Assignment 01
Assignment 01
18-10-2023
Intro
Lakshmi Mini - Head CCIO
[email protected]
Session 3
Cyber Law
Gp Capt. P Aanand Naidu (retd.)
380+ Attendees
Physical + Cyber Space crime works together
Most crimes these days are orginating in Cyberspace
Breaches in EMail is very important
Using same password for all
Crime always committed with latest technology
inculcate Zero Trust in childeren
AI based algorithms - for HR
Create Cyber Aware Netizens
Retiree credentials shared by them to related
youngsters
Will to include Cyber / Digital Footprints Assets
Critical Information InfraStrucrue Protection Council
Cyber Emergency Response Team - IN
Law Enforcement Agency to investigation
CCIO to assist with them with Cyber Crime Investigation
Avoid helping any official in private capacity without
documented MOU
Intent is the main differentiator between Contravention
and Crime both are parallel remedial measures
Sec 66A is void ... but still crime under IPC in other
sections
Quick Notes Page 1
sections
Sec 66A - most common problem in India
Sec 66E - consent by below 18 years in no consent
Data Protection Officer - Scope
Data Protection Act
GDPR Applicability
Siri / Alexa - dangers
Checking SMS at least 3 times a day
Panic during Cyber Attack - So Cop connect has to be
enabled
4/24/72 time line for financial fraud reporting
complaining importance
Aadhar Biometrics to be locked
Lockers checking / Transaction and Master Accounts
Raise Cyber hygiene - maintenance importance
Cyber Security Awareness Officer - scope of
employability
RWA -
Session 4 19-10-2023
Sreeshankar - GM - Cyber
Drug Abuse and Sextortion
Systematic Manufacture and Supply in Opioids noticed
In Punjab mostly synthetic drugs are used
Awareness can bring down opioid usage
Inhalers mostly used by children - psycho active drugs
Turpentine / Thinners also used for getting high
Iodex / Tincture consumption -
drains Oxygen from blood and gives high
Quick Notes Page 2
drains Oxygen from blood and gives high
Magic Mushrooms also hallucinogens
Observing Indicators - Drastic changes
Lose Dressing Sense
Presentablility is lost
Seclusion and Reserved
Introduction
Exam details explanation by Usha Dev
04-11-2023 Exam
11-11-2023 Assignments
Session 1
Mr Shreeshankar
Joyful Parenting
AI in the classrooms
Use brain - apply senses - contextual and emotional connect missing
DOI.org
Meta - Verse ( VR )
Cyber Culture
Cyber bullying
Final Session
Ethics - Prof Joy Cheruvathoor
Professional Ethics At Work Place
Ethical qualities are universal and all languages have such wordings
If there is a Conflict of Interest - to be declared to the higher ups or recuse from decision
Dirty Hands Principle - for the general good, you may have to ignore a small percentage of people
From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000899181>
Tech Abuse
1. Research about the case of Justine Sacco. Write a 300 word summary of the
incident and what you think about the case.
2. What are the various ways in which the abuser can keep a track of person online?
List all the possible ways.
3. What is the process of deleting your location history or web activity history in gmail?
List the process
4. What is the process of enhancing your privacy in Facebook? list all the steps.
5. Find the top 10 applications on mobiles for casual dating.
6. List 3 news articles on impact of negative comments on people / celebrities on
Twitter or other social media accounts.
7. List top tools available online for spying on phones and computer systems.
8. List recent cases of use of fake images or deepfakes impacting people in real life.
9. Which country has witnessed most deaths due to selfies? List 5 incidents.
10. List 5 consequences / risks of sexting.
From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957049>
Cyberlaws
1. What is the crime and provisions if A changes password of B’s computer without
his knowledge?
2. What is the crime if A shares nude pictures with B, her friend in good faith but B
shares them with others without A’s consent?
3. What are the legal provisions if A, an executive in office sends nude pictures to B,
his female colleague who wants to make a complaint?
4. What is the offence if, A requests his son B to do research for a presentation in his
office and B downloads a catchphrase from a book and gives it to A who makes
the presentation and the company likes the catchphrase and uses for marketing a
From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957057>
Cyberpsychology
Cyber psychology assignment Questions:
1. What is cyberpsychology and what is it's relevance in present day?
2.Based on your understanding, describe how technology can impact human
psychology?
