Professional Documents
Culture Documents
Cyber Safe Girl 3.0 Book (19-05-2020)
Cyber Safe Girl 3.0 Book (19-05-2020)
Safe
Girl 3.o
Beti Bachao,
Cyber Crime Se...
30 eye-opening sketches
to ensure online safety of girls
Title: Cyber Safe Girl
Version: Third
Publisher: Dr Ananth Prabhu G
Co-Authors: Adv Prashant Jhala and Yashavantha Kumar KN, DySP
This is a work of fiction. Names, characters, businesses, places, events, locales and
incidents are either the products of the author’s imagination or used in a fictitious manner.
Any resemblance to actual persons, living or dead, or actual events is purely coincidental.
The authors and publishers disclaim any liability in connection with the use of the
information provided in this book.
Credits
Sanjay Sahay, IPS Ramachandra Rao, IPS Arun Chakravarthy, IPS Dr Murugan, IPS
Special Thanks to
Anudeep Karkera
Dr Mustafa B Ganesh M Nayak Chaitra Mallikarjun Naveen Kumar (Artist)
Tech Resource Convenor Outreach Head
Index
MOBILE RECHARGE SHOP
DEBIT CARD CLONING
KEYLOGGER
SMS SPOOFING
CALL SPOOFING
RANSOMWARE
CYBER STALKING
PICTURE MORPHING
PROFILE HACKING
ONLINE GAMES
JOB CALL LETTER
DEEPFAKES
DATING WEBSITE
CAMERA HACKING
SOCIAL TROLLING
PONZI SCHEME
FAKE MATRIMONIAL PROFILE
MOBILE REPAIR SHOP
FAKE REVIEWS
FAKE PROFILE WITH SEXTORTION
CYBER VULTURES
APP TRAPS
JUICE JACKING
WIFI HACKING
ONLINE RADICALIZATION
HONEY TRAP
QR CODE SCAM
RFID CLONING
DRONE SURVEILLANCE
SEARCH ENGINE RESULTS SCAM
MOBILE RECHARGE SHOP
A Mobile Recharge Shop is a place where scamsters can gain access
to your cellphone number because you have provided it to the
recharge vendor. This number is then misused to call or text you
and exploit your ignorance or even emotionally manipulate you.
Sections Applicable
IPC Sections (to be applied to the Shop Keeper)
IPC Section 354A - Sexual Harassment and punishment for
Sexual Harassment
IPC Section 354C - Voyeurism
IPC Section 383/384 - Extortion (IF ANY DEMAND)
IPC Section 503 - Criminal Intimidation
IPC Section 506 - Punishment for Criminal Intimidation
IPC Section 509 - Word, gesture or act intended to insult
modesty of a woman
IT Act:
IT Act Section 66E - Punishment for violation of privacy
2 #CyberSafeGirl
DEBIT CARD CLONING
Debit Card skimming happens when the PIN is revealed to another
person. A scamster who knows the PIN and has possession of the
card even for a short while can replicate the card with a skimming
/schimming device and withdraw cash.
Sections Applicable
IT Act for cloning
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
IT Act
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
4 #CyberSafeGirl
KEYLOGGER
It is a malicious program that may be installed on the victim’s
computer for recording computer user keystrokes to steal passwords
and other sensitive information. With Keylogger a scamster will be
able to collect login details and other matter saved in the computer
and have them mailed to a designated email address.
Sections Applicable
Key logger installation: IT Act Section 66
- Computer related offences
Stealing personal information: IT Act Section 66C
- Punishment for Identity Theft
IPC Sections:
IPC Section 354A - Sexual Harassment and punishment for Sexual
Harassment
If in hard copy, IPC Sections 292, 293 & 294
6 #CyberSafeGirl
SMS SPOOFING
Spoofing is being able to send a message by hiding or changing
or using a completely different sender ID. Typically, you send an
SMS, your handheld device sends the message with your phone
number as the originator where in you as the sender cannot alter
that number.
Sections Applicable
Act of hoax or trick or deceive a communication
IPC Section
IPC Section 465 - Making a false document( FORGERY)
IPC Section 419 - Punishment for cheating by personation
IT Act
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
8 #CyberSafeGirl
CALL SPOOFING
Call spoofing happens through apps that enable a person with
criminal intent to change one’s number and voice to impersonate
another to defraud the receiver.
