Technological Development and Human Rights Violations under the Name of National Security

The Purpose of This Blog:
People’s privacy should be regarded as one of the most fundamental human rights. However, violation of privacy under the name of national security has caused a serious threat to democracy in many countries. In fact, due to recent technological development, many human rights activists may be under a constant threat of privacy-theft by the people in power who try to manipulate and/or oppress humanistic activities.
Moreover, instead of overt violence as seen in Mahatma Gandhi’s lifetime, nowadays in many countries the governments apparently use covert harassmenttechniques so the governments can torture them leaving little physical evidence and make the victims’ claims look like paranoiac delusion. In fact, there are several NPO’s and websites which revealed the cases of the victims who were forcedly institutionalized when they protested. For this reason, quite a few technologies are said to remain classified such as brainwave detectors combined with GPS and electromagnetic weapons as if such technologies did not exist so the government could use them monopolizedly, and not to mention, covertly.
Therefore, I would like to share as much true information as possible through social media –including this blog–concerning the recent rapid development in surveillance technologies , because the main stream media would usually avoid reporting these facts for their self-interest. Furthermore, I would like to have discussions on this blog particularly about “individual’s privacy and the state,” which is supposed to be concerned with everyone of us. Accordingly, the readers’ feedbacks will be appreciated.

Plans for Activities via social media:
• Sharing related articles from the database blog: Unprecedented Human Rights Violations.

• Providing a mini-presentation and discussing the topic in Twitter
• Interviewing representatives of human rights organizations (“Mind Justice” “Freedom From Covert Harassment and Surveillance” etc.)

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s