Fraudulent manipulation of the fingertips


- Variety: Bhaven Kutchi

- It is time to include 'Cyber ​​Crime' in the students' curriculum

- The police department is equipped to crack down on perverted and nefarious criminals who can ruin you by sneaking into a smart phone or laptop.

A few days ago, a dialogue was held for the first time in the presence of invited media under the auspices of Ahmedabad Police and Gujarat Media Club on how the police department is equipped with humanitarian approach to serve the citizens, training against changing challenges and using technology to curb crime and terrorism. The presentation was made. Ahmedabad Police Commissioner Sanjay Srivastava and Cyber ​​Police Team Police Officer Amit Vasava made a very interesting presentation. Were made.

Today, however, we will focus on the alarming rise in cybercrime. In the event, some media workers were informed in advance for the demonstration of invited media present in the hall, demonstrating hacking of mobile phones, laptops, email accounts, social media accounts, websites. For example, most of those present in the hall are connected to the hotel's WiFi

"If you have been vaccinated, the amount will be credited if you fill in the details by logging in to the link shown in your account by the government," he said. The hacker was instructed to show how such a fraudulent message is being carried out. The hacker (ethical) of the police department was showing the desired message by opening the Facebook account of a journalist present in the hall as if he did not know that the person had not logged out. In the same way, by going to the email in front of the eyes, a dummy fraud was shown. All this could be seen by everyone present on the screen on the hall.

A welcome initiative has been taken that the Gujarat Police Department, along with the Education Department, has come up with a proposal that a subject (book) in the students' curriculum should have an illustrated chapter on what kind of cyber crime can happen. Also know how the police department is working with the latest technology, ethical hacker team and provision of legal punishment. The curriculum also advocates for students to be guided on how to approach the police to get out of the clutches of criminals fearlessly. We hope that the Department of Education, as soon as possible, educates teenagers and young people about the dangers and cybercrimes of financial fraud and provides security.

Now let's look at some common cyber crime examples.

(1) Reena, who lives as a room partner with Meena, once said that I urgently need a thousand rupees. Meena gave her ATM card and PIN information. Reena went to the ATM counter to withdraw money. He also had a friend. As planned by Reena, her friend copied the card from the skimming device. She knew the password. Reena withdrew a thousand rupees and returned the card thanking Meena. Meena had to change her PIN (number) the next day. His card was swiped in his name. It was difficult to lodge a complaint. However, the police department now receives a good number of such complaints so they were able to catch the crime. Your card can also be made from a skimming device.

(3) Rita is thrilled to be shopping on e-commerce. Taking time to search such a site for something offered at a low price. One day, she received a message from a well-known e-commerce company saying that there was an offer for a handbag of Rs 2,000 for Rs 500. The same message said that if the payment was made online, she would get the benefit of this offer twice. Did the transaction. After waiting for a few days, she called the helpline as she could not find her handbag. Such cases are known as the Nigerian scam.

(2) Shabana received a message from her son's phone number who was away for study in another city that 'Mommy, I have to pay one lakh rupees to the college. I have sent my college bank account details.' As it was her son's phone number, Shabana transferred the amount by adding it to the bank's bank details and number ad beneficiary while doing online banking. The son said that he had not sent any such message. The fraud had already taken place.

Calls and SMS from any phone number from a specific application. S. This technique is increasing in cyber crime.

(2) Elisha runs an independent business. His company has employees with 20 computers. One day Elisha received an email from his client.

Elisha updated the file in the email. There was no warning not to open the file as the antivirus in his computer was not updated. As soon as he opened the file, his computer was locked and even the most important file for all business could not be opened and it was encrypted. A message started coming on the computer that if you want to unlock the computer, you have to pay one million rupees in bitcoin.

(2) Aishwarya was happy to see her likes by posting her amazing photos. She was also beautiful in appearance. She also started accepting requests from strangers to increase her friends. A boy named Raghu was constantly following him. He wanted to get Manoman Aishwarya at any cost. He reached Aishwarya's college. He started forcing a friendship with her. Aishwarya did not make it clear. He just kept chasing.

It seemed to be becoming violent. Was. Raghu morphed into two pieces of pornographic film with Aishwarya's photos and uploaded them on various websites and other friends. Aishwarya is extremely frustrated and has lodged a complaint with the cyber police.

(3) Devika came from a small village to study in a big city. She also wanted to get the thrill of technology.

The Blue Whale online game is free to play. As soon as the game is installed, it is said that the game will be of 20 stages and one challenge will have to be completed in each stage. It was lost in one interesting phase after another of the game. The game took over his mind. At last he was challenged to cut his body with a knife every hour of the night. The final task was to hang himself. Throughout the game he was constantly given suggestions that he would slip into depression, become lonely and the world would become meaningless. Devika wrote, "I wanted people to love me, but I was ignored." He apologized to his parents and committed suicide. It was written on his computer that 'Final stage over .. You have one it. You have done it. '

(2) Nishita applied for the job on an online employment website. The site was doing her business properly but the details of Nishita's scam got into the hands of the gang. Nishita got a call for an interview in a five star hotel. She went to the hotel room. During the interview, she fainted after drinking juice. She was raped. Cases of physical and financial abuse under the pretext of employment are increasing.

(3) Manisha used to keep the phone with her constantly. She even kept the phone in the bathroom. Her bathing and sex videos with her husband and husband Jode started circulating on the website with obscene sounds and morph additions. He was punished for being with her.

(2) Rama denied Pintu's friendship. Pintu created a troll page and started uploading funny photos and funny videos of Rama. Rama became ridiculous in college. He became depressed and dropped out of school.

(10) Divya OTT. The movie was being watched on the platform via a Wi-Fi router. Although there was a broadband connection providing 5 GB internet, suddenly one day his movie stopped playing. He logged in to the admin panel of his router and saw that another device was also connected in the network. His WiFi was hacked due to his simple and weak password. A police investigation revealed that he was using the Internet to sell drugs and illicit goods on the Dark Web.

The above examples of renaming individuals are rare in hundreds of cases. It is taken from 'Cyber ​​Safe Girl' written by Dr. Anant Prabhu.

Dr. Anant Prabhu is a software engineer and a cybersecurity expert. He is also a connoisseur of digital forensics. Ahmedabad Police and State Government are planning to distribute this 5 page guide book illustrated to all the students. Not only students of all age groups but also highly educated people fall prey to cyber crime.

In the future companies will also have to keep a large number of ethical hackers on the job. There is also a big challenge facing the police department.

Footnote: Will run without flour but not without 'data'. Which line do you stand in? Giving free data or giving free flour

Comments