Sections Applicable
Act of hoax or trick or deceive a communication
IPC Section
IPC Section 465 - Making a false document( FORGERY)
IPC Section 419 - Punishment for cheating by personation
IT Act
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
10 #CyberSafeGirl
RANSOMWARE
Ransomware is a form of malware that encrypts a victim’s files.
The attacker then demands a ransom from the victim to restore
access to the data upon payment. Users are shown instructions
as to how to pay a fee to get the decryption key. The costs can
range from a few hundred dollars to thousands, payable to
cybercriminals in bitcoin.
Sections Applicable
Unauthorised access, Denial, Encryption :
IT Act Section 66 - Computer related offences
12 #CyberSafeGirl
CYBER STALKING
Cyberstalking is the use of the Internet or other electronic means to
stalk or harass another by misusing information uploaded on social
networking sites.
Sections Applicable
Offline:
IPC Section 354 D - Stalking
Online :
IPC Section 354 D - Stalking
14 #CyberSafeGirl
PICTURE MORPHING
Morphing the face of a person to the body of another and
publishing it to blackmail or otherwise intimidate the person is
one of the ways by which people who upload photos on social
networking sites can be exploited.
Sections Applicable
IPC Sections
IPC Section 292 - Sale etc of Obscene books etc (if in hardcopy)
IPC Section 465 - Morphing photographs and creating a false
electronic record
IPC Section 469 - Making false electronic document for causing defamation
IPC Section 507 - Criminal Intimidation by an Anonymous communication
IPC Section 509 - Word, gesture or act intended to insult modesty
of a woman
IT Act
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
16 #CyberSafeGirl
PROFILE HACKING
Profile Hacking happens when your email or social networking site
is accessed by a probable stalker who then compromises it.
Sections Applicable
IT Act
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using password)
18 #CyberSafeGirl
ONLINE GAMES
Girls who are vulnerable to loneliness, low self-esteem and clinical
depression can fall prey to dangerous online games that may
become addictive and further harm them. Some like the notorious
blue whale challenge even end in the victim ending her life. This is
a personal as well as social challenge for the others around.
Sections Applicable
IPC Sections
The site
IPC Section 299 - Culpable homicide
IPC Section 305 - Abetment of suicide of Child or Insane Person
IPC Section 306 - Abetment of suicide
IPC Section 321 - Voluntarily causing hurt
IPC Section 335 - Voluntarily causing grievous hurt on provocation
IPC Section 336 - Act endangering life or personal safety of others
20 #CyberSafeGirl
JOB CALL LETTER
Websites offering jobs need to be checked for veracity and
authenticity. Mails need to be double-checked and verified before
one responds and acts on instructions provided, especially if one is
asked to put in a personal appearance.
Sections Applicable
Fake account / ID:
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
Such fake call letters may see you out of your existing job
sooner or later!
22 #CyberSafeGirl
DEEPFAKES
Deepfake is a technique that is used to combine and superimpose
new images and videos onto source images or videos. It is used to
create videos where the voice or face of another is superimposed
on the original in such a way that the viewer or listener cannot
distinguish or doubt the veracity of it.
Sections Applicable
Fake account / ID: IT Act Section 66C - Punishment for Identity
Theft (dishonestly or fraudulently using a unique identification feature)
Impersonation for cheating :
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
IPC Section 419 - Punishment for cheating by personation
IPC Section 420 - Cheating
Publishing online:
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
IPC Section 354A - Sexual Harassment and punishment for Sexual Harassment
IPC Section 465 - Making a false document
Section 507 - Criminal Intimidation by an Anonymous communication
SEC 509 – INSULTING MODESTY OF WOMEN
Stalking: Offline : IPC Section 354 D - Stalking
Online : IPC Section 354 D - Stalking
IPC Section 120-B - Punishment for Criminal Conspiracy
IPC Section 34 - Acts done by several persons in furtherance of
Common Intention
Abatement for offence:
a. On the spot: IPC Section114 - Abettor present when offence is
committed
b. Remotely: IPC Section109 - Punishment for abetment
Deep Fakes are not noticeable easily and hence have High Stakes!
Beti Bachao, Cyber Crime Se 23
DEEPFAKES
24 #CyberSafeGirl
DATING WEBSITE
Females can be emotionally manipulated by smooth talkers on
dating sites. Any private pictures or texts that they send across
to probable dating companions on such sites are fair game for
unscrupulous persons who can then blackmail them.
