#cyber security laws
Explore tagged Tumblr posts
detective-jellyfish · 2 months ago
Text
Tumblr media Tumblr media Tumblr media
˙ . ꒷ 🪼 . 𖦹˙— Cyber harassment; 04/??
Tumblr media
The term "Cyber harassment" describes a type of harassment that occurs online. Cyber harassment causes severe anxiety, severe depression, PTSD (Post-Traumatic Stress Disorder) symptoms, social withdrawal and increases the risks of self harm. Victims often are dismissed because their situation is usually brushed off as "internet drama". /srs
Cyber harassment is considered a crime in several countries, where fines or jail time can be applied to the perpetrators, depending on the country's legislation. /srs
We firmly condemn cyber harassment in any way, shape or form. /srs
If you happen to find any of these blogs or posts, we firmly encourage you to report and block. /srs
Viewer discretion is advised due to the hostility of certain users. /srs
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
The post on the first screenshot was uploaded on April 21st, 2025. There, you can see the user @/syltheanti willingly engaging one more time in online activities that could be considered harassment. Saying that an entire group of people should "die in a goddamn hole" could be interpreted as wishing harm (which Tumblr can ban if reported under Community Guidelines). Adding to that, it can count as inciting harassment with violent rethoric, since his post can encourage others to attack Pro-Shippers. Besides, complaining about mass reports could be considered hypocritical since Syl himself willingly engages in targeted cyber harassment, like you saw in previous posts. /srs
Proof of @/syltheanti purposely making up false accusations against @proship-froggo with the objective of justifying the targeted cyber harassment towards them down here ⬇️
Proof of @/syltheanti willingly engaging in cyber harassment while defending and supporting people who do that as well, can be found down there ⬇️
The post on the second screenshot was uploaded on April 22nd, 2025. You can see that both Anon and Syl have misunderstood the terms Pro-Shipp, Com-Shipp, and Dark-Shipp. But don't worry, we'll explain it just in case. /srs
Pro-Shipp (🌈🍖 / 🍖🌈) is a stance that supports the creation and enjoyment of all types of shipps involving fictional characters only, including those that might be considered controversial, problematic or taboo. Pro-Shippers believe fiction is separate from reality, and that enjoying problematic content in fiction doesn't necessarily mean endorsing it in real life. Pro-Shippers believe that both creators and fans should have the freedom to explore any type of relationship in fiction without censorship or judgement. Pro-Shippers often advocate for content warnings and tags to help others avoid content they might find triggering. /gen
Com-Shipp (🌸🌛 / 🌛🌸), short for "Complicated Shipping", refers to exploring or enjoying shipps that involve complex, messy, or morally ambiguous fictional characters. These relationships often have layers of conflict, tension or emotional depth. Com-Shippers are drawn to fictional relationships that aren't purely wholesome or healthy, but aren't toxic and abusive either. Com-Shippers like to explore themes like power imbalance, unresolved tension or emotional turmoil, something present in enemies to lovers fictional shipps, by example. Com-Shippers may acknowledge the problematic aspects of a shipp but still finding it interesting or meaningful. /gen
Dark-Shipp (🎱🎀 / 🎀🎱) is about shipping fictional characters in relationships that are explicitly dark, disturbing or taboo. These shipps often involve themes like abuse or manipulation. Dark-shippers are usually drawn to the exploration of dark or taboo themes in fiction, often for the sake of storytelling, emotional intensity, catharsis or shock value. Dark-shipps aren't meant to be normalized or romanticized but are instead explored as part of the story's darker elements (canon or fan made). Besides, most Dark-shippers don't endorse real life behavior, and they often emphasize the importance of content warnings and ethical storytelling when dealing with sensitive topics. /gen
Com-Shipp does exist. Maybe Syl just doesn't like the term "Com-Shipp", but that doesn't mean the term doesn't exist or shouldn't exist. For example, we don't like some things created on the internet, but that doesn't mean those things don't exist. Because the world doesn't revolve around anyone. /gen
And we just showed you that Pro-Shipp ≠ Dark-shipp. Not all Pro-Shippers are Dark-shippers. In fact, some Pro-Shippers are just Com-Shippers. /gen
Also, calling an entire online group of people "nasty fucks" is dehumanizing language meant to incite disdain or violence. /gen
The comment on the third screenshot was made on April 22nd, 2025. The user @/silly4goose20 appears once again. Let's remember it's not the first time she appears in those screenshots willingly engaging in cyber felonies. /srs
Proof that @/silly4goose20 has encouraged several people to commit suicide can be found here ⬇️
Telling people to get help or "take the trash out themselves"... Is this what we think it is? Another phrase similar to "you should get help but if you don't then you should kill yourself"? /srs.
