<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Insights Archives - Akancha Srivastava Foundation</title>
	<atom:link href="https://akanchasrivastava.org/cyber-insights-asf/feed/" rel="self" type="application/rss+xml" />
	<link>https://akanchasrivastava.org/cyber-insights-asf/</link>
	<description>India&#039;s Largest Social Impact Initiative For Cyber Safety</description>
	<lastBuildDate>Mon, 16 Mar 2026 08:46:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://akanchasrivastava.org/wp-content/uploads/2024/08/cropped-Screenshot-2024-08-01-at-9.47.00 PM-32x32.png</url>
	<title>Cyber Insights Archives - Akancha Srivastava Foundation</title>
	<link>https://akanchasrivastava.org/cyber-insights-asf/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Fake Government Alerts In Crises</title>
		<link>https://akanchasrivastava.org/fake-government-alerts-in-crises/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 08:46:32 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation #CreditCardScam #OnlineFraud #CyberCrime #StaySafe #FinancialScams]]></category>
		<category><![CDATA[#CyberCrimeAwareness]]></category>
		<category><![CDATA[#CyberSafety]]></category>
		<category><![CDATA[#CyberSafety #BusinessSecurity #OnlineFraud #CyberAwareness #DigitalSecurity #AkanchaSrivastavaFoundation #PreventCyberCrime #CyberFraud #PhishingScams]]></category>
		<category><![CDATA[#DigitalSafety]]></category>
		<category><![CDATA[#FakeAlerts]]></category>
		<category><![CDATA[#OnlineFraud]]></category>
		<category><![CDATA[#PhishingScam]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=4141</guid>

					<description><![CDATA[<p>During times of crisis, fear spreads faster than facts. Cybercriminals exploit this moment by circulating fake government alerts that appear urgent and authoritative. Messages claiming curfews, emergency registrations, or sudden security advisories are designed to trigger panic so that people react instantly without verifying the source. These alerts are rarely sent by official authorities. Instead, [...]</p>
<p>The post <a href="https://akanchasrivastava.org/fake-government-alerts-in-crises/">Fake Government Alerts In Crises</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="0" data-end="339">During times of crisis, fear spreads faster than facts. <span id="more-4141"></span>Cybercriminals exploit this moment by circulating fake government alerts that appear urgent and authoritative. Messages claiming curfews, emergency registrations, or sudden security advisories are designed to trigger panic so that people react instantly without verifying the source.</p>
<p data-start="341" data-end="688">These alerts are rarely sent by official authorities. Instead, they usually contain links that redirect users to phishing pages. Once clicked, these pages attempt to collect personal information, banking details, or login credentials. In some cases, they may also install malware on the device, giving attackers long-term access to sensitive data.</p>
<p data-start="690" data-end="1010">The tactic works because crises reduce people’s ability to pause and think. When a message appears to come from a government authority and mentions public safety or emergency restrictions, many people assume it must be legitimate. Cybercriminals rely on this psychological pressure to push victims into clicking quickly.</p>
<p data-start="1012" data-end="1333">In reality, official government emergency alerts follow very clear communication channels. They are typically issued through verified government websites, official apps, or authenticated social media accounts. Legitimate alerts do not ask citizens to submit passwords, OTPs, or financial information through random links.</p>
<p data-start="1335" data-end="1627">The safest response to any emergency message is verification. Instead of clicking the link in the message, check the announcement directly through official government websites or verified authority accounts. Taking a few seconds to verify can prevent serious financial loss or identity theft.</p>
<p data-start="1629" data-end="1865" data-is-last-node="" data-is-only-node="">Crises test not only public safety systems but also digital awareness. Staying calm, verifying information, and refusing to react impulsively are the most effective defenses against cybercriminals who attempt to exploit moments of fear.</p>
<p>The post <a href="https://akanchasrivastava.org/fake-government-alerts-in-crises/">Fake Government Alerts In Crises</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>War-Time Digital Responsibility</title>
		<link>https://akanchasrivastava.org/war-time-digital-responsibility/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 06:48:28 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#CyberSafety]]></category>
		<category><![CDATA[#DigitalResponsibility]]></category>
		<category><![CDATA[#NationalSecurity]]></category>
		<category><![CDATA[#OnlineSafety]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=4133</guid>

					<description><![CDATA[<p>What You Must Not Share Online In times of conflict, misinformation spreads faster than missiles. One careless post can compromise safety, fuel panic, or aid hostile actors. Digital discipline is national responsibility. What Must NOT Be Shared • Real-time troop movement, defence locations, airport activity, or security deployment visuals• Videos of missile interceptions, impact sites, [...]</p>
<p>The post <a href="https://akanchasrivastava.org/war-time-digital-responsibility/">War-Time Digital Responsibility</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What You Must Not Share Online<span id="more-4133"></span></p>
<p data-start="69" data-end="258">In times of conflict, misinformation spreads faster than missiles. One careless post can compromise safety, fuel panic, or aid hostile actors. Digital discipline is national responsibility.</p>
<p data-start="260" data-end="287"><strong data-start="260" data-end="287">What Must NOT Be Shared</strong></p>
<p data-start="289" data-end="701">• Real-time troop movement, defence locations, airport activity, or security deployment visuals<br data-start="384" data-end="387" />• Videos of missile interceptions, impact sites, or live strategic responses<br data-start="463" data-end="466" />• Forwarded “breaking news” without official verification<br data-start="523" data-end="526" />• Casualty numbers, damage estimates, or unverified claims<br data-start="584" data-end="587" />• Screenshots of private government advisories<br data-start="633" data-end="636" />• Personal data of armed forces personnel or security officials</p>
<p data-start="703" data-end="787">Even seemingly harmless content can reveal patterns, locations, or operational gaps.</p>
<p data-start="789" data-end="814"><strong data-start="789" data-end="814">What You SHOULD Share</strong></p>
<p data-start="816" data-end="1015">• Official advisories from verified government channels<br data-start="871" data-end="874" />• Emergency helplines and safety protocols<br data-start="916" data-end="919" />• Verified humanitarian support resources<br data-start="960" data-end="963" />• Public safety instructions issued by authorities</p>
<p data-start="1017" data-end="1073">Always cross-check with official sources before posting.</p>
<p data-start="1005" data-end="1040"><strong data-start="1005" data-end="1040">Before Posting, Apply 3 Filters</strong></p>
<ol data-start="1042" data-end="1198">
<li data-start="1042" data-end="1091">
<p data-start="1045" data-end="1091">Is this verified through an official source?</p>
</li>
<li data-start="1092" data-end="1154">
<p data-start="1095" data-end="1154">Could this reveal location, timing, or security patterns?</p>
</li>
<li data-start="1155" data-end="1198">
<p data-start="1158" data-end="1198">Does this reduce panic or increase it?</p>
</li>
</ol>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-4135 alignleft" src="https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-300x300.jpg" alt="" width="300" height="300" srcset="https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-300x300.jpg 300w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-1024x1024.jpg 1024w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-285x285.jpg 285w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-768x768.jpg 768w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-1536x1536.jpg 1536w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-175x175.jpg 175w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-450x450.jpg 450w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3-1170x1170.jpg 1170w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-3.jpg 2000w" sizes="(max-width: 300px) 100vw, 300px" /> <img decoding="async" class="alignnone size-medium wp-image-4136" src="https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-300x300.jpg" alt="" width="300" height="300" srcset="https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-300x300.jpg 300w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-1024x1024.jpg 1024w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-285x285.jpg 285w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-768x768.jpg 768w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-1536x1536.jpg 1536w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-175x175.jpg 175w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-450x450.jpg 450w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2-1170x1170.jpg 1170w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-2.jpg 2000w" sizes="(max-width: 300px) 100vw, 300px" /> <img decoding="async" class="size-medium wp-image-4137 alignleft" src="https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-300x300.jpg" alt="" width="300" height="300" srcset="https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-300x300.jpg 300w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-1024x1024.jpg 1024w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-285x285.jpg 285w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-768x768.jpg 768w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-1536x1536.jpg 1536w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-175x175.jpg 175w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-450x450.jpg 450w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4-1170x1170.jpg 1170w, https://akanchasrivastava.org/wp-content/uploads/2026/03/WAR-TIME-4.jpg 2000w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>&nbsp;</p>
<p data-start="1200" data-end="1299">In wartime, silence on sensitive matters protects lives.<br data-start="1256" data-end="1259" />Responsible posting is national service.</p>
<p data-start="1263" data-end="1407">During conflict, digital silence on sensitive matters is strength, not weakness.<br data-start="1343" data-end="1346" />National security begins with personal responsibility online.</p>
<p data-start="1409" data-end="1454">Stay Aware, Stay Safe. Jai Hind, Jai Bharat</p>
<p>The post <a href="https://akanchasrivastava.org/war-time-digital-responsibility/">War-Time Digital Responsibility</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deepfake Voice Scams: When Your Child’s Voice Calls You for Money</title>
		<link>https://akanchasrivastava.org/deepfake-voice-scams-when-your-childs-voice-calls-you-for-money/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 10:24:04 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#ChildSafetyOnline]]></category>
		<category><![CDATA[#CyberSafety]]></category>
		<category><![CDATA[#DeepfakeScam]]></category>
		<category><![CDATA[#DigitalExtortion]]></category>
		<category><![CDATA[#VoiceCloningFraud]]></category>
		<category><![CDATA[#WomenAndChildrenSafety]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=4090</guid>

					<description><![CDATA[<p>A mother receives a call&#8230;She hears her child crying.“Mom, please help me. I am in trouble.” The voice sounds real. The panic sounds real. The urgency feels real. It is not real. AI powered voice cloning is now being used to execute emotional extortion scams. Criminals scrape short audio clips from social media, school events, [...]</p>
<p>The post <a href="https://akanchasrivastava.org/deepfake-voice-scams-when-your-childs-voice-calls-you-for-money/">Deepfake Voice Scams: When Your Child’s Voice Calls You for Money</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="69" data-end="168">A mother receives a call&#8230;<span id="more-4090"></span><br data-start="94" data-end="97" />She hears her child crying.<br data-start="124" data-end="127" />“Mom, please help me. I am in trouble.”</p>
<p data-start="170" data-end="241">The voice sounds real. The panic sounds real. The urgency feels real.</p>
<p data-start="243" data-end="260">It is not real.</p>
<p data-start="262" data-end="562">AI powered voice cloning is now being used to execute emotional extortion scams. Criminals scrape short audio clips from social media, school events, public videos, or even background recordings. With seconds of usable voice data, software can replicate tone, pitch, and speech patterns convincingly.</p>
<p data-start="564" data-end="585">The scam is simple.</p>
<p data-start="587" data-end="846">A parent receives a call claiming their child has been kidnapped, arrested, injured, or in an accident. A second voice joins the call, posing as law enforcement or a hospital official. Immediate payment is demanded. The parent is instructed not to disconnect.</p>
<p data-start="848" data-end="924">The attack does not rely on technical hacking. It relies on emotional shock.</p>
<p data-start="926" data-end="950">Why This Is Escalating</p>
<p data-start="952" data-end="1116">Families are sharing more online than ever before. Birthdays, school functions, travel videos, casual conversations. Every public audio clip becomes raw material.</p>
<p data-start="1118" data-end="1261">AI tools that once required advanced skill are now commercially accessible. The barrier to entry has dropped. The sophistication has increased.</p>
<p data-start="1263" data-end="1322">The result is targeted psychological manipulation at scale.</p>
<p data-start="1324" data-end="1342">What You Must Do</p>
<p data-start="1344" data-end="1461">Keep children’s videos and audio private wherever possible. Avoid public accounts sharing identifiable voice clips.</p>
<p data-start="1463" data-end="1564">Establish a family verification code. If anyone calls in distress, demand the code before reacting.</p>
<p data-start="1566" data-end="1684">Never transfer money under emotional pressure. Disconnect and directly call the family member on their known number.</p>
<p data-start="1686" data-end="1780">Report such incidents immediately to local authorities. Documentation helps pattern detection.</p>
<p data-start="1782" data-end="1846">Deepfake voice scams are not a future threat. They are active.</p>
<p data-start="1848" data-end="1903">Technology is advancing. Awareness must advance faster.</p>
<p data-start="1905" data-end="1941">Stay Aware, Stay Safe!<br data-start="1927" data-end="1930" />Jai Hind!</p>
<p>The post <a href="https://akanchasrivastava.org/deepfake-voice-scams-when-your-childs-voice-calls-you-for-money/">Deepfake Voice Scams: When Your Child’s Voice Calls You for Money</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero Click Cybercrime: How Everyday Convenience Is Becoming a Silent Threat</title>
		<link>https://akanchasrivastava.org/zero-click-cybercrime-how-everyday-convenience-is-becoming-a-silent-threat/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Wed, 18 Feb 2026 09:05:05 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberSafety]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#PublicWiFiSecurity]]></category>
		<category><![CDATA[#QRFraud]]></category>
		<category><![CDATA[#SmartCityThreats]]></category>
		<category><![CDATA[#ZeroClickAttack]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=4087</guid>

					<description><![CDATA[<p>We are scanning everything. We are scanning everything.Restaurant menus. Parking meters. Event entries. Courier deliveries. Apartment access. We are connecting everywhere.Airports. Malls. Hotels. Cafés. And we believe this is progress. Here is the uncomfortable truth. The very systems built for convenience are now being quietly exploited. Zero click cybercrime does not look dramatic. There is [...]</p>
<p>The post <a href="https://akanchasrivastava.org/zero-click-cybercrime-how-everyday-convenience-is-becoming-a-silent-threat/">Zero Click Cybercrime: How Everyday Convenience Is Becoming a Silent Threat</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="63" data-end="181">We are scanning everything.<span id="more-4087"></span></p>
<p data-start="63" data-end="181">We are scanning everything.<br data-start="90" data-end="93" />Restaurant menus. Parking meters. Event entries. Courier deliveries. Apartment access.</p>
<p data-start="183" data-end="248">We are connecting everywhere.<br data-start="212" data-end="215" />Airports. Malls. Hotels. Cafés.</p>
<p data-start="250" data-end="284">And we believe this is progress.</p>
<p data-start="286" data-end="390">Here is the uncomfortable truth. The very systems built for convenience are now being quietly exploited.</p>
<p data-start="392" data-end="571">Zero click cybercrime does not look dramatic. There is no suspicious email. No strange attachment. No obvious red flag. You scan. You tap. You connect. The damage is already done.</p>
<p data-start="573" data-end="612">QR Codes Are the New Phishing Gateway</p>
<p data-start="614" data-end="925">QR codes are everywhere across smart cities. Criminals place fake stickers over original codes or circulate malicious digital QR links. You believe you are paying for parking or accessing a menu. Instead, you are redirected to a cloned payment page designed to capture your banking credentials or identity data.</p>
<p data-start="927" data-end="946">It takes seconds.</p>
<p data-start="948" data-end="977">Public WiFi Is Not Harmless</p>
<p data-start="979" data-end="1209">Open networks in airports and hotels are prime interception zones. Rogue networks are created with familiar names. Once connected, login credentials, email access, and corporate data can be harvested without the user realizing it.</p>
<p data-start="1211" data-end="1268">One compromised device can expose an entire organization.</p>
<p data-start="1270" data-end="1297">NFC and Contactless Risks</p>
<p data-start="1299" data-end="1554">Tap based systems are expanding rapidly. Payments. Access cards. Digital business cards. While many platforms are encrypted, weak configurations and relay attacks remain real threats. The more connected a city becomes, the larger the attack surface grows.</p>
<p data-start="1556" data-end="1580">Why This Is Escalating</p>
<p data-start="1582" data-end="1709">Smart infrastructure is expanding faster than public awareness. People trust what looks official. Criminals exploit that trust.</p>
<p data-start="1711" data-end="1782">The attack does not begin with hacking. It begins with normal behavior.</p>
<p data-start="1784" data-end="1802">What You Must Do</p>
<p data-start="1804" data-end="1888">Physically inspect QR codes before scanning. If it looks pasted over, do not scan.</p>
<p data-start="1890" data-end="1984">Avoid financial transactions on public WiFi. Use your mobile hotspot for anything sensitive.</p>
<p data-start="1986" data-end="2069">Turn off automatic WiFi and Bluetooth connections. Disable NFC when not required.</p>
<p data-start="2071" data-end="2139">Keep devices updated. Security patches close real vulnerabilities.</p>
<p data-start="2141" data-end="2268">Organizations must include QR fraud and contactless exploitation in their cyber awareness training. This is no longer optional.</p>
<p data-start="2270" data-end="2329">Digital convenience is here to stay. Blind trust cannot be.</p>
<p data-start="2331" data-end="2367">Stay Aware, Stay Safe!<br data-start="2353" data-end="2356" />Jai Hind!</p>
<p>The post <a href="https://akanchasrivastava.org/zero-click-cybercrime-how-everyday-convenience-is-becoming-a-silent-threat/">Zero Click Cybercrime: How Everyday Convenience Is Becoming a Silent Threat</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Social Media Fuels Holiday Depression!</title>
		<link>https://akanchasrivastava.org/social-media-fuels-holiday-depression/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 09:55:13 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#CyberSafety]]></category>
		<category><![CDATA[#DigitalWellbeing]]></category>
		<category><![CDATA[#EmotionalHealth]]></category>
		<category><![CDATA[#MentalHealthAwareness]]></category>
		<category><![CDATA[#OnlineSafety]]></category>
		<category><![CDATA[#SocialMediaImpact]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=4047</guid>

					<description><![CDATA[<p>Holiday Depression is real The holiday season consistently shows a rise in emotional distress. This is not incidental. It is directly linked to how people consume digital content during this period. Social media becomes a highlight reel of curated happiness, success, relationships, and celebration. For many, this comparison quietly amplifies sadness. People scroll through images [...]</p>
<p>The post <a href="https://akanchasrivastava.org/social-media-fuels-holiday-depression/">Social Media Fuels Holiday Depression!</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Holiday Depression is real<span id="more-4047"></span></p>
<p data-start="274" data-end="599">The holiday season consistently shows a rise in emotional distress. This is not incidental. It is directly linked to how people consume digital content during this period. Social media becomes a highlight reel of curated happiness, success, relationships, and celebration. For many, this comparison quietly amplifies sadness.</p>
<p data-start="601" data-end="947">People scroll through images of perfect families, exotic holidays, expensive gifts, and smiling faces. What remains unseen are the filters, the staging, and the emotional realities behind those frames. Constant exposure to these visuals creates a false benchmark. Individuals begin questioning their own lives, progress, relationships, and worth.</p>
<p data-start="949" data-end="1300">This comparison culture is not harmless. It affects self esteem, sleep, focus, and emotional stability. During the holidays, when people are already reflecting on the year gone by, digital comparison intensifies feelings of inadequacy and isolation. The brain does not distinguish between curated content and reality. It absorbs and internalizes both.</p>
<p data-start="1302" data-end="1637">At Akancha Srivastava Foundation, we consistently highlight that excessive social media consumption impacts mental health. The holiday season demands even greater discipline. Reducing screen time is not withdrawal. It is self protection. Limiting exposure to triggering content allows space for clarity, rest, and emotional regulation.</p>
<p data-start="1639" data-end="1935">This time also calls for returning to offline anchors. Hobbies that require presence. Activities that engage the mind and body. Reading, walking, creating, learning. These are not distractions. They are stabilizers. They help rebuild a sense of control and purpose that constant scrolling erodes.</p>
<p data-start="1937" data-end="2225">Equally important is checking on people beyond social media interactions. A message, a call, a genuine conversation. Many struggle silently. Digital silence does not mean emotional stability. Awareness, empathy, and attentiveness are core pillars of cyber safety and emotional resilience.</p>
<p data-start="2227" data-end="2473">The holidays are not a competition. They are a period that requires balance, boundaries, and responsibility in how we engage online. Mental health protection begins with conscious digital behavior. That awareness is not seasonal. It is essential.</p>
<p>The post <a href="https://akanchasrivastava.org/social-media-fuels-holiday-depression/">Social Media Fuels Holiday Depression!</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Snapchat Roundtable On Safer Digital Spaces</title>
