main social media
TRANSCRIPT
-
8/9/2019 Main Social Media
1/18
Crimes on social media
Good content always has an objective; its created with intent. It therefore carries triggers to
action.
The best way to define social media is to break it down. edia is an instr!ment on
comm!nication" like a news#a#er or a radio" so social media wo!ld be a social instr!ment of
comm!nication. $ocial edia was created by the #!r#ose of having a common interest and
brining those #eo#le of different comm!nities together to share their interest on a #latform"
$ocial networking has enco!raged new ways to comm!nicate and share information. $!ch
%eb sites are !sed by millions of #eo#le every day.
<ho!gh having different social media sites the !sage may also differ in many contrasting
ways"
It being %eb' based #rovides a variety of ways for !sers to interact" s!ch as e'mail and
instant messaging services which enables !sers to #rovide them with their basic information
which they share and let #eo#le e(cess their acco!nts .any of the sites have comm!nities or
s!bgro!#s that may be based on a #artic!lar interest.
)ere are some e(am#les of social media websites*
+ $ocial ,ookmarking* -el.icio.!s" ,linklist" $im#y/ Interact by tagging websites and
searching thro!gh websites bookmarked by other #eo#le.
+ $ocial 0ews* -igg" 1ro#eller" 2eddit/ Interact by voting for articles and commenting on
them.
+ $ocial 0etworking*-3acebook" )i4" 5ast.3/ Interact by adding friends" commenting on
#rofiles" joining gro!#s and having disc!ssions.
+ $ocial 1hoto and 6ideo $haring* -7o!T!be" 3lickr/ Interact by sharing #hotos orvideos and
commenting on !ser s!bmissions.
+ %ikis. -%iki#edia" %ikia/ Interact by adding articles and editing e(isting articles. 8
1 Article by Daneial Nations
-
8/9/2019 Main Social Media
2/18
oreover" with the #o#!lation growth and the #revailing !se of these sites also has a
dangero!s side towards them. $ome of the #roblems which occ!r while !sing the social
networking sites are mainly*
8. 9nco!raging #oor grammar" !sage" and s#elling
:. &llowing the s#read of misinformation that may be #erceived as fact even in light of
evidence to the contrary
.9(#osing children to online #redators
-
8/9/2019 Main Social Media
3/18
commenting"
#hotogra'#hy related
networking"
worldwide
older
Google ,!DD General @#en
)i4 General. 1o#!lar in
India" 1ort!gal"
ongolia" Thailand"
2omania" Eamaica"
Central &frica and
5atin &merica. 0ot
#o#!lar in the B$&.
@#en to #eo#le 8 and
older. 0o children
allowed
5inkedIn ,!siness and
#rofessional
networking
@#en to #eo#le 8A and
older
o!th$h!t.com $ocial 0etwork" social
media" cons!mer
reviews
@#en
y @#era ,logging" mobile
blogging" sharing#hotos" connecting
with friends. Global
@#en
y$#ace General. )T5 based
site.
@#en to ages 8 and
!#.
0etlog General. 1o#!lar in
9!ro#e" T!rkey" the
&rab %orld and
CanadaFs !Hbec
#rov'ince. 3ormerly
known as 3acebo( and
2edbo(.
@#en to #eo#le 8 and
older
@rk!t General. @wned by
Google Inc. 1o#!lar in
,raDil and
decreasingly" in India.
@#en to #eo#le 8A and
older" -Google login/
Tagged General. $!bject to @#en
-
8/9/2019 Main Social Media
4/18
!ite some contro'
versy abo!t its e'mail
marketing and #rivacy
#olicy
Twitter General. icro'
blogging" 2$$"
!#dates
@#en
%&70 Travel and lifestyle @#en to #eo#le 8A and
older
These are some #o#!lar sites de#icting the vario!s social media sites giving the general view
and age limit which are re!ired to be #art of these sites.
INDIAN YOUTH ABOUT THE SOCIAL NETWORKING SITES
The Indian yo!th have immediately taken to social net'working sites" m!ch in the same way
they took !# internet as a technology. )arnessing the #ower of Internet" abo!t >4 #ercent of
IndiaFs yo!th #refers social media over #hone calls to comm!nicate" with more st!dents !sing
the 0et for school'related tasks. Tata Cons!ltancy $ervices -TC$/ Gen'7 s!rvey :J8:'8"
revealed that todayFs yo!th are collaborating thro!gh social networking tools and b!ilding
virt!al comm!nities aided by affordable bandwidth and smart device. The e(ha!stive st!dy
by IndiaFs largest software services e(#orter covered nearly 8>"4JJ high'school st!dents
across 8< Indian cities and claimed to have cond!cted the first s!ch s!rvey in India.
-
8/9/2019 Main Social Media
5/18
%ith the rise of social media" b!rglars have easier access to s#ecific information regarding
homeowners than ever before. Twitter and 3acebook are most #rone sites to s!ch ha##enings
as they let #eo#le share their #ersonal belongings so o#enly on these sites that all the #ersonal
st!ff is easily accessible to almost to everyone. The basic where abo!t of any individ!al are
#resent on these sites which lets these b!rglars access easily. &ccording to the s!rvey" a thief
steals an average of M from a home on a single visit and this all ha##ened beca!se of the
#ersons #osting constant !#dates abo!t himself 4. @ther social networking a##lications" s!ch
as fo!rs!are and Go walla are #rimarily location'based networks which also add to this tally.
2. S!"al E#g"#$$r"#g % &'"('"#g
$ocial engineering which refers to refers to the social mani#!lation of large gro!#s of #eo#le
to meet #olitical or economic ends. This is a ty#e of confidence trick for the #!r#ose of
information gathering" fra!d" or com#!ter system access. It differs from traditional cons in
that often the attack is often a mere ste# in a more com#le( fra!d=
1hishing is the act of attem#ting to ac!ire information s!ch as !sernames" #asswords" and
credit card details -and sometimes" indirectly" money/ by mas!erading as a tr!stworthy
entity in an electronic comm!nication. 1hishing is an e(am#le of social engineering
techni!es !sed to deceive !sers" and e(#loits the #oor !sability of c!rrent web sec!rity
technologies.>
). Mal*ar$
alware related scams involving social networking sites are seen !ite fre!ently these days.
any incidents have come to the forefront in the last few months" and the #roblem seem
rising every day. This #roves that how malware writers foc!s on the web as their #rimary
target" and it has shown the v!lnerability of social networking sites as well. This is the reason
why sites like Twitter and 3acebook have taken ste#s to enhance their sec!rity from e(#licit
links and #o#'!#s. $ome #ercentages" 3acebook* =JN y$#ace* 8AN. Twitter* 8>N
5inkedIn*
-
8/9/2019 Main Social Media
6/18
+. I,$#-"-y T'$-
2ecent research reveals that identity theft affects millions of #eo#le a year" costing victims
co!ntless ho!rs and money in identity recovery and re#air. It is act!ally a combination of
factors like lack of cons!mer knowledge regarding #rotecting yo!r identity online" growing
comfort with" and tr!st in" social #latform #roviders" the need for social #latforms to generate
reven!e" and a lack of standards or #olicing of these standards. <ho!gh this iss!e is not yet
in the mainstream conscio!sness" it likely will be sooner rather than later.LIn :J8J" statistics
of cyberstalking victimiDation com#iled by %ho showed that harassment most often
originated thro!gh emails" com#rising
-
8/9/2019 Main Social Media
7/18
CASE STUDIES
Ca($ 1 F"r(- !#3"!-"# "# I#,"a12
& com#laint was filed in by $ony India 1rivate 5td" which r!ns a website called sony'
sambandh.com" targeting 0on 2esident Indians. The website enables 02Is to send $ony
#rod!cts to their friends and relatives in India after they #ay for it online. The com#any
!ndertakes to deliver the #rod!cts to the concerned reci#ients. In ay :JJ:" someone logged
onto the website !nder the identity of ,arbara Cam#a and ordered a $ony Colo!r Television
set and a cordless head #hone. & lady gave her credit card n!mber for #ayment and re!ested
that the #rod!cts be delivered
to &rif &Dim in 0oida. The #ayment was d!ly cleared by the credit card agency and the
transaction #rocessed. &fter following the relevant #roced!res of d!e diligence and checking"
the com#any delivered the items to &rif &Dim.
&t the time of delivery" the com#any took digital #hotogra#hs showing the delivery being
acce#ted by &rif &Dim.
The transaction closed at that" b!t after one and a half months the credit card agency
informed the com#any that this was an !na!thoriDed transaction as the real owner had denied
having made the #!rchase. The com#any lodged a com#laint for online cheating at the
Central ,!rea! of Investigation which registered a case !nder $ection
-
8/9/2019 Main Social Media
8/18
-
8/9/2019 Main Social Media
9/18
The same was taken on file in C.C.0@.
-
8/9/2019 Main Social Media
10/18
one year rigoro!s im#risonment and im#osing a fine of 2s. 8J"JJJ !nder $ection
-
8/9/2019 Main Social Media
11/18
associates ' $aravanan" 6ijayan and &sir G!nasingh. The E!dge while awarding life term to
1rakash observed that considering the gravity of the offences committed by the main acc!sed"
ma(im!m #!nishment !nder the Immoral Trafficking &ct -life im#risonment/ sho!ld be
given to him and no leniency sho!ld be shown. The E!dge sentenced 1rakash !nder the
Immoral Trafficking &ct" I1C" &rms &ct and Indecent 2e#resentation of %omen -1revention/
&ct among others.
Ca($ 9 :u3$#"l$ u#, gu"l-y r ($#,"#g -'r$a-$#"#g $6a"l.
& 8= year old st!dent from &hmadabad who threatened to blow !# &ndheri 2ailway station
in an email message was fo!nd g!ilty by the E!venile co!rt in !mbai. & #rivate news
channel received an email on 8A arch :JJA claiming sender as awood Ibrahim gang
saying a bomb wo!ld be #lanted on an !ns#ecified train to blow it !#.
The case was registered in &ndheri 1olice station !nder section 4J= of I1C and transferred to
cyber crime investigation cell. !ring Investigation CCIC traced the cyber cafe from which
the email acco!nt was created and threatening email was sent. Cafe owner told #olice abo!t
friends which had come that day to s!rf the net. 1olice $!mmoned them and fo!nd that the
system which was !sed to send email was accessed by only one c!stomer. @n ::nd arch
JA" #olice arrested the boy a Class QII science st!dent who d!ring interrogation said that he
sent the
email for f!n of having his #rank flashed as breaking news on television.
$e#arate cases now*
T'r$$ 8$8l$ '$l, gu"l-y "# # l"#$ !r$,"- !ar, (!a6
C!stomers credit card details were mis!sed thro!gh online means for booking air'tickets.
These c!l#rits were ca!ght by the city Cyber Crime Investigation Cell in #!ne. It is fo!nd
that details mis!sed were belonging to 8JJ #eo#le.
r. 1arvesh Cha!han" ICICI 1r!dential 5ife Ins!rance officer had com#lained on behalf of
one of his c!stomer. In this regard r. $anjeet ahavir $ingh 5!kkad" harmendra ,hika
ale and &hmead $ikandar $haikh were arrested. 5!kkad being em#loyeed at a #rivate
instit!tion" ale was his friend. $haiklh was em#loyed in one of the branches of $tate ,ank
of India .
-
8/9/2019 Main Social Media
12/18
&ccording to the information #rovided by the #olice" one of the c!stomer received a $$
based alert for #!rchasing of the ticket even when the credit card was being held by him.
C!stomer was alert and came to know something was fishy; he en!ired and came to know
abo!t the mis!se. )e contacted the ,ank in this regards. 1olice observed involvement of
many ,ankFs in this reference.
The tickets were book thro!gh online means. 1olice re!ested for the log details and got the
information of the 1rivate Instit!tion. Investigation revealed that the details were obtained
from $tate ,ank of India . $haikh was working in the credit card de#artment; d!e to this he
had access to credit card details of some c!stomers. )e gave that information to ale. ale in
ret!rn #assed this information to his friend 5!kkad. Bsing the information obtained from
ale 5!kkad booked tickets. )e !sed to sell these tickets to c!stomers and get money for the
same. )e had given few tickets to vario!s other instit!tions.
Cyber Cell head C1 $!nil 1!lhari and 1I ohan ohadikar &.1.I ate were involved in
eight days of investigation and finally ca!ght the c!l#rits. In this regards vario!s ,anks have
been contacted; also fo!r air'line ind!stries were contacted. C1 $!nil 1!lhari has re!ested
c!stomers who have fallen in to this tra# to inform #olice a!thorities on :=8:'
-
8/9/2019 Main Social Media
13/18
-
8/9/2019 Main Social Media
14/18
Technology &ct" :JJJ contents the #rovisions regarding j!risdiction. $ection 8-/" - Ca($!bio!s tactics of a #rominent b!sinessman from &ndhra
1radesh was e(#osed after officials of the de#artment got hold of com#!ters !sed by the
acc!sed #erson. The owner of a #lastics firm was arrested and 2s :: crore cash was
recovered from his ho!se by sle!ths of the 6igilance e#artment. They so!ght an e(#lanation
from him regarding the !nacco!nted cash within 8J days. The acc!sed #erson s!bmitted
="JJJ vo!chers to #rove the legitimacy of trade and tho!ght his offence wo!ld go !ndetected
b!t after caref!l scr!tiny of vo!chers and contents of his com#!ters it revealed that all of
them were made after the raids were cond!cted. It later revealed that the acc!sed was
r!nning five b!sinesses !nder the g!ise of one com#any and !sed fake and com#!terised
vo!chers to show sales records and save ta(.
&ARLIAMENT ATTACK CASE
,!rea! of 1olice 2esearch and evelo#ment at )yderabad had handled some of the to#
cyber cases" incl!ding analysing and retrieving information from the la#to# recovered fromterrorist" who 1arliament. The la#to# which was seiDed from the two terrorists" who were
g!nned down when 1arliament was !nder siege on ecember 8 :JJ8" was sent to Com#!ter
3orensics ivision of ,12 after com#!ter e(#erts at elhi failed to trace m!ch o!t of its
contents.
The la#to# contained several evidences that confirmed of the two terrorists motives" namely
the sticker of the inistry of )ome that they had made on the la#to# and #asted on their
ambassador car to gain entry into 1arliament )o!se and the the fake I card that one of the
two terrorists was carrying with a Government of India emblem and seal. The emblems -of
the three lions/ were caref!lly scanned and the seal was also craftly made along with
residential address of Eamm! and ashmir. ,!t caref!l detection #roved that it was all forged
and made on the la#to#.
Baa?$$.!6 !a($* C9@ of ,aaDee.com was arrested in ecember :JJ< beca!se a C with
objectionable material was being sold on the website. The C was also being sold in the
markets in elhi. The !mbai city #olice and the elhi 1olice got into action. The C9@ was
-
8/9/2019 Main Social Media
15/18
later released on bail. This o#ened !# the !estion as to what kind of distinction do we draw
between Internet $ervice 1rovider and Content 1rovider. The b!rden rests on the acc!sed that
he was the $ervice 1rovider and not the Content 1rovider. It also raises a lot of iss!es
regarding how the #olice sho!ld handle the cyber crime cases and a lot of ed!cation is
re!ired.
&REVENTIONAL TI&S
9ach social media site offers ti#s on how to !se their service and still maintain a high level of
sec!rity. 5isted below are their #olicies by following their sec!rity g!idelines and ado#t
their best #ractices.
Fa!$0There is a com#rehensive hel# #age on 3acebook where yo! can find details on
#rotecting yo!r acco!nt against hacking and other sec!rity threats. Check it fre!ently to
make s!re yo!r #ractices and settings are !# to date. C09T also offers #ractical advice s!ch
as being s!re to block yo!r e( and caref!lly manage who has viewing access.
Fur(@uar$* 3or a better !nderstanding of who can see information associated with yo!r
3o!rs!are acco!nt" visit the )el# Center. This #age e(#lains methods for creating sec!rity
settings for every acco!nt scenario. 9ns!re yo!r check'ins are safe and sec!re by !tiliDing
these five ti#s from CI@.
I#(-agra6If yo! have an Instagram acco!nt" read their official #age for ways to kee# yo!r
acco!nt safe.
L"#$,I#6isit 5inkedInFs )el# Center for a wide range of acco!nt sec!rity articles. & few
of the to#ics covered on the #age incl!de methods for #rotecting yo!r #rivacy" yo!r identity
and yo!r acco!nt. They also offer ti#s for dealing with #hishing" s#am and malware. If yo!r
5inkedIn acco!nt is associated with a b!siness" )ow 0ot to )ave 7o!r &cco!nt )acked
#rovides ways to kee# #asswords safe even if several #eo#le have access to the acco!nt.
&"#-$r$(-To kee# yo!r 1interest acco!nt sec!re" yo! will need to access two main sections
on the site* #rivacy settings and acco!nt sec!rity. If yo!r acco!nt has been hacked or #laced
in a $afe mode by 1interest" yo! will !se the acco!nt sec!rity section to resolve the iss!e.
)owever" most likely yo! will only need to !se the the #rivacy settings section. This is where
yo! control what others can view and the degree of #ersonaliDation desired. $cams are one
iss!e the site has dealt with in the #ast.
-
8/9/2019 Main Social Media
16/18
Tu60lrIf yo! !se T!mblr" one of the best ways to im#rove sec!rity is to !tiliDe the recently
im#lemented two'factor a!thentication. 3or all yo!r settings" tho!gh" access the siteFs sec!rity
settings #age. )ere yo! can learn how to revoke third'#arty a##lication #ermissions as well
as how to remove s#am from yo!r blog. 3or increased sec!rity" according to 9ntre#rene!r
magaDine" yo! may want to refrain from !sing free themes.
T*"--$r6isit TwitterFs )el# Center to learn best #ractices for yo!r Tweets or if yo! want to
know how to connect with or revoke third'#arty a##lications. &lso visit this #age to discover
methods for controlling acco!nt settings so yo! can get the level of sec!rity yo! want.
YuTu0$Ggl$If yo! have a 7o!T!be and?or GoogleS acco!nt" bookmark GoogleFs
ee#ing 7o!r &cco!nt $ec!re #age. This #age is great so!rce to learn abo!t their two'ste#
verification #rocess" malware and vir!s iss!es" general information abo!t yo!r acco!nt
settings and best #ractices for #rotecting yo!r #rivacy and identity.
entioned below are some #racse which can be followed
0ever" ever give o!t yo!r social sec!rity n!mber or drivers license n!mbers.
Consider !ni!e !ser names and #asswords for each #rofile.
6ary yo!r #asswords and change them reg!larly.
ont give o!t yo!r !sername and #assword to third #arties -even if it hel#s yo!
connect to others and b!ild yo!r network/.
&ss!ming yo! #lan to be active in social media" minimiDe the !se
of #ersonal information on yo!r #rofiles that may be !sed for #assword verification
or #hishing attacks.
&void listing the following information #!blicly* date of birth" hometown" home
address" year of high school or college grad!ation" #rimary e'mail address. @nly invite #eo#le to yo!r network that yo! know or have met" as o##osed to friends
of friends and strangers.
3or #assword sec!rity verification !estions" !s a #assword for all answers -rather
than the answer to the s#ecific !estion" like %hat is yo!r mothers maiden
name/.
-
8/9/2019 Main Social Media
17/18
%hen age'shifting to #rotect yo!r real birthday" kee# the date close; otherwise" yo!
may e(#ose yo!rself to age discrimination.8