Sections Applicable
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by using
computer resource
IPC Section 419 - Punishment for cheating by personation
IPC Section 420 - Cheating
IPC Section 354A - Sexual Harassment and punishment for Sexual Harassment
IPC Section 354C - Voyeurism
Stalking : Offline : IPC Section 354 D - Stalking
Online : IPC Section 354 D - Stalking
Publishing online
IT Act Section 67- Punishment for publishing or transmitting obscene
material in electronic form
IT Act Section 67A- Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B- Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic form
& sections of POCSO
IPC Section 507 - Criminal Intimidation by an Anonymous communication
IPC Section 509 - Word, gesture or act intended to insult modesty
of a woman
IPC Section 465 - Making a false document
Looking out for a Date, be careful that you don’t get Check-Mate!
26 #CyberSafeGirl
CAMERA HACKING
Camera hacking happens when photographs of a person are taken
without consent, through malware that got downloaded with an
attachment. Phones with no camera guard can be exploited for
such criminal activities.
Sections Applicable
Hacking-
IPC Section 66 - Computer related offences
Capturing photograph/video:
IPC Section 354C - Voyeurism
IT Act Section 66E - Punishment for violation of privacy
Creating Fake ID in social media
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
IPC Section 419 - Punishment for cheating by personation
Online Sexual harassment to a woman
IPC Section 354A - Sexual Harassment and punishment for Sexual Harassment
Stalking : Offline : IPC Section 354 D - Stalking
Online : IPC Section 354 D - Stalking
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
IPC Section 507 - Criminal Intimidation by an Anonymous communication
IPC Section 509 - Word, gesture or act intended to insult modesty
of a woman
Think before taking your cell phones while using the restroom.
Your privacy may have no room to rest!
Beti Bachao, Cyber Crime Se 27
CAMERA HACKING
28 #CyberSafeGirl
SOCIAL TROLLING
Social Trolling is posting inflammatory messages or visuals about a
person or organisation in an online community with a sole intent of
causing humiliation or nuisance to that person.
Sections Applicable
IPC Section 507 - Criminal Intimidation by an
Anonymous communication
IPC Section 509 - Word, gesture or act intended to insult
modesty of a woman
Stalking:
Offline: IPC Section 354 D - Stalking
Online : IPC Section 354 D - Stalking
30 #CyberSafeGirl
PONZI SCHEME
A Ponzi scheme is a fraudulent investing scam promising high rates
of return with little risk to investors. Victims of such schemes are
vulnerable to hackers with malicious intent and fall prey to their
promises of recovery of their losses.
Sections Applicable
Sections 3, 4, 5, 6 of Prize Chits and Money Circulation Schemes
(Banning) Act, 1978
Also look up at State Acts eg
Section 9 of the Karnataka Protection of Interest of Depositors In
Financial Establishments Act, 2004
Section 3, 4 of Maharashtra Protection of Interest of Depositors In
Financial Establishments Act, 1999 etc.
Investing in Ponzi schemes may make you run out of all other
Schemes of life!
32 #CyberSafeGirl
FAKE MATRIMONIAL PROFILE
A fraudster may have registered on a matrimonial site with a fake
profile. The details and profile pic may not be his. He can dupe
a naive girl who falls for his practised charm and believes in the
authenticity of supportive material that he provides to back up his
identity.
Sections Applicable
IPC Section 465 - Making a false document
IT Act Section 66C - Punishment for Identity Theft
(dishonestly or fraudulently using a unique
identification feature)
IT Act Section 66D - Punishment for cheating by personation
by using computer resource
IPC Section 419 - Punishment for cheating by personation
IPC Section 420 - Cheating
IPC Section 507 - Criminal Intimidation by an
Anonymous communication
Marriage are made in Heaven but in the virtual world you end
up paying the cost of messing with Heavenly Affairs!
34 #CyberSafeGirl
MOBILE REPAIR SHOP
Pictures and videos stored in the phone’s gallery can be accessed
by any person once the phone is in his possession. A mobile repair
shop may have a criminal who accesses private pictures or other
data and uploads them on shady sites to make them viral. He may
also use them for blackmailing.
Sections Applicable
IT Act Section 66 - Computer Related Offences
IPC Section 406 - Punishment for Criminal Breach of Trust
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
IPC Section 506 - Punishment for Criminal Intimidation
IPC Section 507 - Criminal Intimidation by an Anonymous
communication
IPC Section 509 - Word, gesture or act intended to insult modesty
of a woman
If caution not adhered at such Shops, get ready to take big Hops!
36 #CyberSafeGirl
FAKE REVIEWS
A website may dupe customers by putting up fake reviews of
products. They plant glowing reviews and pay for perfect ratings
that attract customers, especially backed by discounted prices.