		<link>https://akanchasrivastava.org/snapchat-roundtable-on-safer-digital-spaces/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 09:40:25 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation #CyberSafety #DataPrivacy #AIEthics #OnlineSecurity #ProtectYourData #DigitalAwareness #PrivacyMatters #ThinkBeforeYouShare #AIandPrivacy #GhibliTrend]]></category>
		<category><![CDATA[#ChildProtection]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberSafety]]></category>
		<category><![CDATA[#DigitalRights]]></category>
		<category><![CDATA[#DigitalWellbeing]]></category>
		<category><![CDATA[#OnlineSafetyIndia]]></category>
		<category><![CDATA[#SafeInternet]]></category>
		<category><![CDATA[#YouthSafety]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=4021</guid>

					<description><![CDATA[<p>Our Founder shares insights from a recent event I participated in a well curated Listening Roundtable hosted by Snap Inc. in partnership with Young Leaders for Active Citizenship in Mumbai. The discussion focused on how teenagers use social media, their consumption patterns, safety frameworks, reporting mechanisms, and concrete steps to strengthen digital safeguards. The curation [...]</p>
<p>The post <a href="https://akanchasrivastava.org/snapchat-roundtable-on-safer-digital-spaces/">Snapchat Roundtable On Safer Digital Spaces</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our Founder shares insights from a recent event<span id="more-4021"></span></p>
<p data-start="149" data-end="617">I participated in a well curated Listening Roundtable hosted by Snap Inc. in partnership with Young Leaders for Active Citizenship in Mumbai. The discussion focused on how teenagers use social media, their consumption patterns, safety frameworks, reporting mechanisms, and concrete steps to strengthen digital safeguards. The curation was thoughtful and deliberate, bringing together experts from education, mental health, child rights, technology, and digital policy.</p>
<p data-start="619" data-end="1041">There was a clear openness to meaningful dialogue. Stakeholders from diverse backgrounds engaged with sincerity, listened carefully to concerns, and demonstrated a firm intent to strengthen safety practices. The presence of teenagers added essential perspective. Their clarity and candour grounded the conversation in real lived experiences, reinforcing the urgency of building systems that genuinely work for young users.</p>
<p data-start="1043" data-end="1750">I was assigned the table on When Digital Connections Hurt. This subject sits at the core of our work at the Akancha Srivastava Foundation, where we have trained millions across the country on cyber safety, digital resilience, and harm prevention. Our experience of working closely with law enforcement across India and handling case studies first hand strengthens our understanding of how these harms unfold in real scenarios and what robust interventions are required. Our discussion covered sexting, child grooming, cyber bullying, transparency in reporting processes, and the operational accountability needed to ensure that young people receive timely and effective support when they reach out for help.</p>
<p data-start="1752" data-end="2174">A platform with the reach and influence of Snapchat is positioned to set powerful benchmarks for youth safety. With the right design interventions, it can educate users at scale and even cultivate digital heroes within its community who champion responsible behaviour, call out harm, and strengthen a culture of awareness. This potential was evident in the constructive spirit with which the company hosted the roundtable.</p>
<p data-start="2176" data-end="2493" data-is-last-node="" data-is-only-node="">Such engagements signal a positive shift toward collaborative safety building. I appreciate the seriousness with which the dialogue was held and look forward to many more forums that bring together young people, experts, and platforms to advance the shared mission of creating safer digital spaces across the country.</p>
<p>The post <a href="https://akanchasrivastava.org/snapchat-roundtable-on-safer-digital-spaces/">Snapchat Roundtable On Safer Digital Spaces</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Brand Credibility In The Age Of Deepfakes</title>
		<link>https://akanchasrivastava.org/protecting-brand-credibility-in-the-age-of-deepfakes/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Wed, 29 Oct 2025 12:44:10 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation #CreditCardScam #OnlineFraud #CyberCrime #StaySafe #FinancialScams]]></category>
		<category><![CDATA[#BrandSecurity]]></category>
		<category><![CDATA[#CyberLeadership]]></category>
		<category><![CDATA[#DeepfakeDefense]]></category>
		<category><![CDATA[#DigitalTrust]]></category>
		<category><![CDATA[#ReputationManagement]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=4000</guid>

					<description><![CDATA[<p>Deepfakes are no longer experimental technology. They are a fully operational threat vector designed to undermine trust, distort reality, and inflict financial and reputational damage. Attackers now deploy synthetic audio and video to impersonate executives, announce fake company decisions, manipulate stock perception, and coerce employees into unauthorized actions. This is corporate sabotage conducted through manufactured [...]</p>
<p>The post <a href="https://akanchasrivastava.org/protecting-brand-credibility-in-the-age-of-deepfakes/">Protecting Brand Credibility In The Age Of Deepfakes</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="54" data-end="494">Deepfakes are no longer experimental technology. <span id="more-4000"></span>They are a fully operational threat vector designed to undermine trust, distort reality, and inflict financial and reputational damage. Attackers now deploy synthetic audio and video to impersonate executives, announce fake company decisions, manipulate stock perception, and coerce employees into unauthorized actions. This is corporate sabotage conducted through manufactured authenticity.</p>
<p data-start="496" data-end="851">Brand credibility has become a security asset. Any organization that believes this is purely a technical risk is already exposed. Deepfake incidents trigger a chain reaction: misinformation gains velocity, media narratives form before facts surface, investor sentiment swings, and internal stakeholders hesitate. The market punishes uncertainty instantly.</p>
<p data-start="853" data-end="902">Mitigating this risk demands institutional rigor:</p>
<ol data-start="904" data-end="1848">
<li data-start="904" data-end="1056">
<p data-start="907" data-end="1056">Verification Protocols<br data-start="929" data-end="932" />Every external communication from leadership must have standardized authentication markers. Ambiguity creates vulnerability.</p>
</li>
<li data-start="1058" data-end="1315">
<p data-start="1061" data-end="1315">Threat Intelligence Integration<br data-start="1092" data-end="1095" />Boards and CISOs must track adversary techniques, understand synthetic media trends, and prepare decision trees for rapid containment. Detection tools are only effective when layered with human-led escalation frameworks.</p>
</li>
<li data-start="1317" data-end="1520">
<p data-start="1320" data-end="1520">Incident Communication Strategy<br data-start="1351" data-end="1354" />Crisis communication must be rehearsed, not improvised. When a deepfake emerges, organizations that respond within minutes retain control of narrative and confidence.</p>
</li>
<li data-start="1522" data-end="1709">
<p data-start="1525" data-end="1709">Employee Conditioning<br data-start="1546" data-end="1549" />Frontline employees are frequent targets. Regular exposure training on deepfake indicators strengthens internal resilience and reduces operational manipulation.</p>
</li>
<li data-start="1711" data-end="1848">
<p data-start="1714" data-end="1848">Legal and Policy Readiness<br data-start="1740" data-end="1743" />Predefined takedown workflows and evidence chains enable swift action across platforms and jurisdictions.</p>
</li>
</ol>
<p data-start="1850" data-end="2084">Reputation is cumulative. Damage is instantaneous. Leaders who proactively institutionalize deepfake defense are not reacting to fear. They are safeguarding the credibility that drives valuation, trust, and long-term market relevance.</p>
<p data-start="2086" data-end="2216" data-is-last-node="" data-is-only-node=""><br data-start="2095" data-end="2098" /></p>
<p>The post <a href="https://akanchasrivastava.org/protecting-brand-credibility-in-the-age-of-deepfakes/">Protecting Brand Credibility In The Age Of Deepfakes</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Read the fine print. Or risk giving it all away.</title>
		<link>https://akanchasrivastava.org/read-the-fine-print-or-risk-giving-it-all-away/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 05:55:03 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation #CyberSafety #DataPrivacy #AIEthics #OnlineSecurity #ProtectYourData #DigitalAwareness #PrivacyMatters #ThinkBeforeYouShare #AIandPrivacy #GhibliTrend]]></category>
		<category><![CDATA[#ContentOwnership]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#DigitalSafety]]></category>
		<category><![CDATA[#IPRights]]></category>
		<category><![CDATA[#ReadTheFinePrint]]></category>
		<category><![CDATA[#WeTransferWarning]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=3937</guid>

					<description><![CDATA[<p>Did you know this? WeTransfer is widely used to send large files quickly, often by professionals and creatives who rely on the platform to transfer sensitive, proprietary, or original content. But buried in the terms most users never read is a clause that quietly gives WeTransfer sweeping rights over your content. If you have ever [...]</p>
<p>The post <a href="https://akanchasrivastava.org/read-the-fine-print-or-risk-giving-it-all-away/">Read the fine print. Or risk giving it all away.</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Did you know this?<span id="more-3937"></span></p>
<p data-start="139" data-end="570">WeTransfer is widely used to send large files quickly, often by professionals and creatives who rely on the platform to transfer sensitive, proprietary, or original content. But buried in the terms most users never read is a clause that quietly gives WeTransfer sweeping rights over your content. If you have ever uploaded intellectual property to the platform, you have likely handed over a lot more than you realized.</p>
<p data-start="139" data-end="570">
<p data-start="572" data-end="999">According to their license terms, once you use their service, you grant WeTransfer a perpetual, worldwide, royalty-free, transferable, sub-licensable license to use your content. That includes rights to reproduce, distribute, modify, prepare derivative works, broadcast, publicly display, and perform your content. In plain terms, they can do almost anything with what you upload, with zero obligation to inform you or pay you.</p>
<p data-start="572" data-end="999">
<p data-start="1001" data-end="1353">This is not just about sending files. This is about content ownership and commercial usage. While you technically retain IP rights, WeTransfer legally gets the ability to leverage your material for operating, developing, and commercializing their services. That includes improving machine learning models, possibly using your data as training material.</p>
<p data-start="1001" data-end="1353">
<p data-start="1355" data-end="1591">There is no ambiguity in the language. The clause states clearly that you are not entitled to any compensation. That means even if your content is used in a way that creates commercial value for the company, you receive nothing from it.</p>
<p data-start="1355" data-end="1591">
<p data-start="1593" data-end="1989">Most users skip over this because no one reads terms and conditions carefully. That is the real risk. In the rush to get work done, we trade control for convenience without understanding the long-term consequences. This is not about paranoia. This is about legal awareness. When you upload original music, artwork, presentations, or manuscripts, you need to know what rights you are handing over.</p>
