An organization in Mumbai, India has proposed that police use key-logging software at cybercaf?to keep track of communications between terrorists. Public computers at cyber cafes offer terrorists the anonymity they require, said Vijay Mukhi, president of the Foundation for Information Security and Technology (FIST) in Mumbai in a telephone interview late Tuesday. Terrorists are known to use instant messengers (IM) from companies like Microsoft Corp. and Yahoo Inc., and these companies do not share information from IM chats with the police, he added.Keyloggers are software on a computer that record a user’s key strokes–whatever the user types–on a computer keyboard. Data from keyloggers will be uploaded to centralized servers where it will be available to the police for scrutiny. The move does not as yet have the approval of the Mumbai police. The keyloggers would be activated centrally as and when a suspect walks into a cyber caf?r when suspicious activity is noted, Mukhi said.A number of bloggers have criticized Mukhi’s proposal, saying it will put personal data of ordinary individuals at risk. But some other blogs said that it is too small a price to pay to protect against loss of life from terrorism. The police should put in place a mechanism for citizens to seek redress from any misuse of their private information, Mukhi said. Bomb blasts by terrorists have killed a large number of people in the country. In July last year, seven bombs planted in Mumbai’s suburban trains killed over 200 people and injured another 700. Terrorists are increasingly using the Internet to communicate with one another, as they are aware that telephone and mobile phones connections are under Indian government surveillance, according to Mukhi. FIST, a non-profit organization in Mumbai, is focused on cyber-security and has worked with the police on related issues. It aims to get keyloggers on computers in cybercafes throughout India, Mukhi said. By John Ribeiro, IDG News Service (Bangalore Bureau) Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe