Page 48 - 15NOV2019E
P. 48

crimes






                                                                                                                     phone number, visiting fraudulent web-  malware that encrypts the files, storage    of cyber crime specialists to investigate
                                                                                                                     sites or downloading malicious content   media on communication devices like   cases of frauds involving ATM, credit
                                                                                                                     via phone or web. Every now and then   desktops, Laptops, Mobile phones etc.,   card, e-wallet, fake profile and password
                                                                                                                     people receive text messages on their   holding data/information as a hostage.   hacking. The cell will also monitor the
                                                                                                                     phones, where they are lured with as-  The victim is asked to pay the demanded  social media platforms for possible mis-
                                                                                                                     sured money or goodies, if they reply,   ransom to get his device decrypts.  use and will also organise interactive
                                                                                                                     call on a particular number or click on                             programmes in schools and colleges to
                                                                                                                     a particular link mentioned in the sms.   Virus, worms and trojans  create awareness on cyber offences.
                                                                                                                     It has been found that many people are   Computer Virus is a program written   To monitor the functioning of all zon-
                                                                                                                     falling for this trap laid out by these cyber  to enter to your computer and damage/  al, district and police station level cyber
                                                                                                                     criminals and are losing money and their  alter your files/data and replicate them-  wings, a state-level cyber cell is already
                                                                                                                     private data stored on their mobiles.  selves. Worms are malicious programs   operational at the UP Police headquar-
                                                                                                                                                       that make copies of themselves again   ters. Specialised cyber police stations are
                                                                                                                     Phishing                          and again on the local drive, network   also functioning at Noida and Lucknow.
                                                                                                                     Phishing is a type of fraud that involves   shares, etc. A Trojan horse is not a virus.   Looking at the growing instances of
      of Jharkhand Police, Ataul Ansari was                                                                          stealing personal information such as   It is a destructive program that looks as   cybercrimes, UP Police is going to open
      nabbed.                                                                                                        Customer ID, IPIN, Credit/Debit Card   a genuine application. Unlike viruses,   six more specialised cyber police stations
        Similarly an MP from Kerala was                                                                              number, Card expiry date, CVV number,   Trojan horses do not replicate them -  at Agra, Kanpur, Bareilly, Varanasi, Gora-
      duped of  1.60 lakh, a Union minister had                                                                      etc. through emails that appear to be   selves but they can be just as destructive.  khpur and Prayagraj.
      lost  1.80 lakh and a MLA from UP was                                                                          from a legitimate source. This is another                             Karnataka is another state where the
      cheated off  5,000.                                                                                            very common type of data stealing prac-                             cyber crime is on a high, according to the
        These criminals succeed because of                                                                           tise used by the cyber criminals. People   Cyber-criminals          Cyber Crime Police Station in Bengalu-
      lack of awareness among masses and                                                                             receive emails from fake bank sites, gov-  are the new              ru, more than 12,700 cyber crime cases
      their ability to use technology to full ex-                                                                    ernment sites and other cooperate web-                              have been reported in the city between
      tent to escape from getting caught by the                                                                      sites which look similar to the original   entrepreneurs of the     January 2018 and September 2019. As per
      authorities.                                                                                                   sites. Cyber criminals are able to steal lot   21st Century: intelligent   the cyber police, every third of the case
        According to the report shared by the                                                                        of important information via phishing.                              reported, involves economic fraud in
      National Crime Records Bureau of India,                                                                                                               business people              Karnataka and are related to job scams, a
      21796 cases of cyber crime was reported   tive ways used by cyber criminals and   promise of better employment with   Spamming                      who have identified            third of them are related to OTP and UPI
      across India in the year of 2017, almost   others. As cyber criminals are intelligent  higher wages. Many cases have sur -  Spamming occurs when someone re-                       fraud, and the remaining are lottery re-
      doubled from 12,317 in the year 2016, out   bunch of people, it’s becoming difficult   faced in past few years where cyber   ceives an unsolicited commercial mes-  innovative ways to   lated scams.
      of which fraudulent transactions was the  for cyber safety authorities to track them  criminals  are  using  this  method  to    sages sent via email, SMS, MMS and                  According to cyber police, investigat-
      most reported cyber crimes.      down as these criminals keep on evolv-  extort money.                         any other similar electronic messaging    capitalise on others’     ing cyber crimes related to economic of-
        As per India’s official cyber crime re-  ing and are always one step ahead.                                  media. They may try to persuade recipi-      failings               fenses are very difficult as IP addresses or
      cords for 2017, Uttar Pradesh has record-  Being one of the fastest growing in-  Vishing                       ent to buy a product or service, or visit a                         phone numbers used for crime are from
      ed the highest number of cyber crimes   ternet markets of the world, India has   Vishing is an attempt where fraudsters   website where he can make purchases;                     African or eastern European countries.
      in 2017, with 4,971 cases out of the total   become a favourite destination for these   try to seek personal information like   or they may attempt to trick him/ her   Trojans open a backdoor entry to your   It gets difficult to track such people with
      21,796 cases. Maharashtra stood second   cyber criminals. These criminals are us-  Customer ID, Net Banking password,   into divulging bank account or credit   computer which gives malicious users/  the kind of technology available at their
      with 3,604 cases of cyber crime, followed  ing all sorts of technologies available at   ATM PIN, OTP, Card expiry date, CVV etc.   card details.  programs access to your system, allow-  disposal.
      by Karnataka with 3,174 cases.   their disposal to commit fraud and cheat  through a phone call. Many people have                                ing confidential and personal informa-  As the cases related to cyber crimes
        The main focus of cyber criminals   individuals in the country.   got calls from these fake customer care    SIM swap scam                     tion to be theft.                 are increasing, government bodies and
      was on the online cheating as 1896  cases   According to National Cyber Crime   agents representing banks and other   SIM Swap Scam occurs when fraudsters   That said, the attention and awareness  other agencies are becoming more ac-
      were recorded across India followed by   Reporting Portal of India, governed by   agencies to dupe people of their hard   manage to get a new SIM card issued   on cyber crime and cyber security have   tive to counter them and create aware-
      1543 cases of ATM frauds, 804 cases of   Ministry of Home Affairs, cybercrime   earned money by creating fear among   against a registered mobile number   significantly improved, as the govern-  ness  among  people  of  the  various
      online banking fraud, 334 cases of OTP   may be defined as “Any unlawful act   the customers of the banks or by prom-  fraudulently through the mobile service   ment, cyber vigilance bodies and other   methods used by these cyber criminals.
      frauds and so on. Fraud was the major   where computer or communication   ising lucrative offers on behalf of the   provider. With the help of this new SIM   corporate agencies have increased their   Police across many states are now gear-
      motive behind most of the cyber crimes.  device or computer network is used to   banks. A lot of cases have been reported   card, they get One Time Password (OTP)   efforts to protect people.  ing themselves with latest equipments
        NCRB data provides intriguing in-  commit or facilitate the commission of   where people have shared their details   and alerts, required for making finan-  Taking note of the growing cases of   and IT engineers to track these cyber
      sight into number of officially reported   crime”. Various methods used by the cy-  with these fake agents and have lost   cial transactions through victim’s bank    cyber crimes, the Uttar Pradesh govern-  criminals and to keep a tab on the new
      cases but there are large number of cases  ber criminals to commit the crime are:   money from their accounts.  account. Getting a new SIM card against   ment has decided to set up specialised   ways being adopted by them. Now time
      which often go unreported. There can be                                                                        a registered mobile number fraudulently  cyber wings which will have a presence   will tell how soon and effective our police
      many reasons due to which people don’t  Online job fraud           Smishing                                    is known as SIM Swap.             at police stations, districts, zones and   will be to control this rising crime indus-
      report such cases and they can be — lack  Online Job Fraud is an attempt to de-  Smishing is a type of fraud that uses                           headquarters for effective investigation   try of cyber criminals.
      of awareness among individuals, lack of   fraud people who are in need of em-  mobile phone text messages to lure vic-  Ransomware               of online crimes.
      awareness among authorities, innova-  ployment by giving them a false hope/   tims into calling back on a fraudulent   Ransomware  is  a  type  of  computer   These cyber wings will have a team   letters@tehelka.com



                                      Tehelka / 15 november 2019  48  www.Tehelka.com                                                                 Tehelka / 15 november 2019  49  www.Tehelka.com
   43   44   45   46   47   48   49   50   51   52   53