seedinglives

Home » Food & Human security » Denied human freedom: new geographies of digital violenc

Denied human freedom: new geographies of digital violenc

Follow me on Twitter

The emergence of digital technologies (DTs) is a relief and seen by many in the developing world as one of the technological innovations that is increasing people’s acceHSC 1ss to new information, enhancing decision-making, facilitating trade deals, and personal relationships. The power of DTs is helping to connect institutions, nations and communities as well as cultures from different ethnic and international backgrounds. I am aware of the significant role DT is playing in easing the challenges of education, transportation, agricultural extension communication and indigenous economies as well as generating livelihoods for poor urban families, especially in developing countries. Globalization is greatly benefiting from the DTs. Notwithstanding, these benefits, including the possibility for me to post and share this important experience, the abusive use of DTs is breeding what I termed as “digital apartheid”. It takes not less than 3 years of intensive research to discover this invasive digital terrorism. From my investigation, this practice is not endorsed by any nation or society. Digital violence is carried out by an embellished anti-development network that combines intellectually honest deception, personnel training, DTs and earthno-spying as well as emotional abuse to announce their presence and to promote dictatorship and aggressive domination in organizations or in societies or across territorial circuits. In Ghana and Africa, DTs are new to majority of people who are less educated. This newness of DTs makes many people vulnerable to internet identity theft, corporate information insecurity and privacy abuse.

 The key aims of this digital violence are to:

(a)  cause workplace violence through gossips, sexual harassment and assisting managers to assign excess workloads in order to forcefully cause resignation or unjustly replace an employee with a favourite person. This is becoming increasingly pervasive in non-governmental organizations (NGOs) sector. In both formal and informal workplaces, working women and young girls are vulnerable to and mostly suffer from digital violence in Ghana. Siblings and children of affected persons suffer from poverty, food insecurity, and social exclusion since the anti-development network blocks the victim’s access to financial resources; (b) cause disagreement and mistrust among couple. Eventually, this causes divorce in a flourishing or potentially “juicy” marriage. Currently, hundreds of new marriages, especially among young couples, are breaking down almost every day due to the practice of digital apartheid; (c) use a lead “terminator” consultant to promote massive unemployment or employment dissatisfaction capable to cause strike and disempower an existing corporate managership or leadership. Digital apartheid helps the network of oppressors to shift high-paid employment opportunities, investment capital and donor aid to its network members thereby empowering themselves and limiting opportunities for genuinely deserving people; and (d) destroy and control information in order to enslave and manipulate day-to-day activities of persons they believe to have an exceptionally appealing academic, public or a promising private life that outclasses their members in competing for power, finance and employment. Geographically, the practice of digital violence is more common in the cities than in the rural communities.

 Activities of the digital oppressors take multiple forms, including the following:

  • Eliciting confidential information about the victim through dubious organization of capacity building sessions, fake ceremonies and job interviews, and anonymous correspondence (or using the name of the victim’s friends) as well as direct impersonation. The weaknesses of online social networking makes it so easy to impersonate online activities of the victim;
  • Attacking professional, personal and religious life of the victim. If the victim is a learned person, his or her professional activities are belittled;
  • Degrading the victim through gossip and provision of “substandard’ things like place of living, food and means of transportation. If the victim is working, this will include dodging signatures, contacts, and tricking the victim into poverty. What the leader or a delegated member of the network will do is to honestly deceive and ensure the victim is not paid. This is achieved by helping the employing organization to generate and keep records that help to deny the victim his or her entitlements.
  • Oppressors falsely report the victim to the State Police Service or security agencies;
  • Sending anonymous letters to discourage the victim’s access to life-improvement opportunities;
  • Children and young people are particularly trained and rewarded to spy and report on the victim at an internet café, home, work or place of checking e-mail conversations without the victim knowing. The victim is likely to complain about this. Yet this complain is likely to be perceived as if it is spiritual or an activity of a “ghost”. But remember that a “ghost” does not write on walls or post information on the internet. On the eve of committing a crime i.e. if the oppressors decide to assassinate the victim, all the symbols and words written or pasted on walls are haphazardly painted or crossed with chalk, charcoal or permanent marker to hide detection and identification by the victim’s neighbors or investigative security agencies. Landladies and landlords who are blackmailed to conceal this violence tend to overlook if the writings are pasted on their houses.
  • Develop web pages using the victim’s names and other identities to frighten the victim’s friends, relations and professional affiliates;
  • The people connected to the victim are told fabricated and “bad” stories about the victim by influencing them through “do not tell anybody” mantra and certain psychologically branded statements like “He or she is lazy and does not want to work”, “He or she says nobody can do him or her anything”, “Who does he or she think he or she is?”, “If he or she is eating will he or she gives you some?”, “Does he or she think he or she can depart?”, and “He or she is too know”. Even if the victim holds no evil intention, he or she is projected as an enemy to the people hired to spy and report on him or her;
  • Daily harassment and provocation of the victim to react or complain frequently or face problems. People related or connected to the victim see such complain as “normal”, “spiritual” and “exaggeration of circumstance”. This creates conducive conditions for the oppressors to kill the victim because, at a point, relatives and friends begin to ignore his or her complains;
  • E-tagging the voice of the victim and attempting to speak for the victim over the phone, example by giving misinformation and misdirection about the victim’s whereabouts and activities. A network member who is spying on the victim may attempt to be speaking for the victim at a meeting, home or church;
  • Very close friends of the victim are financially rewarded or through alternative opportunities to give personal information about the victim, his/her family and friends. A friend will accept to do so because he or she is told a lie about the victim and is advised not to talk about it or seek clarification from the victim;
  • Regularly putting the victim on a false light, including promising rewards for work done, which are never paid for but is oppressed for expressing the experience;
  • Secretly recruit children and young people and making them feel that they are doing “security work”;
  • Hacking of telephone calls, social media, e-mail addresses and other means of communication with the main to “poison” the mind of the victim’s relatives, benefactors, creditors and sympathizers. With this, some words from victim’s telephone or e-mail conversation are tapped in and given to someone who living close to the victim to recite and show that the conservation was heard. This is aimed at provoking the victim to commit crime or putting fear in him or her. If the victim goes to complain to his or her telecom services provider, he or she is likely to be told “change your phone” or “nobody can hack your phone line”. In case an offensive data is obtained about a victim those involved in collecting the data are silently killed with the fear that they will disclose details. 

Guiding code: You do not have to offend or do anything wrong against this network before they exert cruel violence against you. But to kill or blackmail, they will have to put you on a false light. In order to conceal identity, the oppressors may delegate their activities.

The digital abuse may be concealed through (1) rewarding and buying material articles for some people in the area where the victim is living; (2) transferring money through the family or close relative of the leading oppressors of the victim rather than the chasers; and (3) sudden changes in relational attitude and behaviour of the oppressors and their close confidants to people living in the victim’s area of residence: humility, respect, greeting and being nice to everyone.

 Some ways to tackle “digital apartheid”

  1. Families must keep watch over their family members even if they claim to be employed by so-called “international” dizs.
  2. Most churches have failed in regards to “knowing their members” and what they do to earn a living. It is suggested that church leaders begin to know a bit of information about their members and the organizations where their members work for and some person(s) connected with such organizations.
  3. Urgently enacts the Freedom of Information Bill.
  4. Interrogate anyone who gives personal information to you about a friend or someone else or is regularly requesting updates from you about someone else.
  5. The security of SIM card registration has failed and telephone users have no clear channel of making complains and receiving answers. The victim of a digital violence receives threatening e-mail and text messages that do not come from a verifiable and identifiable telephone number or e-mail address.
  6. Digital violence is an anti-development issue, which organizations like the Open Society Organization, Free the Slaves, Amnesty International, African Union, European Commission and civil society organizations involved in fighting human insecurity aspects of sustainable development goals will have to adequately invest resources to eliminate from society. This is important because digital violence is likely to increase “child killing or abuse”. Human lives are priceless.

 NB: The symbolic picture above is taken from a victim’s attack in a suburb of Accra. Beneath the diagram is written, “Do not, eat you up” meaning that the victim will be killed if the activity of the network is disclosed.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: