0% found this document useful (0 votes)
72 views

Assignment 01

Uploaded by

Saleem Beeravu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Assignment 01

Uploaded by

Saleem Beeravu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 94

ISAC 18-10-2023

19 January 2019 10:12

18-10-2023
Intro
Lakshmi Mini - Head CCIO
[email protected]
Session 3
Cyber Law
Gp Capt. P Aanand Naidu (retd.)
380+ Attendees
Physical + Cyber Space crime works together
Most crimes these days are orginating in Cyberspace
Breaches in EMail is very important
Using same password for all
Crime always committed with latest technology
inculcate Zero Trust in childeren
AI based algorithms - for HR
Create Cyber Aware Netizens
Retiree credentials shared by them to related
youngsters
Will to include Cyber / Digital Footprints Assets
Critical Information InfraStrucrue Protection Council
Cyber Emergency Response Team - IN
Law Enforcement Agency to investigation
CCIO to assist with them with Cyber Crime Investigation
Avoid helping any official in private capacity without
documented MOU
Intent is the main differentiator between Contravention
and Crime both are parallel remedial measures
Sec 66A is void ... but still crime under IPC in other
sections
Quick Notes Page 1
sections
Sec 66A - most common problem in India
Sec 66E - consent by below 18 years in no consent
Data Protection Officer - Scope
Data Protection Act
GDPR Applicability
Siri / Alexa - dangers
Checking SMS at least 3 times a day
Panic during Cyber Attack - So Cop connect has to be
enabled
4/24/72 time line for financial fraud reporting
complaining importance
Aadhar Biometrics to be locked
Lockers checking / Transaction and Master Accounts
Raise Cyber hygiene - maintenance importance
Cyber Security Awareness Officer - scope of
employability
RWA -

Session 4 19-10-2023
Sreeshankar - GM - Cyber
Drug Abuse and Sextortion
Systematic Manufacture and Supply in Opioids noticed
In Punjab mostly synthetic drugs are used
Awareness can bring down opioid usage
Inhalers mostly used by children - psycho active drugs
Turpentine / Thinners also used for getting high
Iodex / Tincture consumption -
drains Oxygen from blood and gives high
Quick Notes Page 2
drains Oxygen from blood and gives high
Magic Mushrooms also hallucinogens
Observing Indicators - Drastic changes
Lose Dressing Sense
Presentablility is lost
Seclusion and Reserved

Extremely Docile / Submissive sometime


Withdrawal Symptoms sometimes increases addiction
Criminals can hide in dark web
Addiction Vs Consumption - impact on behavioural
paterns
Dark Web / Deep Web / Open internet different
vaiations
DSM-V - Awareness but cannot intervene and need
support of specialist intervention
Addiction - Different cases and scenarios - do not judge
and advice
Don't put injured to pressure - needs medical
intervention
Sometimes Victim may use thier diease as means to
increase their additcion
Holistic support from all in getting out of addiction
Universal Screening Methods

Quick Notes Page 3


Scope of CCIO in Addiction cases
SEXTortion
Digital Clogging
Use Personal Data - to manipulate , intimidate ,
Stages in Sextortion
to know and resolve sextortion cases
Exam 4th Nov
Assignment 11th Nov

Quick Notes Page 4


ISAC 25-10-2023
25 October 2023 18:24

Introduction
Exam details explanation by Usha Dev
04-11-2023 Exam
11-11-2023 Assignments

Session 1
Mr Shreeshankar
Joyful Parenting

AI in the classrooms
Use brain - apply senses - contextual and emotional connect missing

DOI.org

Meta - Verse ( VR )

Nevermet , Furrycons - Dating apps on Meta

Porn Industry has a large Impact with GPT3 - AI based Chat


Bots

Resurrecting dead grandparents /

Loneliness can drive you to Metaverse

Cyber Culture

Cyber bullying

Interland from Google for intro to new comers

Quick Notes Page 5


Policy Classification Master
Insurer Master
Client Master
Amex Branch / User Master

Quick Notes Page 6


ISAC 26-10-2023
26 October 2023 18:22

Final Session
Ethics - Prof Joy Cheruvathoor
Professional Ethics At Work Place

Professional Ethics on Cyber Security


Most wrong seen in Cyber Security due to unethical practices in Cyber Space
Create a Ethical Workforce in India
Double Edged Sword - Cyber Security Professional

Clean Exit - Ethics Card - Collaborator


Why it is required
Critical / Sensitive Information of the Injured / First Aid
So we need to provide an undertaking to that effect to become CCIO

Ethical qualities are universal and all languages have such wordings

Personal and Professional


Ethics

Professional Ethics to be followed by professional code of ethics

If there is a Conflict of Interest - to be declared to the higher ups or recuse from decision

Quid Pro Quo - bribe

Dirty Hands Principle - for the general good, you may have to ignore a small percentage of people

Quick Notes Page 7


37396244 and
37395621

Quick Notes Page 8


Gaming
Please research on the following topics:
1. List top 10 popular Games in the following (2019): Android, iPhone, PlayStation
and Xbox
2. What are gaming cafes? Can you find any listings online for such cafes in
India?
3. List top 10 violent incidents / news related to PUBG in 2019-2020
4. What are the top five most controversial games and why?
5. List top 20 articles related to gaming deaths globally in 2019-2020
6. List top MMORPG online
7. Spend 1 hour on watching various streams on Twitch.tv
8. List top 5 Gaming magazines globally
9. What are the top symptoms of excessive gaming? Write a 300 word essay on
this.
10. What are the measures you will take as a policy maker in India to prevent
gaming addiction? Write a 300 word essay on this.

