

Indiver Badal indiver at gmail.com
Sun Dec 14 14:47:10 GMT 2008


Regulating/restricting technological advancement with government
policies, rules and regulations will just disable
law-abiding-citizens' access to the technology and its benefits. It
will in no way stop terrorists from abusing them.

So, we should get this out of our mind that having
technology-restricting-policies will help to fight terrorism. The
common citizen can not even carry guns with them but it has not
stopped terrorists from taking them wherever they want to.

Terrorism is not a technological problem and there is no technological
solution to terrorism. Lets focus our time and effort on having less
restrictions so that average citizen can benefit from technological
evolution.

~Indiver

On Sun, Dec 14, 2008 at 2:15 PM, Pavan S. Shakya
<pavan.shakya at worldlink.com.np> wrote:
> As the saying goes -- bikash (development) and binash (destruction) go
> hand-in-hand. We must be extra careful to avoid binash while carrying
> out bikash.
>
> We seriously need timely acts, policies, rules and regulations.
>
> Pavan
>
> -----Original Message-----
> From: itpolicy-np-bounces at lahai.com
> [mailto:itpolicy-np-bounces at lahai.com] On Behalf Of Bipin Gautam
> Sent: Saturday, December 13, 2008 12:41 PM
> To: itpolicy-np at lahai.com
> Subject: [Itpolicy-np] Mumbai Terrorists Used VoIP, Satellite Images and
> GPS to Help Plan and Carry Out Attacks.
>
> News:
> http://www.timesonline.co.uk/tol/news/world/asia/article5317075.ece
>
> Internet/VoIP is also booming in Nepal and increasingly being "the
> tools" for the flow of knowledge/communication. According to law, its
> the responsibility of the service provider to arrange monitoring
> mechanisms incase of a security-related-request from the government.
>
> I believe following should be addressed in some way in the IT-Policy
> of New Nepal so just dropping it in the spotlight...
>
> - Make government capable in information operation, information
> warfear and communication intelligence.
>
> - Need of data protection act.
>
> thanks,
> -bipin
> _______________________________________________
> Itpolicy-np mailing list
> Itpolicy-np at lahai.com
> https://lists.lahai.com/mailman/listinfo/itpolicy-np
>
>
> __________ Information from ESET Smart Security, version of virus
> signature database 3688 (20081212) __________
>
> The message was checked by ESET Smart Security.
>
> http://www.eset.com
>
>
>
> __________ Information from ESET Smart Security, version of virus
> signature database 3688 (20081212) __________
>
> The message was checked by ESET Smart Security.
>
> http://www.eset.com
>
>
> _______________________________________________
> Itpolicy-np mailing list
> Itpolicy-np at lahai.com
> https://lists.lahai.com/mailman/listinfo/itpolicy-np
>



-- 

Regards
~Indiver


More information about the Itpolicy-np mailing list