3.What is FOMO? How does it get expressed in human behaviour ?
4.How excessive usage of gadgets and media affect eating habits? Are there any
disorders related to this?
5.Describs the positive impacts of internet usage on human health and body?
6.What are Memes and how are they affecting language and culture?
7.What simple practices would you advocate for a safe cyber space and well
being?( Pls include both Physical and mental well-being)
From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957065>
Sextortion
1. What is Patreon?
2. What is OnlyFans?
3. What is the culture and trend of pornstars post Covid-19 to retain their business?
4. What is Webcam sex? How common is this in India?
Quick Notes Page 10
4. What is Webcam sex? How common is this in India?
5. What is Sextortion?
6. How do you file a complaint for sextortion in India?
7. What sections of law can we apply if someone is harassing you on WhatsApp with
explicit content?
8. What are the five most common fetishes people seek online?
9. List the top five dating / flirting apps for both Android and iPhone with their
features
10. Find top five websites where India teens (both men / women) can upload explicit
images and share online.
11. List ten news articles from last 24 months on sextortion in India.
12. List top five states in India with active cyber crime cells.
From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957073>
Sacco had a relatively small number of Twitter followers at the time, but
her tweet quickly went viral. Within hours, the hashtag
#HasJustineLandedYet was trending on Twitter, and her comment had
garnered international attention. Social media users, celebrities, and
news outlets condemned her tweet as being not only racist but also
thoughtless and irresponsible.
When she finally landed in South Africa, Sacco discovered that her life
had dramatically changed during her flight. The incident highlighted the
power of social media in both swiftly amplifying and punishing
inappropriate behavior. It also raised questions about the consequences
of online shaming and the fine line between free speech and hate
speech.
In the aftermath of the incident, Justine Sacco apologized for her tweet,
acknowledging the harm it had caused and expressing remorse for her
actions. However, the damage was already done, and her reputation
suffered lasting consequences. The "Justine Sacco incident" serves as a
cautionary tale about the potential consequences of careless social
media use and the importance of thinking before posting content online,
particularly in a global and interconnected world where words and
actions can quickly reverberate across the internet.
Online tracking methods can be used by individuals with malicious intent to monitor someone's
online activities and invade their privacy. It's important to be aware of these methods to protect
your online security and privacy. Here are various ways in which abusers can track someone
online:
1. **Social Media Stalking:** Abusers can monitor someone's social media profiles to gather
information about their personal life, activities, and relationships.
2. **Email Tracking:** They may use email tracking tools to know when and if an email has been
opened, which can reveal if the victim is active and responsive.
4. **GPS Tracking:** Abusers can use GPS tracking apps or devices to monitor the victim's
physical location through their smartphone or other devices.
5. **Spyware and Malware:** Malicious software can be installed on the victim's device to
monitor their online activities, record their conversations, and access personal data.
6. **Fake Social Media Accounts:** Abusers may create fake profiles to connect with the victim
and gather more information about them or to monitor their activities.
7. **Browser History:** Accessing the victim's device and checking their browser history can
reveal the websites they visit and their online interests.
8. **Online Account Passwords:** If the abuser has access to the victim's passwords, they can
log in to their accounts and monitor their communications and activities.
9. **Webcams and Microphones:** Hacking into a victim's webcam or microphone allows for
unauthorized audio and video surveillance.
10. **Location Services:** Mobile apps often request access to the user's location. Abusers may
exploit this to track the victim's movements.
11. **Online Public Records:** They may search for public records, social media posts, or other
publicly available information to gather details about the victim.
12. **Email and Messaging Apps:** Monitoring the victim's email and messaging apps, such as
WhatsApp or Facebook Messenger, can provide insight into their private conversations.
13. **Device Backups:** Abusers can access the victim's device backups stored in the cloud or
on a computer, which may contain sensitive data.
14. **Browser Cookies and Tracking Pixels:** Websites and online services may use cookies and
tracking pixels to collect data on a user's online behavior.
15. **Internet of Things (IoT) Devices:** Smart home devices can be hacked to gather
information about the victim's routines and activities.
