A story is told of an emperor who allowed himself to be dressed in the finest suit which he had been told was “invisible because of its special capabilities.”
In his special suit, he held a procession through town, never admitting the he was foolish to walk naked. He was afraid that people would think that he is stupid.
The story goes on that “all the town’s people wildly praised the ‘magnificent clothes of the emperor,’ afraid to admit that they could not see them, until a child said: “But he has nothing on.”
“This was whispered from person to person until everyone in the crowd was shouting that the emperor had nothing on. The emperor heard it, and felt that they were correct, but held his head high until he finished the procession.”
Many internet users in Uganda are not any different from the proverbial emperor. Whether you access Internet from your private device, mobile phone or other or office computer, you are exposed to cyber criminals.
If your child accesses Internet via your phone or home computer, they could be in danger. Child pornography is arguably one of the worst types of internet crime in Uganda.
According to the 2012 Uganda Police Annual Crime and Road safety Report, of the 60 cybercrime cases reported and investigated, a total of 1.5 billion was lost through attack vectors like social engineering and fishing to obtain victims’ identities which were then used to hack into victim emails and social network profiles.
The problem is too big to ignore when it comes to the youth. Many schools now boast of state of the art computer labs with internet access.
Lack of education
However, the lack of clear education about the dangers of internet pornography and online safety continues to expose children to the huge dark industry of on-line pornography.
A person operating cybercrime ring in Asia or Eastern Europe may befriend a Ugandan child found online using any social engineering and online search tools.
Once a target is identified, trust is established, thereafter the child may be “poisoned” to the extent of posing while naked and even uploading personal videos in awkward situations.
Once submitted, such videos and photos are put up for sale on membership pornographic sites. In addition to privacy concerns, the victim may be found by friends or family on such sites which has a lifetime psychological torture and kills self-confidence.
For some, it could be used to obtain a ransom, if one is known to be of a certain social standing. Most Victims in Uganda prefer to suffer silently. This could be partly attributed to the fact that there have been limited successes with cases that have been reported or law enforcement does not offer case summaries and successes made on cases handled.
Even if they reported, the logistics involved in investigating such crimes are enormous. The exact location of the suspects is not clear. Different countries have different cyber laws, let alone extradition of such criminals is near to impossible, if not impossible even with international support.
There is no one who is safe as long as their systems can be accessed via a network, specifically the internet.