These products from dubious sites may cause untold harm if used.
Sections Applicable
IPC Section 406 - Punishment for Criminal Breach of Trust
IPC Section 420 - Cheating
38 #CyberSafeGirl
FAKE PROFILE WITH SEXTORTION
Public changing rooms may have strategically placed cameras
that capture pics of the users, naturally with criminal intent.
These pics can then be uploaded on a duplicate social media
account with the intention of extortion.
Sections Applicable
Capturing photograph/video:
IPC Section 354C - Voyeurism
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
IPC Section 419 - Punishment for cheating by personation
IPC Section 354A - Sexual Harassment and punishment for Sexual
IPC Section 507 - Criminal Intimidation by an Anonymous
communication
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
IPC Section 509 - Word, gesture or act intended to insult modesty
of a woman
40 #CyberSafeGirl
CYBER VULTURES
Cyber-vultures are a merciless breed of hackers who like to feast
on consumers and businesses suffering from any type of attack.
They use this scenario as an opportunity to trick them and swindle
more money.
Sections Applicable
IT Act Section 66 - Computer related offences
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
42 #CyberSafeGirl
APP TRAPS
The internet could come with a hidden cost. One of these is
preloaded apps that harvest users’ data without their knowledge.
These apps ask for permission to access files and once given, they
may use videos, photos and storage media not only to be mined by
marketers but also for other nefarious purposes.
Sections Applicable
IPC Section 406 - Punishment for Criminal Breach of Trust
IPC Section 420 - Cheating
These traps give you a silent rap and take away your sensitive
personal data.
44 #CyberSafeGirl
JUICE JACKING
Juice Jacking is a type of cyber attack involving a charging port
that doubles as a data connection, typically over USB. This often
involves either installing malware or copying sensitive data from
a smart phone or other computer devices. Charging ports at public
places are prime areas for juice jacking.
Sections Applicable
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature/password/electronic
signature)
46 #CyberSafeGirl
WIFI HACKING
Wifi hacking is essentially cracking the security protocols in a
wireless network, granting full access for the hacker to view, store,
download, or abuse the wireless network. Weak passwords to wifi
networks may enable a hacker to log into the net through the wifi
connection in the vicinity.
Sections Applicable
IT Act Section 66 - Computer Related Offences
Publishing online
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
48 #CyberSafeGirl
ONLINE RADICALIZATION
Young, vulnerable individuals can fall prey to terrorists’ propaganda
while spending time online and browsing the net. The targets of
such extremists are individuals or groups of people who can be
easily led towards terrorist ideologies because of their experiences,
state of mind or sometimes their upbringing.
Sections Applicable
IT Act Section 66F - Punishment for Cyber Terrorism
IPC Section 120B - Punishment of Criminal Conspiracy
IPC Section 121A - Conspiracy to commit offences punishable by
section 121
IPC Section122 - Collecting arms, etc., with intention of waging
war against the Government of India
IPCSection121 - Waging or attempting to wage war, or abetting
waging of war, against the Government of India
IPC Section 124A - Sedition
50 #CyberSafeGirl
Honey Trap
Honey trapping is an investigative practice that uses romantic or
intimate relationships for an interpersonal, political or monetary
purpose to obtain sensitive information. In today’s cyber world,
“Honey Trap” has gained a new dimension on social media platforms
like Facebook, Twitter etc to trap targets by blackmailing them.
Sections Applicable
Capturing Picture/Video Over Online:
IPC Section 354C - Voyeurism
IPC Section 509 - Word, gesture or act intended to insult modesty
of a woman
IT Act Section 66E - Punishment for violation of privacy
IT Act Section 67 - Punishment for publishing or transmitting
obscene material in electronic form
IT Act Section 67A - Punishment for publishing or transmitting of
material containing sexually explicit act etc., in electronic form
IT Act Section 67B - Punishment for publishing or transmitting of
material depicting children in sexually explicit act etc., in electronic
form & sections of POCSO
Demand for ransom (attempt):
IPC Section 385- Putting person in fear of injury in order to commit
extortion
IPC Section 511 - Punishment for attempting to commit offence
punishable with imprisonment for life or other imprisonment
52 #CyberSafeGirl
QR Code scam
A QR (Quick Response) code is nothing more than a two-dimensional
barcode. This type of code was designed to be read by robots that
keep track of produced items in a factory. As a QR code takes up
a lot less space than a legacy barcode, its usage soon spread and
Hackers took it to their advantage! QR codes are easy to generate
and hard to tell apart from one another. To most human eyes, they
all look the same.
