Latest Activity

NADIM AHAMAD KHAN posted an event

hort Term Course on Koha and DSpace at Central Library deen dayal upadhyaya Gorakhpur University

April 30, 2026 to May 6, 2026
yesterday
Dr. Sandip Pathak posted an event
Thumbnail

13th Convention Planner 2026 at Gauhati University,  Guwahati, Assam.

September 18, 2026 at 9am to September 20, 2026 at 7pm
yesterday
Profile IconKannan G, Otturu pedapapaiah, Ardas Singh and 6 more joined LIS Links
yesterday
Sanjana saini and Akshay Subhash Gadade are now friends
Saturday
Dr. U. PRAMANATHAN replied to Dr. U. PRAMANATHAN's discussion Call for Book Chapters: Digital Leadership in Library & Information Centers (Innovative Strategies in Library Management) by Ess Ess Publications.
Friday
Dr.Rajeshwar kumar G replied to Dr. U. PRAMANATHAN's discussion Call for Book Chapters: Digital Leadership in Library & Information Centers (Innovative Strategies in Library Management) by Ess Ess Publications.
Friday
Arunima Giri might attend Dr. U. PRAMANATHAN's event
Friday
Shruthi updated their profile
Apr 23
Mahesh B. updated their profile
Apr 21
Akshay Subhash Gadade joined Dr. Badan Barman's group
Apr 20
Dr. U. PRAMANATHAN posted blog posts
Apr 20
K Chiyuh commented on Hema Thakur's event 'One Day National Seminar on the Future of Libraries in the Era of Artificial Intelligence'
Apr 20
K Chiyuh might attend Hema Thakur's event
Apr 20
Mr.Vipul Kumar updated their profile
Apr 19
Mr.Vipul Kumar shared a profile on Facebook
Apr 19
Profile IconUmasankar mahata, Nikita Medhi, Prohlad Basumatary and 81 more joined LIS Links
Apr 19
Dr. SUDHI S VIJAYAN posted a discussion
Apr 19
Kanika sharma is now friends with Ramesh Kumar and Deepak Sharma
Apr 19
Oriental Library Association shared their discussion on Facebook
Apr 16
Sumit Sundar Ray updated their profile
Apr 15

There are some of cyber threat incidents in library, which through my lis/facebook friends have been sent to me and some are available on the net. These shows either the computer of the library are hacked or the computer is used for illegal criminal activities.

Some Case Study & Scenerion

  • The Library of Congress is the world's largest Library, archiving millions of books,  photographs, maps and recordings. U.S. officials have previously said many attempts to penetrate its networks appear to come from China.
  • Every year, hackers steal enough data from U.S. government agencies, businesses and universities to fill the U.S. Library of Congress many times over, officials say. (Lockheed Martin, Pentagon's officials)

  • "Investigators tracing the activities of the hijackers determined that, on four occasions in August of 2001, individuals using internet accounts registered to Nawaf Al Hazmi and Khalid Al Mihdar - 9/11 hijackers - used public access computers in the library of a state college in New Jersey, He testified that computers in the library were used to review and order airline tickets on an internet travel reservations site. " (Ken Wainstein, US attorney for the District of Columbia)
  • A  man charged with conspiring to provide material support to terrorists claims that the FBI obtained evidence against him illegally when an agent went into the Chestatee Regional Library in Dawsonville, Georgia, to record his activities at a library computer. that “public libraries are not safe havens for terrorist-related activity,” (U.S. Attorney David Nahmias)
  • Crime and misdemeanours affect every type of library and information service and the staff who work in them. Vandalism, mutilation, defacement, theft, abuse, harassment, violence, arson and other criminal activities need to be confronted, measured and understood by today's librarians and information scientists.  (Michael Chaney, Ed. Security and Crime Prevention in Libraries)
  •  
    A man, 21, was seen acting suspiciously while using the internet at Rouse Hill Public Library. The man again entered the library to use its computers and police said he accessed a number of chat rooms to view, download and distribute child abuse images. Hills police arrested the man on Saturday at his place of work in Rouse Hill. A search warrant was executed at the man’s Rouse Hill home and a number of items were seized by police.

  • The man was taken to Castle Hill Police Station where he was charged with nine offences, including six counts of possess/distribute child pornography and three counts of use carriage service to access child pornography.

  • This is unbelievable.  In a nutshell, London Ontario's Central Library had a patron arrested for viewing child Pornography.  As a result it applied Internet filters.  But empty legal threats were made, so the Library "quietly removed" the filters.  Result?  Another patron arrested for the exact same reason.

  • A 17-year-old boy, arrested for allegedly creating a fake profile through library’s computer of the chief minister on the social-networking site, Facebook, The boy posted cartoons and objectionable photographs featuring several senior politicians using  the same profile.
  • A Norwegian museum is desperately seeking the services of a hacker after the only person who knew the password protecting its electronic library died. The creator of the library developed a catalogue of 1,600 books and documents before he passed away. Ottar Grepstad, the museum's director, sent out an appeal on national radio for hackers to help museum employees access the valuable information. The Norway Post claims the museum has already been contacted by several hackers. The hackers' CVs are being sorted to find the most likely candidates to crack the password.
  • There are fears that personal bank details may have been stolen after ‘snooping devices’ were found plugged into public computers at libraries in Wilmslow. Police after the little appliances were spotted attached to keyboard
    sockets at the back of two machines in Wilmslow and Handforth libraries. it is not known how long they had been there. It is now dire people may have had details of their bank accounts, passwords and other personal selective
    information stolen. They are fundamentally a fraud device and have been applied in a good deal of massive frauds before." (Nathan Evans, manager of Fathom IT in Wilmslow)

           Kindly give your suggetions on faridbazmi@rediffmail .










Views: 172

Reply to This

© 2026   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

LIS Links whatsApp