<p data-start="1593" data-end="1989">
<p data-start="1991" data-end="2194">Data is the new currency. If you are a creator, entrepreneur, or dealing with proprietary material, read the fine print. Know what you are agreeing to. What you ignore can cost you more than you imagine.</p>
<p data-start="1991" data-end="2194">Stay Aware, Stay Safe!<br data-start="2563" data-end="2566" />Jai Hind!</p>
<p>The post <a href="https://akanchasrivastava.org/read-the-fine-print-or-risk-giving-it-all-away/">Read the fine print. Or risk giving it all away.</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How India’s Cyber Risk Landscape Is Evolving in 2025</title>
		<link>https://akanchasrivastava.org/how-indias-cyber-risk-landscape-is-evolving-in-2025/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Thu, 19 Jun 2025 05:51:20 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#AkanchaSrivastava]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation #CyberSafety #DataPrivacy #AIEthics #OnlineSecurity #ProtectYourData #DigitalAwareness #PrivacyMatters #ThinkBeforeYouShare #AIandPrivacy #GhibliTrend]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberRightsIndia]]></category>
		<category><![CDATA[#CyberSafety]]></category>
		<category><![CDATA[#CyberSecurityIndia]]></category>
		<category><![CDATA[#DigitalRiskIndia]]></category>
		<category><![CDATA[#ForensicTraining]]></category>
		<category><![CDATA[#OnlineSafety]]></category>
		<category><![CDATA[#PolicyImpact]]></category>
		<category><![CDATA[#StalkerwareIndia]]></category>
		<category><![CDATA[#TechSafety]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=3914</guid>

					<description><![CDATA[<p>India is facing a significant transformation in its digital environment. As the country moves rapidly toward digitisation across sectors, the nature of cyber risks has evolved just as quickly. What once started with basic phishing and identity theft has now scaled into complex threats involving deepfakes, AI-led social engineering, ransomware targeting critical infrastructure, and systemic [...]</p>
<p>The post <a href="https://akanchasrivastava.org/how-indias-cyber-risk-landscape-is-evolving-in-2025/">How India’s Cyber Risk Landscape Is Evolving in 2025</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>India is facing a significant transformation in its digital environment.<span id="more-3914"></span></p>
<p data-start="214" data-end="652">As the country moves rapidly toward digitisation across sectors, the nature of cyber risks has evolved just as quickly. What once started with basic phishing and identity theft has now scaled into complex threats involving deepfakes, AI-led social engineering, ransomware targeting critical infrastructure, and systemic cyber abuse affecting vulnerable populations.</p>
<p data-start="654" data-end="1281">The sheer volume of users added to the internet every year in India has created an enormous attack surface. As of 2024, India has over <strong data-start="789" data-end="819">918 million internet users</strong>, with mobile data consumption averaging <strong data-start="860" data-end="890">24.1 GB per user per month</strong>. This growth, while empowering, also intensifies risk. In 2023 alone, there were over <strong data-start="977" data-end="1015">1.56 million cybercrime complaints</strong>, with Delhi recording <strong data-start="1038" data-end="1074">755 cases per 100,000 population</strong>, far above the national average of <strong data-start="1110" data-end="1129">129 per 100,000</strong>. Financial frauds have caused cumulative losses of <strong data-start="1181" data-end="1198">₹10,319 crore</strong> since April 2021, but only <strong data-start="1226" data-end="1242">₹1,127 crore</strong> has been recovered—just about <strong data-start="1273" data-end="1280">11%</strong>.</p>
<p data-start="1283" data-end="1555">In this new landscape, cyber threats are no longer just technical challenges. They have become national security concerns, social equity issues, and governance matters. The conversation must shift from just cybersecurity to a deeper, layered understanding of digital risk.</p>
<p data-start="1557" data-end="1986">At the forefront of this change is the urgent need to empower not just law enforcement but also students, entrepreneurs, educators, and administrators with real, actionable awareness. The traditional model of digital training is outdated. Static modules and fear-based messaging have little effect on real-time risk mitigation. Today’s threats demand adaptive, context-sensitive education and strong inter-sectoral collaboration.</p>
<p data-start="1988" data-end="2635">We must also acknowledge that technology abuse is growing rapidly across domestic, professional, and governance spheres. Stalkerware, spyware, data leaks, and coercive surveillance are no longer limited to high-profile targets. They affect students, women, senior citizens, and vulnerable communities at scale. Cybercrimes linked to social media—such as impersonation and harassment—have <strong data-start="2376" data-end="2394">nearly tripled</strong>, rising from <strong data-start="2408" data-end="2451">56,000+ in 2020 to over 156,000 in 2024</strong>. In parallel, high-value frauds over <strong data-start="2489" data-end="2501">₹100,000</strong> have <strong data-start="2507" data-end="2521">quadrupled</strong>, jumping from <strong data-start="2536" data-end="2577">6,699 in FY 2023 to 29,082 in FY 2024</strong>, with total losses around <strong data-start="2604" data-end="2634">₹177.7 crore ($20 million)</strong>.</p>
<p data-start="2637" data-end="2973">India&#8217;s regulatory posture is catching up. The new data protection laws, government push toward AI regulation, and increased focus on forensic investigation are steps in the right direction. But laws without awareness and enforcement remain dormant. Building internal capacities across the system is no longer optional. It is essential.</p>