Protecting against online tracking involves taking precautions like using strong, unique
passwords, enabling two-factor authentication, regularly updating software and antivirus
Gmail itself doesn't store location history or web activity history. However, if you are concerned
about your Google Account's activity data, including your search history and location history, you
can manage and delete this data through your Google Account settings. Here's how to do it:
1. Open your web browser and go to the Google Account page (https://myaccount.google.com/).
4. Under the "Activity controls" section, find "Location History," and click on it.
6. In the Location History settings, you can toggle the switch to "Pause" to stop Google from saving
your location history. If you want to delete your existing location history, click on "Delete Location
History" and confirm your choice.
1. From the "Data & personalization" page in your Google Account settings, under "Activity
controls," find "Web & App Activity" and click on it.
3. In the Web & App Activity settings, you can toggle the switch to "Pause" to stop Google from
saving your web and app activity. To delete your existing web and app activity, click on "Manage
activity" and use the "Delete activity by" option to choose the time range you want to delete. Then,
click "Delete."
Please note that these actions are specific to your Google Account and may affect your experience
with Google services. Pausing or deleting your location history and web activity will limit the
personalization and recommendations you receive from Google services.
Keep in mind that while you can delete this data from your Google Account, other platforms and
services may also collect data, so it's a good practice to review and manage your privacy settings on
those platforms as well.
Enhancing your privacy on Facebook involves adjusting various settings to control who can see
your posts, who can contact you, and what information is visible on your profile. Here are the
steps to enhance your privacy on Facebook:
3. **Privacy Checkup:**
Follow the prompts in the Privacy Checkup to review and adjust various privacy settings. This
will include reviewing who can see your posts, who can contact you, and more.
5. **Profile Information:**
- Click on "Profile and Tagging" on the left-hand side of the Privacy Settings and review who
can post on your timeline, who can see what others post on your timeline, and who can send
you friend requests. Adjust these settings according to your preferences.
8. **Blocking:**
- In Privacy Settings, click on "Blocking" to manage blocked users and app/blocking settings.
12. **Notifications:**
- You can adjust notification settings, including email and mobile notifications, under "Settings
& Privacy" > "Settings" > "Notifications."
By following these steps and regularly reviewing your Facebook privacy settings, you can better
control your online presence and safeguard your personal information. Remember to keep your
settings up to date, as Facebook may change its features and options over time.
The popularity of dating apps can vary by region and can change over time, so it's essential to check
your local app store for the most up-to-date and popular dating apps. As of my last knowledge
update in January 2022, here is a list of some popular dating apps for casual dating:
1. **Tinder:** Tinder is one of the most well-known dating apps globally, known for its swiping
feature, allowing users to quickly browse through profiles and make connections.
2. **Bumble:** Bumble gives women the power to make the first move, and it includes features for
both dating and making new friends.
3. **Hinge:** Hinge focuses on providing more in-depth profiles and encourages meaningful
connections based on shared interests and values.
4. **OkCupid:** OkCupid is known for its detailed user profiles and a wide range of compatibility
questions to help you find suitable matches.
5. **Coffee Meets Bagel:** Coffee Meets Bagel provides curated matches each day, emphasizing
quality over quantity.
6. **Grindr:** Grindr is a popular app for LGBTQ+ dating, primarily aimed at gay and bisexual men.
7. **HER:** HER is a dating app and social community for LGBTQ+ women, offering a safe and
inclusive space.
8. **Plenty of Fish (POF):** POF offers a free dating service with a large user base, providing various
features to help users find matches.
9. **Ship:** Ship is a unique app that allows your friends to get involved in your dating life by
helping you find matches and giving advice.
10. **DOWN Dating:** DOWN is an app that emphasizes casual and discreet encounters, allowing
users to express their intentions directly.
Please note that the popularity and availability of dating apps can change over time, and new apps
may have emerged since my last update. Always exercise caution when using dating apps, protect
your personal information, and be mindful of your safety when meeting new people in person.
Additionally, it's a good idea to read app reviews and user feedback to determine which app aligns
best with your preferences and goals.
Kathy Griffin
US broadcaster CNN
ditched comedian Kathy
Griffin from its New
Year
programme after she
posed with a fake
decapitated head of
President Donald
Trump.
Griffin apologised after
it provoked outrage -
her New Year's Eve co-
host
Anderson Cooper said
he was appalled. Quick Notes Page 19
he was appalled.
In addition, Griffin lost a
number of other jobs as
a consequence of the
joke.
Trump said it was "sick"
and his wife Melania
called the photo
"disturbing".
"Kathy Griffin should be
ashamed of herself,"
said the president. "My
children,
especially my 11-year-
old son, Barron, are
having a hard time with
this." Quick Notes Page 20
this."
In a video message
posted on Twitter,
Griffin "begged" for
forgiveness and said
she had "crossed a
line" - however she later
retracted the apology
telling ABC's
The View: "I'm not
holding back on this
family. This family is
different
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
Jack Maynard
Jack Maynard pulled
out of I'm A Celebrity... Quick Notes Page 21
out of I'm A Celebrity...
Get Me Out Of Here! in
2017
after just three days in
the jungle.
The YouTube star, who
has 1.4 million
followers, left after a
series of tweets -
most of which dated
from 2011 to 2013 -
were published in the
Sun while he
was in Australia.
It emerged that as well
as racist and
homophobic tweets,
Quick Notes Page 22
homophobic tweets,
Jack had also asked a
14-year-old fan to send
him nude pictures on
his Facebook account.
Maynard later
apologised saying he
was "young" and
"careless" when he sent
the posts, adding:
"Don't put anything
online you wouldn't say
to your mum."
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
James Arthur
The pop star had to
cancel his Quick Notes Page 23
cancel his
engagements in
November 2013 after
suffering a
Twitter meltdown.
The Say You Won't Let
Go singer used abusive
language to One
Direction's
Louis Tomlinson and
former X Factor winner
Matt Cardle.
Things came to a head
when he unveiled a rap
song in which he used
a
homophobic slur
Quick Notes Page 24
homophobic slur
against musician Micky
Worthless and advised
him to shoot
himself.
The star apologised on
Twitter saying he was
"deeply deeply sorry to
any gay or
lesbian people out
there".
A few months later
Arthur was officially
dropped from Simon
Cowell's record
label Syco, with Cowell
commenting: "I think
Quick Notes Page 25
commenting: "I think
James, unfortunately,
has had so
many issues with what
he has done publicly -
which is a real issue
with me.
Somebody should have
told him to shut upand
just put the records
out."
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
Azealia Banks
The 212 rapper was
dropped from her UK
booking agency and
axed from her Quick Notes Page 26
axed from her
headline slot at grime
and hip-hop festival
Born & Bred following
racist and
homophobic tweets to
Zayn Malik.
Her Twitter account
was also blocked after
the string of aggressive
tweets
aimed at the Pillowtalk
singer.
The row started when
Banks claimed Malik
had copied her work for
his new Quick Notes Page 27
his new
video, Like I Would.
Banks also posted a
string of derogatory
comments about the
UK rap scene,
saying that British
rappers "never have
swag" and British rap
music was a
"disgrace" to the genre.
The US rapper later
apologised for using
homophobic language
in a Facebook
post saying: "Words
hurt. And while I may
Quick Notes Page 28
hurt. And while I may
be immune to every
word and be
thicker skinned than
most, it doesn't mean
that I get to go around
treating people
with the same
toughness that made
my skin so thick.
"Because, that IS how
people get thick skin...
by being subjected to
name
calling/belittlement/abus
e and it's not fair.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
PewDiePie
The Swedish YouTube
star used the N-word in
one of his videos in
January
2017 and was accused
of anti-Semitism later in
the same month.
As a result, Disney
announced in February
2017 they would cut cut
ties with
PewDiePie - real name
Felix Kjellberg - who at Quick Notes Page 30
Felix Kjellberg - who at
the time was the world's
highest-paid YouTuber.
He was also dropped
from the Google
Preferred advertising
programme, and his
YouTube Red series
was cancelled.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
Kobe Bryant in
Kendrick Lamar’s music
video:
In Kendrick Lamar’s
music video “The Heart
Part 5,” no one
expected the
artist’s face to morph
into the late NBA player
Kobe Bryant.
Considering the
athlete’s untimely
passing, the video
resonated well with
both his fans and
Quick Notes Page 33
both his fans and
followers of the league,
gaining millions ofviews
within the first few days
of its
release.
Lamar used deepfake
technology to pay
homage to the late
Laker legend.
Bryant’s deepfake in
the music video is so
visually accurate and
spine-chilling
that it looks like he is
the one performing.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
Hillary Clinton’s
deepfake appearance
on SNL:
On an episode of SNL,
former Secretary of
State Hillary Clinton is
Quick Notes Page 40
State Hillary Clinton is
impersonated by one of
its cast members.
However, a YouTube
video showed a
comparison between
the cast member and a
deepfake of the former
first lady.
The results are
shocking because
Clinton’s face shows no
visible traces of being
rendered. As the
technology becomes
more sophisticated, it’s
expected that
Quick Notes Page 41
expected that
deepfakes will be
harder to notice,
emphasizing the need
for cautionary
measures.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
Vigilance Against
Deepfakes:
The examples above
should give you a
general idea of the Quick Notes Page 45
general idea of the
prevalence of
deepfakes. While the
videos above were
initially intended for
entertainment, it’s
important to understand
the possible
implications of this
technology.
Considering how well it
can mimic individuals,
some bad actors may
use the
tool to spread
misinformation and
commit fraud.
Quick Notes Page 46
commit fraud.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
Rescue services in
Croatia used Twitter to
ask tourists to "stop
taking stupid and
dangerous selfies" after
a Canadian
miraculously survived a
75-meter (250-foot)
fall in the Plitvice lakes
Quick Notes Page 57
fall in the Plitvice lakes
region.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
In January, Taiwanese
social media celebrity
Gigi Wu --known as the
"Bikini
Climber" for taking
selfies on top of
mountain peaks
dressed in a bikini --
died
when she fell into a
ravine. She was 36
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
In 2014, a Brazilian
woman sparked rage
online when she took a
smiling selfie
in front of the coffin of
presidential candidate
Eduardo Campos at his
funeral.
Selfies in places
deemed sacred or
hallowed --especially
when they honor the
dead --can also raise
questions
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
Residents of the
picturesque Rue
Cremieux in Paris were
so disturbed by the
constant stream of
selfie-snapping tourists
outside their windows
that they
started their own
Instagram account,
clubcremieux, where
Quick Notes Page 62
clubcremieux, where
they publish pictures
of the most absurd
posers outside their
doors, skewering them
with barbed
captions
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
What is sexting?
Sexting is sharing a
sexual message or
photo through a phone,
email account or
social media site. While
sexting can seem like
no big deal because it
doesn’t
carry the risk of
pregnancy or a sexually
transmitted infection
(STI), it can still
have some pretty
serious consequences.
Quick Notes Page 66
serious consequences.
Sexting consequences
Sexting can negatively
affect your mental
health, relationships
and future. It can
even have legal
consequences.
Before sending an
explicit photo,
remember that once an
image is out there, you
can’t get it back. What if
you and the other
person break up? What
if they share
your message or photo
Quick Notes Page 67
your message or photo
with their friends or
social media networks?
What if
your parents or
teachers found out? In
some cases, the image
could even end up
in the hands of a sexual
predator
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
What to do if someone
pressures you to sext
If someone asks you to
send a nude photo or
explicit message, you
may be
afraid to turn them
down because you
don’t want them to stop
Quick Notes Page 75
don’t want them to stop
liking you. But if
someone truly cares
about you, they won’t
ask you to do
something that puts
your mental health and
future at risk.
If someone sends you
an unwanted message
or pressures you to
sext, tell a
trusted adult. That’s
sexual harassment and
it’s not OK.
mSpy
mSpy is another one in
the great lists of phone
spying apps. What
really
separates it from others
on the list is the fact
that it is primarily used
as a
parental monitoring
app.
It is a feature-rich
platform and contains
capabilities like cell
phone monitoring,
Quick Notes Page 77
phone monitoring,
location tracking,
multimedia file
monitoring, online
activity tracking, etc. It
allows remotely
controlling apps and
programs on a planted
device.
Features:
• Social Media
Monitoring including
Facebook, Instagram,
Snapchat, etc.
• Recovering of deleted
messages,
• Remote blocking of
Quick Notes Page 78
• Remote blocking of
websites/apps/contacts,
etc.
• It has a screen
recorder.
Verdict: mSpy is a great
tool and offers all the
features required for
parental
control. It lets you
monitor every keystroke
& tap and social media
chats &
shared pictures. It
provides all these
monitoring features
without being detected.
Quick Notes Page 79
without being detected.