Sections Applicable
IPC Section 406 - Punishment for Criminal Breach of Trust
IPC Section 420 - Cheating
54 #CyberSafeGirl
RFID Cloning
Radio frequency identification, or RFID often abbreviated Radio
Frequency IDentification is method for automatic identification of
objects, where the object IDs read or write data using radio waves.
Each chip contains an identifier stored inside, with unique number
and antenna. Most of these cards can be cloned, easily!
Sections Applicable
IT Act Section 66 - Computer Related Offences
Stealing RFID data / RFID Cloning:
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature/password/electronic
signature)
Retaining stolen data & Selling Credit Card Details:
IT Act Section 66B - punishment for dishonestly receiving stolen
computer resource or communication device
IPC Section 420 - Cheating
Creating Replica of Digital ID & accessing server by impersonation:
IT Act Section 66 - Computer Related Offences
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
IT Act Section 66D - Punishment for cheating by personation by
using computer resource
IPC Section 419 - Punishment for cheating by personation
56 #CyberSafeGirl
Drone Surveillance
In aviation and in space, a drone refers to an unpiloted aircraft
or spacecraft. Drones can be equipped with various types of
surveillance equipment that can collect high definition video and
still images day and night. Drones can be equipped with technology
allowing them to intercept cell phone calls, determine GPS
locations, and gather license plate information.
Sections Applicable
Following/Stalking/Capturing any PRIVATE AREA pic /video of a women
by DRONE without her consent:
IPC Section 354A - Sexual Harassment and punishment for Sexual
Harassment
IPC Section 354C - Voyeurism
IPC Section 354D - Stalking
IPC Section 509 - Word, gesture or act intended to insult modesty
of a woman
IT Act Section 66E - Punishment for violation of privacy
Unauthorised access to WI FI by DRONE:
IT Act Section 66 - Computer Related Offences
Stealing personal information via WI FI Cracker:
IT Act Section 66C - Punishment for Identity Theft (dishonestly or
fraudulently using a unique identification feature)
Dropping hazardous materials to house via DRONE:
IPC Section 436 - Mischief by fire or explosive substance with
intent to destroy house, etc.
58 #CyberSafeGirl
Search Engine Results Scam
A hacker can create a legitimate-looking website and get it indexed
by various search engines, making it appear in search results based
on the keywords you type. This way, misleading results, fake help
line numbers etc can be displayed, making the user believe them
and fall prey to this Search Engine Optimization (SEO) scam.
Sections Applicable
IT Act Section 66 - Computer Related Offences
Fake numbers of customer care may put you under intensive care
60 #CyberSafeGirl
Infotoons Explained!
TIPS TO STAY CYBER SAFE
1. MOBILE RECHARGE:
Precautions: While recharging your mobile
prepaid card account you have to give your
mobile number to the vendor. Though ideally one
should go to the Customer Care Centre of the
Mobile Service Provider to get the recharge done Adv. Prashant Jhala
but as a matter of convenience people approach a local vendor who
keeps prepaid vouchers of practically all the mobile service providers
and of all denominations. Thereby for recharging they end up giving
their cell numbers and hence the scope of misuse. It is advisable to get
the recharge done online or through the Customer Care Centre or one
should take the voucher and key in the digits by themselves or ask some
trusted person to do it for them. Purchasing sim cards from local vendors
also warrants you to give your id proofs and photos which could possibly
be duplicated and misused. Then again, the convenience of getting a
recharge done on credit, if the local vendor is known to you, is also an
attractive deal. Use now Pay later may cost you greater.
3. KEYLOGGER:
Precautions: Keyloggers may be in form of a hardware that could be
attached to your computer system or to an ATM machines actual key
pad, or it could be a software that could be implanted into your computer
system. Difficult to trace them out because generally they are in stealth
mode and even best of antivirus used by your systems may not be able
to block them. A cyber security expert or a malware analyst’s would be
able to find out its presence upon thorough investigation of the system.
Keep your antivirus updated, update your operating system to latest
versions through timely patches released by the providers, used licenced
software’s, do not click on suspicious links and the links that originate
62 #CyberSafeGirl
from unknown source, do not download free songs, movies, videos,
software’s, applications, games etc for a keylogger could be embedded
in them and you may end up downloading one for free. Make sure to
enable Two Factor Authentication for an additional layer of security, use
virtual keyboard to enter the username and password and install a good
antivirus on your system to stay cyber safe.