<p data-start="2975" data-end="3256">As Cyber Safety Risk Advisors, our role is not just to intervene after an incident. It is to anticipate risk, educate stakeholders, and shape policy in a way that protects people first. Cyber safety is not a privilege. It is a fundamental right and responsibility in today’s India.</p>
<hr data-start="3258" data-end="3261" />
<p data-start="3263" data-end="3454">#AkanchaSrivastavaFoundation, #AkanchaSrivastava, #CyberSafety, #DigitalRiskIndia, #CyberAwareness, #PolicyImpact, #CyberSecurityIndia, #ForensicTraining, #TechSafety, #AIThreats, #StalkerwareIndia, #OnlineSafety, #CyberRightsIndia</p>
<p data-start="3456" data-end="3703" data-is-last-node="" data-is-only-node="">
<p>The post <a href="https://akanchasrivastava.org/how-indias-cyber-risk-landscape-is-evolving-in-2025/">How India’s Cyber Risk Landscape Is Evolving in 2025</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>When Humanity Dies Behind the Camera</title>
		<link>https://akanchasrivastava.org/when-humanity-dies-behind-the-camera/</link>
		
		<dc:creator><![CDATA[Akancha Srivastava]]></dc:creator>
		<pubDate>Fri, 13 Jun 2025 07:44:11 +0000</pubDate>
				<category><![CDATA[Cyber Insights]]></category>
		<category><![CDATA[#AirIndiaAI171]]></category>
		<category><![CDATA[#AkanchaSrivastavaFoundation]]></category>
		<category><![CDATA[#CrisisReporting]]></category>
		<category><![CDATA[#HumanityFirst]]></category>
		<category><![CDATA[#JournalismWithDignity]]></category>
		<category><![CDATA[#MediaEthics]]></category>
		<category><![CDATA[#RespectInGrief]]></category>
		<category><![CDATA[#StopSensationalism]]></category>
		<category><![CDATA[#TRPvsTruth]]></category>
		<category><![CDATA[Featured]]></category>
		<guid isPermaLink="false">https://akanchasrivastava.org/?p=3908</guid>

					<description><![CDATA[<p>Where is our media’s humanity? As the nation grapples with the horrifying Air India AI171 tragedy that claimed 241 lives, including 75 medical students and entire families, a parallel tragedy unfolded—this time not in the skies but on the ground, in front of cameras. It wasn’t caused by mechanical failure or misjudgment in flight. It [...]</p>
<p>The post <a href="https://akanchasrivastava.org/when-humanity-dies-behind-the-camera/">When Humanity Dies Behind the Camera</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Where is our media’s humanity?<span id="more-3908"></span></p>
<p data-start="372" data-end="767">As the nation grapples with the horrifying Air India AI171 tragedy that claimed 241 lives, including 75 medical students and entire families, a parallel tragedy unfolded—this time not in the skies but on the ground, in front of cameras. It wasn’t caused by mechanical failure or misjudgment in flight. It was the media, and its complete breakdown of empathy, discretion, and basic human decency.</p>
<p data-start="769" data-end="1211">Within minutes of the crash, major news outlets had stationed themselves outside hospitals, homes, and morgues. Reporters shoved microphones into the faces of grieving parents. Cameras zoomed in on sobbing children. There was no pause, no silence, no respect. The pain of others was converted into a spectacle. Families barely able to stand were asked, “How do you feel?” while red tickers flashed across screens pushing “exclusive coverage.”</p>
<p data-start="1213" data-end="1574">This is not journalism. This is emotional exploitation. Somewhere along the way, chasing TRPs seems to have replaced every remaining shred of ethics in large parts of the media. And the cost is unbearable. People are not headlines. Grief is not content. Tragedy is not a brand story. What happened on June 12 was a national emergency, not a ratings opportunity.</p>
<p data-start="1576" data-end="1993">India has a Press Council and basic guidelines around sensitivity. But clearly, they are not being followed. In moments of national mourning, there must be boundaries. There must be accountability for those who violate them. This is a time for facts, compassion, and silence where silence is necessary. Instead, we are witnessing newsrooms competing to see who can be more invasive, more aggressive, more insensitive.</p>
<p data-start="1995" data-end="2283">It is unacceptable. Victims’ families should not have to defend their right to grieve in peace. Survivors should not be retraumatized by repeat loops of horrific footage. Communities should not feel like they are being watched through a lens that cares only about breaking the news first.</p>
<p data-start="2285" data-end="2599">This isn’t the first time. We have seen this behaviour after every major disaster—flights, natural calamities, terror attacks. The same cycle repeats because there is no penalty for crossing the line. It is time for the media to introspect. It is time to revisit journalistic values rooted in humanity and dignity.</p>
<p data-start="2601" data-end="2949">The Akancha Srivastava Foundation strongly urges all media platforms to adopt and enforce clear ethical codes of conduct during crisis coverage. Public platforms come with responsibility. Sensationalism must never be allowed to overshadow humanity. We must remind ourselves that decency is not optional. It is the foundation of a civilized society.</p>
<p data-start="2951" data-end="3074">Let us not allow the lens of a camera to blind us to basic morality. In the pursuit of truth, let us not forget compassion.</p>
<p data-start="2951" data-end="3074">
<p data-start="2951" data-end="3074">#AkanchaSrivastavaFoundation, #MediaEthics, #AirIndiaAI171, #CrisisReporting, #HumanityFirst, #JournalismWithDignity, #TRPvsTruth, #RespectInGrief, #StopSensationalism</p>
<p>The post <a href="https://akanchasrivastava.org/when-humanity-dies-behind-the-camera/">When Humanity Dies Behind the Camera</a> appeared first on <a href="https://akanchasrivastava.org">Akancha Srivastava Foundation</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