SpyBubble
SpyBubble is a very
easy spying app to use
and is an even easier
spying
application to install on
the device you want to
monitor. It is a cloud-
based
application that deploys
all of the features that
one has come to expect
from cell
phone spy apps of this
nature.
The device works
Quick Notes Page 80
The device works
spectacularly well on
stealth mode. So the
user of the phone
isn’t even aware as
their calls, messages,
location, and online
activity are
tracked and reported to
you remotely. The app
can also activate a
smart phone’s
camera and take
pictures without the
concerned person
noticing.
All the recorded
Quick Notes Page 81
All the recorded
information is sent and
can be accessed from a
secure web-
based account.
Features:
• Record Calls
• GPS Tracking
• Stealth Mode
• Screenshot Capture
• Remote Camera
Access
Verdict: SpyBubble
gives you full control of
the device it is planted
in, by
silently operating on it
Quick Notes Page 82
silently operating on it
without anyone
noticing. As such, the
application is
extremely intuitive and
is very easy to use.
XNSPY
XNSPY is perhaps one
of the most popular
phone spying apps on
this list. In
fact, it can be deemed
as an industry leader
when it comes to
spyware apps. It
can be a great
surveillance tool to
Quick Notes Page 83
surveillance tool to
keep tabs on your
children as well as your
employees.
It comes jam-packed
with over 30 advanced
features that allow you
to track
incoming/outgoing
phone calls, and keep a
tab on SMS in real-
time. Plus, you
also get to track the
phone’s GPS location,
which comes in handy
while trying
to track your children’s
Quick Notes Page 84
to track your children’s
location or finding a lost
phone.
The app has introduced
more advanced
features in recent years
like WIFI logs
and WhatsApp
monitoring. The app is
constantly evolving and
getting better
with each passing day.
Features:
• Monitor Phone Calls
and Messages
• Access Messenger
Chats Quick Notes Page 85
Chats
• Keylogger
• Track GPS
Monitor Online
Activities
Verdict: XNSPY
combines advanced
features, affordable
price, and robust
customer support to
deliver one of the best
phone spy apps
available today for
both Android and
iPhone users. Its
consistent evolving
nature alone makes it
Quick Notes Page 86
nature alone makes it
worth a buy
Cocospy is a cross-
compatible phone
spying app that is easy
to install and use.
It can be set up and
installed within 5
minutes and works in
complete stealth
mode, thus not allowing
the phone user to be
aware of its presence
on the
device. The app can be
used to monitor almost
everything happening
Quick Notes Page 87
everything happening
on the
target device in real-
time via a
comprehensive
dashboard.
You can check call
logs, track sent and
received SMSs, and
monitor online
browser history without
a hassle. The app also
allows you to track a
person’s
real-time location either
via SIM card or through
GPS technology.
Quick Notes Page 88
GPS technology.
Features:
• Geofence Alerts
• Call Tracker
• Social Media Spy
• Track Browser History
• Stealth Mode
Verdict: Cocospy’s
simple installation and
easy-to-navigate spying
dashboard
have earned it high
praise from several
users worldwide. No
smartphone
activity can remain
hidden with this app
Quick Notes Page 89
hidden with this app
installed and running
discreetly in the
background. The app
works fine on both iOS
and Android phones,
without the
need to jailbreak or root
any devices
uMobix
uMobix is the only app
that grants full access
to a person’s Instagram
and
Facebook accounts.
Users can enter
anyone’s Facebook and
Quick Notes Page 90
anyone’s Facebook and
Instagram, click on
any button there, which
means managing
accounts, adjusting
settings, adding
friends, or deleting
followers.
uMobix is the only app
that works perfectly well
on both iOS and
Android. It
means you can install it
without any hurdles on
the way and monitor it
with no
bugs occurred.
Quick Notes Page 91
bugs occurred.
uMobix doesn’t require
you to jailbreak iOS
devices, unlike many
other
competitors. You just
provide iCloud iD and
password and start
monitoring as
soon as the backup is
performed.
The app provides
absolutely innovative
features, like online
status indicator
(track when the user is
online), real-time
Quick Notes Page 92
online), real-time
reporting for
Androids,Youtube
monitoring, app activity
tracking, etc.
All in all, uMobix offers
the most value for its
price, being among the
most
affordable spy apps on
the market today.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>