4. SMS SPOOFING:
Precautions: No proper solution for this because a hacker may clone
your sim and use your cell number to send SMS’s. There are websites,
software’s and apps that allow a fraudster to send spoofed SMS’s to
cheat, deceive or defame someone. A Remote Access Trojan if implanted
into your cell phone can allow the implanter to send SMS’s using your
device. Furthermore, such spoofed SMS’s are difficult to trace and track.
Anonymity is greater when a fraudster uses techniques to spoof.
5. CALL SPOOFING:
Precautions: No proper solution for this because a hacker may clone
your sim and use your cell number to make calls. They may also use
VOIP (Voice Over Internet Protocol) for spoofing. There are websites,
software’s and apps that allow a fraudster to make spoofed calls to cheat,
deceive or defame someone and they also have the facility to change the
modulation, depth, pitch, decibel and quality of voice, a male’s voice can
be changed to a female’s voice or to a voice of a kid and vice a versa.
A Remote Access Trojan if implanted into your cell phone can allow the
implanter to make calls using your device. Furthermore, VOIP calls are
difficult to trace and track and thus anonymity is at its peak in such
spoofed calls. To stay protected, Don’t place all your trust in the caller ID
information presented to you. Now that you know that Caller ID can be
easily spoofed by the use of third-party caller ID spoofing services and
other tools, you won’t be as trusting in the technology as you have been.
6. RANSOMWARE:
Precautions: Do not click on links that appear from unknown sources.
Do not trust the friends you have made on social networking sites.
A few cases were reported wherein the so-called friends of social
networking sites, sent provocative and or suggestive pictures
embedded with malwares that affected the computer systems and the
unsuspected victims clicked on the picture and downloaded malware
and got affected in the process. Since different algorithms are used
to create ransomwares, the encryption level also changes and hence
there is no tailor-made approach to these crimes. Various breeds of
ransomware are on prowl but ideally the aim of the hacker would be
to deny access to your own computer/network or data. One fit suit all,
does not work here as a solution. Remember to take real-time backups.
Updating the information and cyber security policies and practices
should be an ongoing and proactive endeavour. Patch management has
to be in real time right from firewalls, antivirus, intrusion detection
alarms etc and should be upgraded timely. Vulnerability Assessment
and Penetration Testing (VAPT) has to be carried out periodically. In
the year 2017, WannaCry ransomware affected approximately 150
countries at one go.
7. CYBER STALKING:
Precaution: Cyberstalking is a serious crime, and no one wants to
become a victim. One way to help protect yourself is to keep your
personal information private on the internet. That’s a start. Be careful
about allowing physical access to your computer and other web-enabled
devices like smartphones. Cyberstalkers can use software and hardware
64 #CyberSafeGirl
devices (sometimes attached to the back of your PC without you even
knowing it) to monitor their victims. Be sure you always log out of
your computer programs when you step away from the computer and
use a screensaver with a password. Delete or make private any online
calendars or itineraries — even on your social network — where you list
events you plan to attend. That information could allow a cyberstalker
to know where and when you’re planning to be somewhere. A lot of
personal information is often displayed on social networks, such as your
name, date of birth, where you work, and where you live. Use the privacy
settings in all your online accounts to limit your online sharing with
those outside your trusted circle. You can use these settings to opt out
of having your profile appear when someone searches for your name.
You can block people from seeing your posts and photos, too. If you
post photos online via social networks or other methods, be sure to turn
off the location services metadata in the photo. The metadata reveals
a lot of information about the photo — where and when it was taken,
what device it was taken on, and other private information. Most often,
metadata comes from photos taken on a mobile phone. You can turn this
off — it’s usually a feature called geo-tagging — in your phone’s settings.
8. PICTURE MORPHING:
Precautions: Morphing has become a child’s plays with tools, apps,
software’s and technology made available by the internet for free.