Curiously, on the post on the fourth screenshot, you can see the hypocrisy of this individual. The post was originally uploaded on April 22nd, 2025. It seems like that, for @/silly4goose20 , inciting suicide online is okay, but she shouldn't receive a similar treatment. If she really was this worried about "people getting help" she would condemn suicide incitement in any way, shape or form. We hope her hypocrisy talks by itself. Even if the suicide incitement was unsuccessful (in the best case scenario), she still has blood in her hands and is acting no better than a real life abuser. /srs
The post on the fifth screenshot was originally uploaded on April 23rd, 2025. Well, this post (or reblog, better said) is less harmful than the other ones we've seen, but it can still count as mild cyber harassment. Comparing a group of people to literal trash is dehumanizing, and intended to degrade and insult. The post can serve as a public signal to @/sho-can-g 's online circle that mockery towards Pro-Shippers is acceptable. /srs
The post on the sixth screenshot was originally uploaded on April 13th, 2025. The user @/chubbibunni is not as active as the other users when it comes to shipping discourse, but her online behavior can be equally violent sometimes. There are several things wrong within this screenshot. /srs
The user @/smacksalad made a post saying that vent art / therapeutic art from survivors should be kept in private. As survivors of CSA and extreme physical abuse, we disagree with that statement. The Jellyfish system thinks survivors should be able to upload their vent or therapeutic art to online spaces, as long as they add the proper tags, as long as it's their own decision, and as long as they aren't willingly exposing vulnerable audiences to heavy and traumatizing topics. /gen
Survivors deserve to speak up and express themselves about the things they survived without being pressured to "be silent" or "backpedal". Many survivors (SA survivors, CSA survivors, physical abuse survivors, emotional abuse survivors, abandonment survivors, neglect survivors, and so on), are forced to stay quiet and silent by their own abusers or by the environment that enables their abusers, and this can go on for years or even decades. With this in mind, telling survivors to just "keep it to themselves" is not only disrespectful, but deeply unfair. Don't silence or censor survivors' voices and art. Yeah, some vent or therapeutic art can be deeply disturbing, but the best option is to block people who make that art, instead of urging them to "keep it private". /gen
The rage we feel every time we see someone saying "CP" instead of CSAM/CSEM is unreal omg (`皿´#) /gen /neg
To keep it short (and family friendly), if you want to support survivors, especially CSA survivors, use the correct terms. Using the term "CP" downplays and undermines the physical, psychological, and moral long-term damage survivors go through. Terms like CSAM and CSEM help remind people that it isn't a type of "porn genre", or "18+ entertainment". It's sexual violence against minors. Survivors deserve that clarity and acknowledgment. /gen
Purposely comparing vent art or therapeutic art from CSA victims/survivors and actual CSAM/CSEM is beyond fucked up. Let us do a quick explanation: /srs
Vent art / Therapeutic art about CSA
Made in a consensual and safe space. /srs
The minor has control over what happens and what doesn't happen. /srs
The main purpose is trauma processing and healing. /srs
The adult (in this case, the therapist) can guide the minor in their healing journey to achieve a better mental and physical well being. /srs
Usually consists of drawings, poems, or just phrases. /srs
CSAM/CSEM
Made in a non consensual and exploitative space. /srs
The minor has no control over the circumstances. Their autonomy and dignity are violated. /srs
The main purpose is preying on vulnerable minors and catering to pedophiles, child predator rings, or human trafficking groups. /srs
The adult (in this case, the perpetrator) often commits another type of sexual violence against the minor, provoking further physical and psychological harm.
The vast majority of times contains images or videos of real life minors being actively harmed. /srs
While the post from @/chubbibunni isn't directed to one specific user, it still can count as cyber harassment. Equating therapeutic art with literal CSAM/CSEM is not only a false comparison, but a deeply harmful one. Falsely accusing CSA/SA survivors of being child abuse perpetrators can be considered defamatory, therefore, this online behavior can be considered cyber harassment. Adding to that, this incident is not an isolated one, but a pattern of ignorant and hostile online behavior. /srs
12 notes · View notes
solarpunkbusiness · 2 months ago
Text
Are solar power systems prone to cyberattacks?
“Like any technological revolution, digitalisation presents incredible opportunity, for example, energy system cost savings of €160 billion per year,”
“It also comes with new challenges, like cybersecurity. We didn’t need anti-virus protection for a typewriter - but we do need it for our laptops. As a responsible, forward-looking sector, we have mapped the cybersecurity challenge, and we’re rising to meet it with clear, comprehensive solutions.”
The report, written by risk management organisation DNV.
Europe’s move away from an energy system dependent on a few high-impact targets to a more decentralised system offers clear energy security benefits, the report states. Ukraine has learnt this in a particularly brutal way, following repeated cyberattacks on its power grid by Russia.
But to realise these benefits, cybersecurity laws, which focus on old, centralised infrastructure, need to be updated, the experts say. New legislation must address the specific security needs of distributed energy sources, like smaller rooftop solar installations.
Though on a much smaller scale than the strikes on other parts of the energy sector, the solar sector has faced attacks and interference, too.
In 2023, a group of Romanian solar customers modified mandatory inverter settings - which convert DC electricity generated by panels into the AC electricity used by homes - to disable the voltage-active power function. 
This function is required by the grid operators to reduce active power at high grid voltage, in order to keep the power system running efficiently and safely. 
Modifying this grid support function enabled the customers to make more money by not limiting their solar systems during high-voltage events, potentially jeopardising grid integrity as a result.
In a more pernicious incident, pro-Russian hacktivist group Just Evil stole credentials for 22 client sites in Lithuania and posted them on the Dark Web last year. This opened up access to the management portal of these solar sites, although access was not used to carry out further attacks on that occasion. 
Analysing risk, the report found that these large utility-scale solar installations are more secure, since they are often managed by experienced utilities and covered by the EU’s Network and Information Security (NIS2) Directive.
Small-scale solar systems, meanwhile, which are often rooftop installations on people’s homes or businesses, lack strict cyber rules. They are connected to the clouds of manufacturers, installers, or service providers. 
And while the impact of compromising a single installation is low, when grouped together for power system efficiency, they become virtual power plants of significant scale.
10 notes · View notes
111-111h · 9 months ago
Text
The picture above is a hidden camera that I found in my bathroom. The police are involved. The government is involved. Soul tribe. GOD I know you are watching. Please show me what to do next. Please help me 🙏 I know in my heart I wasn't sent here to be a victim.
4 notes · View notes
megayogiposts · 7 months ago
Text
Second Appeal for Cyber Fraud Case in UP
Welcome : UPICR20240000149Registration Number : A-20240701960File Number : S09/A/1321/2024 UTTAR PRADESH INFORMATION COMMISSIONDiary Number – D-031220240057Citizen DetailsName Yogi M P SinghMobile Number 7379105911Email [email protected] सुरेकापुरम कॉलोनी जबलपुर रोड मिर्जापुर सिटीPublic Information Officer DetailsPIO Sri OMPRAKASH SINGHAddress नाम :Sri OMPRAKASH SINGH,पता : Public…
6 notes · View notes
Text
“ooh you hate cops but who are you gonna call when you get robbed?"
After I do my insurance claim I’m calling my best friend to bitch about it. That’s a better way to spend my time than cop.
"ooh you hate cops but who are you gonna call when you get robbed?" uhhhhh your moms house? a great tragedy has befallen me and i need to have sex immediately
119K notes · View notes
zentarablog · 9 days ago
Text
The FBI: 10 Facts About America's Premier Law Enforcement Agency
The Federal Bureau of Investigation (FBI) stands as one of the most recognizable and formidable law enforcement agencies in the world. Operating under the umbrella of the U.S. Department of Justice, the FBI’s mission is sprawling and complex: to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States,…
1 note · View note
traeuthaeou · 18 days ago
Text
intelligence Agencies secured
1 note · View note
jsrvanna · 5 months ago
Text
Bharat Dynamics Limited (BDL) Recruitment 2025
January 31, 2025 Bharat Dynamics Limited (BDL) Recruitment 2025 is a Miniratna Category-I Public Sector Enterprise under the Ministry of Defence, Government of India. BDL has invited applications from eligible candidates for multiple positions in various disciplines. Important Post: Broadcast Engineering Consultants India Limited (BECIL) Recruitment 2025 Total Vacancies: 49 Job Post: Multiple…
0 notes
nationallawreview · 7 months ago
Text
Public Urged to Use Encryption for Mobile Phone Messaging and Calls
On December 4, 2024, four of the five members of the Five Eyes intelligence-sharing group (the United States, Australia, Canada, and New Zealand) law enforcement and cyber security agencies (Agencies) published a joint guide for network engineers, defenders of communications infrastructure and organizations with on-premises enterprise equipment (the Guide). The Agencies strongly encourage…
1 note · View note
cybercrimeadvocate · 9 months ago
Text
1 note · View note
detective-jellyfish · 2 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
˙ . ꒷ 🪼 . 𖦹˙— Cyber harassment; 01/??
The term "Cyber harassment" describes a type of harassment that occurs online. Cyber harassment causes severe anxiety, severe depression, PTSD (Post-Traumatic Stress Disorder) symptoms, social withdrawal and increases the risks of self harm. Victims often are dismissed because their situation is usually brushed off as "internet drama". /srs
Cyber harassment is considered a crime in several countries, where fines or jail time can be applied to the perpetrators, depending on the country's legislation. /srs
We firmly condemn cyber harassment in any way, shape or form. /srs
The following images are evidence of these people willingly engaging in cyber harassment. Viewer discretion is advised because some of these individuals have an hostile online behavior. If you happen to see any of these posts, or if you happen to see these blogs, report and block. /srs
Tumblr media Tumblr media Tumblr media
Tumblr media Tumblr media
The owner of the blog @/syltheanti is a minor. His online behavior has reached a certain point where he is literally just a police report of being registered as a felon (cyber harassment is considered a felony in several countries), and getting his parents or legal guardians notified of his online behavior. We firmly recommend you to not interact with this individual at all, due to his hostile behavior. Report and block him. /neu
These screenshots are irrefutable proof that the user @/syltheanti willingly engages in cyber harassment and even defends people who also engage in it. The user @/kittizclouwdz , who actually goes by @/anti-rq-kitty , is known for engaging in targeted cyber harassment just like Syl. One of her most infamous moments was when she sent over 100 messages to the user @proship-froggo . You can find evidence of this in their blog. /neu
All the posts attached were uploaded on April 19th, 2025. /neu
7 notes · View notes
rightnewshindi · 10 months ago
Text
शातिरों ने 'कौन बनेगा करोड़पति' के नाम पर युवक से ठगे 11 लाख रुपए, फेसबुक लिंक से वारदात को दिया अंजाम
Hamirpur News: हिमाचल प्रदेश के हमीरपुर (Hamirpur) में एक युवक के साथ बेहद शातिर अंदाज में ठगी कर ली गई. यह मामला ख्याह गांव का है. यहां युवक से ‘कौन बनेगा करोड़पति’ में साढ़े आठ लाख के कैश प्राइज के नाम पर 11 लाख की ठगी हो गई. इस मामले की शिकायत पीड़ित ने पुलिस से की. पुलिस ने केस दर्ज कर मामले की जांच शुरू कर दी है. जानकारी के अनुसार, पीड़ित युवक हमीरपुर के ख्याह गांव का रहने वाला है, जो…
0 notes
touchaheartnews · 1 year ago
Text
Moruf Oseni's Wema Bank in Trouble, Faces Multi-million Naira Penalties For Violating Nigerian Cyber security Laws
  A recent investigative report obtained by this Touchaheart Nigeria has shed light on WEMA Bank’s legal entanglements in 2023, with the financial institution facing penalties totaling N61.350 million for contravening seven Nigerian laws within a single year.   The revelations surfaced from WEMA Bank’s comprehensive financial statement for the fiscal year 2023, which unveiled a series of legal…
Tumblr media
View On WordPress
0 notes
arthrussell · 1 year ago
Text
সাইবার নিরাপত্তা আইন
P.C. – Collected from CIRT ডিজিটাল বা ইলেকট্রনিক মাধ্যমে সংঘটিত সাইবার অপরাধ (Cyber Crime) দমন ও প্রতিরোধের উদ্দেশ্যে বাংলাদেশ সরকার বহুল বিতর্কিত ডিজিটাল নিরাপত্তা আইন, ২০১৮ রদ করে সাইবার নিরাপত্তা আইন, ২০২৩ নামে একটি নতুন আইন প্রণয়ন করেন। সাইবার নিরাপত্তা আইনের সংজ্ঞানুসারে, “সাইবার নিরাপত্তা” অর্থ দ্বারা কোনো ডিজিটাল ডিভাইস, কম্পিউটার বা কম্পিউটার সিস্টেম এর নিরাপত্তাকে বোঝানো হয়েছে। সাইবার…
Tumblr media
View On WordPress
0 notes
artisticdivasworld · 1 year ago
Text
How to Protect Your Business From Cyber Threats
Cybersecurity is a major topic every business owner should be discussing. Here is some info from FRC that we hope helps.
Imagine we’re sitting down over a cup of coffee, and you’ve just asked me how to shield your trucking business from the ever-looming shadow of cyber threats. It’s a digital age dilemma, but I’m here to walk you through some straightforward strategies to bolster your defenses. First off, let’s talk about the elephant in the room: cyber threats. They’re not just a problem for the tech industry;…
Tumblr media
View On WordPress
1 note · View note
margaret-mead · 1 year ago
Text
The Crucial Importance of Network Traffic Classification for Optimizing Connectivity
Greetings from Solana Networks, the leading source for state-of-the-art Network Traffic Classification solutions. With the ability to discern between dangerous and benign actions, our sophisticated algorithms carefully examine data flows and provide organisations with insights never before possible. We ensure optimal performance and security by decoding complex network behaviours with our cutting-edge technologies. Solana Networks offers customised solutions that are suited to your requirements, whether your goals are seamless network management, threat detection, or compliance adherence. Put your trust in our experience to protect your digital infrastructure from changing threats, increase productivity, and streamline operations. With Solana Networks, discover the possibilities of network intelligence in the future.
Phone: 613-596-2557
0 notes