Various apps allow photo editing and high-end software’s allows the act
of morphing very easy. High end filters are available for free which can
be used to enhance the quality of the pictures. With Drag and Drop and
Cut, Copy and Paste options, super imposing or replacing the body and/
or body parts of one individual with that of another can be done with
considerable ease. Thus, porn and obscene contents are easily created
to defame someone by using the victims face and other identification
features that are similar to the victims and a lookalike picture of the
Precautions: Schemes that offers to make you rich and wealth without
much efforts are often dubious. Remember that Schemes that offers
high returns on your investments most probably will never return the
money that you originally may have invested. Unfortunately, both literate
and illtreat people fall prey to such schemes. The greed to make money
without efforts or to adopt a shortcut to become rich and wealthy may
reduce your hard-earned income and make you poor and unhealthy
thereby. There have been enough Ponzi schemes being reported and
investigated by the law enforcement agencies but despite that new Ponzi
schemes are floated and people fall prey to such schemes. Study the
entire project and cross verify, make your own research before entrusting
70 #CyberSafeGirl
your money to someone or investing it into any such schemes. Do not
trust agents who promotes such schemes because they are appointed to
paddle wrong information and paint a fake picture of the scheme that
would attract your attention and make you not think rationally.
72 #CyberSafeGirl
Never ever allow anyone to click a picture or a video that you may feel
would go against you someday. Also called Revenge Porn.
24.WIFI HACKING:
Precautions: Check the level of your security by having strong password
that needs to be changed often (some users still use the default password
set by the providers). The most current security protocol that is in use is
WPA2 (Wi-Fi Protected Access2) which implements the latest security
standards which includes high grade encryption. If possible, maintain a
log of people to whom you have granted access to your Wi-Fi network.
Companies have their own information security policies for the use of
Wi-Fi. If due to weak security/password, if a criminal manages to hack
your wi-fi and commit a crime, the IP address of your router will be
reflected and the police will begin enquiry from your house where you
have your wi-fi router placed. In a particular case, a terrorist used an
open and unprotected wi-fi of a college to send a mail to a media house,
claiming responsibility for the blasts that were carried out in a city.
That’s dangerous, isn’t it!
27. QR Hack:
Use technology that your brains can comprehend. The ‘on the go’
payment systems through QR code’s scan, tap n pay, pull n push money
etc should be enabled on your phone only if you conceptually understand
the procedure that involves in these kind of payment facilities.
Beti Bachao, Cyber Crime Se 75
Technology such as Drive by downloads etc are making things complex
for a layman to understand but in the urge to display that we are tech
savvy, we fail to read the fine prints that gives away our access privileges
by way of permissions and we use such payment systems freely and
usually end up loosing money. Numerous frauds have been reported by
use of UPI platforms. The pull and push concept of payments are being
misused and the criminals are taking advantage of lack of knowledge of
victims in regards UPI system. Victims are asked to download QR code’s
that are fake, lookalike apps that are fake and which gives away remote
access of your phones and thereafter swindling victims money becomes
easy.
It is better to transact money by using tested ways rather than trying
fancy and untrusted ways.
Let us keep one thing in mind that an ‘OTP is generate only and only
when You have to make a Payment’ and hence never share your OTPs.
For receiving money, no OTP is ever generated.
One more fact is that two factor authentication is available in India. For
international transactions, OTP is not generated.
80 #CyberSafeGirl
a note from the Police Officer
Technology has driven our lives from the time
we get up in the morning, with the chirping
alarm from a mobile, a WhatsApp good morning,
a digital calendar to remind us what to do the
day, maps to navigate our roads, e-commerce and
online banking to pay our bills, online games to
keep us busy and apps to help us and feed our
tech savviness. Yashavantha Kumar KN
Use of internet is an integral part of our lives and it has impacted us that
it has become indispensable part of our lives. However, if technology
has increased in a pace of 10, the cybercrimes have increased 100 folds.
But most of us are unaware of such crimes or threats which we may be
facing. Also, many a times, it happens without our knowledge.
It is also observed that the cybercrime has been affecting the women
at large compared to the men. However, it can generally affect anyone,
young or old, men or women, anyone could be susceptible to cybercrime.
It is thus very important at this juncture, to create awareness to all,
especially the worn, regarding the cybercrimes which is happening as a
global phenomenon.
The preventive tips in the book can help keep us cybersafe to the
maximum, if followed judiciously.
88 #CyberSafeGirl
OFFENCES AND RELEVANT PENAL SECTIONS
Cyber Crimes Mapping with Information Technology Act, 2000,
Information Technology (Amendment) Act, 2008,
IPC and Special and Local Laws.
Applicable section(s) and Applicable section(s)
Sl.
Nature of complaint punishments under ITA 2000 & under other laws and
No
ITAA 2008 punishment
1 Mobile phone lost/stolen - Section 379 IPC
3 years imprisonment or
fine or both
2 Receiving stolen Section 66 B of ITAA 2008 Section 411 IPC
computer/ mobile phone/data 3 years imprisonment or Rupees one 3 years imprisonment or
(data or computer or mobile lakh fine or both fine or both
phone owned by you is found in
the hands of someone else.)
3 Data owned by you or your Section 66 of ITAA 2008 Section 379 IPC
company in any form is stolen 3 years imprisonment or fine up to 3 years imprisonment or
rupees five lakh or both fine or both
4 A password is stolen and used Section 66C of ITAA 2008 Section 419 IPC
by someone else for fraudulent 3 years imprisonment and fine up to 3 years imprisonment
purpose. Rupees one lakh or fine
Section 66D ITAA 2008 Section 420 IPC
3 years imprisonment and fine up to 7 years imprisonment
Rupees one lakh and fine
6 An e-mail is read by Section 66 of ITAA 2008
someone else by 3 years imprisonment or fine up to
fraudulently making use of Rupees five lakh or both
password Section 66C of ITAA 2008
3 years imprisonment and fine up to
Rupees one lakh
7 A biometric thumb Section 66C of ITAA 2008
impression is misused 3 years imprisonment and fine up to
Rupees one lakh
8 An electronic signature or Section 66C of ITAA 2008
digital signature is misused 3 years imprisonment and fine up to
Rupees one lakh
10 A Phishing e-mail is sent Section 66D of ITAA 2008 Section 419 IPC
out in your name, asking 3 years imprisonment and fine up to 3 years imprisonment or
for login credentials Rupees one lakh fine or both
11 Capturing, publishing, or Section 66E of ITAA 2008 Section 292 IPC
transmitting the image of 3 years imprisonment or fine not 2 years imprisonment
the private area without exceeding Rupees two lakh or both and fine Rupees 2000
any person’s consent or and 5 years and rupees
knowledge 5000 for second and
subsequent conviction
12 Tampering with computer Section 65 of ITAA 2008
source Documents 3 years imprisonment or fine up to
Rupees two lakh or both
Section 66 of ITAA 2008
3 years imprisonment or fine up to
Rupees five lakh or both
13 Data Modification Section 66 of ITAA 2008
3 years imprisonment or fine up to
Rupees five lakh or both
90 #CyberSafeGirl
23 Intermediaries not Section 69 of ITAA 2008
providing access to information imprisonment up to 7 years and fine
stored on their computer to the
relevant authorities
24 Failure to Block Web sites, Section 69A of ITAA 2008
when ordered imprisonment up to 7 years and fine
25 Sending threatening Section 506 IPC
messages by e-mail 2 years or fine or both
25 Word, gesture or act Section 509 IPC
intended to insult the 1 years or fine or both —
modesty of a woman IPC as applicable
26 Sending defamatory Section 500 IPC
messages by e-mail 2 years or fine or both
27 Bogus Web sites, cyber Section 66D of ITAA 2008 Section 419 IPC
frauds 3 years imprisonment and fine 3 years imprisonment
up to Rupees one lakh or fine
Section 420 IPC
7 years imprisonment
and fine
28 E-mail Spoofing Section 66C of ITAA 2008 Section 465 IPC
3 years imprisonment and fine 2 years or fine or both
up to Rupees one lakh Section 468 IPC
7 years imprisonment
and fine
29 Making a false document Section 66D of ITAA 2008 Section 465 IPC
3 years imprisonment and fine 2 years or fine or both
up to Rupees one lakh
30 Forgery for purpose of Section 66D of ITAA 2008 Section 468 IPC
cheating 3 years imprisonment and fine 7 years imprisonment
up to Rupees one lakh and fine
31 Forgery for purpose of Section 66D of ITAA 2008 Section. 469 IPC
harming reputation 3 years imprisonment and fine 3 years and fine
up to Rupees one lakh
32 E-mail Abuse Sec. 500 IPC
2 years or fine or both
33 Punishment for criminal Sec. 506 IPC
intimidation 2 years or fine or both
— if threat be to cause
death or grievous hurt,
etc. — 7 years or fine
or both
34 Criminal intimidation by an Sec. 507 IPC
anonymous communication 2 years along with
punishment
under section 506 IPC
35 Copyright infringement Section 66 of ITAA 2008 Sec. 63, 63B Copyrights
3 years imprisonment or fine up to Act 1957
Rupees five lakh or both
36 Theft of Computer Sec. 379 IPC
Hardware 3 years imprisonment or
fine or both
37 Online Sale of Drugs NDPS Act
38 Online Sale of Arms Arms Act
contact
+91 89515 11111
[email protected]
www.facebook.com/educatorananth