From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000899181>

Tech Abuse
1. Research about the case of Justine Sacco. Write a 300 word summary of the
incident and what you think about the case.
2. What are the various ways in which the abuser can keep a track of person online?
List all the possible ways.
3. What is the process of deleting your location history or web activity history in gmail?
List the process
4. What is the process of enhancing your privacy in Facebook? list all the steps.
5. Find the top 10 applications on mobiles for casual dating.
6. List 3 news articles on impact of negative comments on people / celebrities on
Twitter or other social media accounts.
7. List top tools available online for spying on phones and computer systems.
8. List recent cases of use of fake images or deepfakes impacting people in real life.
9. Which country has witnessed most deaths due to selfies? List 5 incidents.
10. List 5 consequences / risks of sexting.

From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957049>

Cyberlaws
1. What is the crime and provisions if A changes password of B’s computer without
his knowledge?
2. What is the crime if A shares nude pictures with B, her friend in good faith but B
shares them with others without A’s consent?
3. What are the legal provisions if A, an executive in office sends nude pictures to B,
his female colleague who wants to make a complaint?
4. What is the offence if, A requests his son B to do research for a presentation in his
office and B downloads a catchphrase from a book and gives it to A who makes
the presentation and the company likes the catchphrase and uses for marketing a

Quick Notes Page 9


the presentation and the company likes the catchphrase and uses for marketing a
product?
5. A helps her son in doing a project by downloading some material from Google and
the project is non-commercial in nature. Is there an offence committed?
6. B publishes a comparative study on growth in children who have been asked to do
different types of exercises. The study is for a company making lingerie. A drags
B to the court as the report contains some pictures of private parts of teenaged
girls. Comment on the legal provisions?
7. Explain the concept of zero liability and limited liability in banking frauds?
8. A asks her classmates to photograph her topless in the classroom. One of the
boys
sends those photographs to his brother. What is the offence?
9. A projects himself as PS to the Central Minister for Human Engineering Ministry
and asks B to transfer INR 10 lakh to an account. Later, it is learnt that he is not
PS to the Minister. What is the offence?
10. A and B are husband and wife who have a marital discord B requests C, a bank
employee for the bank account summary of a joint account with either or survivor
operations. a complains to the police. Comment.

From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957057>

Cyberpsychology
Cyber psychology assignment Questions:
1. What is cyberpsychology and what is it's relevance in present day?
2.Based on your understanding, describe how technology can impact human
psychology?
3.What is FOMO? How does it get expressed in human behaviour ?
4.How excessive usage of gadgets and media affect eating habits? Are there any
disorders related to this?
5.Describs the positive impacts of internet usage on human health and body?
6.What are Memes and how are they affecting language and culture?
7.What simple practices would you advocate for a safe cyber space and well
being?( Pls include both Physical and mental well-being)

From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957065>

Sextortion
1. What is Patreon?
2. What is OnlyFans?
3. What is the culture and trend of pornstars post Covid-19 to retain their business?
4. What is Webcam sex? How common is this in India?
Quick Notes Page 10
4. What is Webcam sex? How common is this in India?
5. What is Sextortion?
6. How do you file a complaint for sextortion in India?
7. What sections of law can we apply if someone is harassing you on WhatsApp with
explicit content?
8. What are the five most common fetishes people seek online?
9. List the top five dating / flirting apps for both Android and iPhone with their
features
10. Find top five websites where India teens (both men / women) can upload explicit
images and share online.
11. List ten news articles from last 24 months on sextortion in India.
12. List top five states in India with active cyber crime cells.

From <https://training.isacindia.org/course/ccio-certified-cyber-crime-intervention-officer?
previouspage=myenrollments#/course/3241066000000673421/attend/section/3241066000000898200/lesson/324106600
0000957073>

Quick Notes Page 11


Tech Abuse - Case of Justine Sacco
05 November 2023 22:40

Justine Sacco, a former PR executive, became the center of a major


controversy in December 2013 due to a controversial tweet she posted
before boarding a flight to South Africa. Sacco's tweet read, "Going to
Africa. Hope I don't get AIDS. Just kidding. I'm white!" The tweet was
widely criticized for being offensive, racially insensitive, and making light
of a serious global health issue.

Sacco had a relatively small number of Twitter followers at the time, but
her tweet quickly went viral. Within hours, the hashtag
#HasJustineLandedYet was trending on Twitter, and her comment had
garnered international attention. Social media users, celebrities, and
news outlets condemned her tweet as being not only racist but also
thoughtless and irresponsible.

As the public backlash intensified, Sacco's employer, IAC, the parent


company of PR firm InterActiveCorp, quickly distanced itself from her
comments and issued a statement denouncing her tweet. Within hours,
Justine Sacco was fired from her position as a Senior Director of
Corporate Communications.

When she finally landed in South Africa, Sacco discovered that her life
had dramatically changed during her flight. The incident highlighted the
power of social media in both swiftly amplifying and punishing
inappropriate behavior. It also raised questions about the consequences
of online shaming and the fine line between free speech and hate
speech.

In the aftermath of the incident, Justine Sacco apologized for her tweet,
acknowledging the harm it had caused and expressing remorse for her
actions. However, the damage was already done, and her reputation
suffered lasting consequences. The "Justine Sacco incident" serves as a
cautionary tale about the potential consequences of careless social
media use and the importance of thinking before posting content online,
particularly in a global and interconnected world where words and
actions can quickly reverberate across the internet.

Quick Notes Page 12


Tech Abuse -Track online
05 November 2023 22:44

Online tracking methods can be used by individuals with malicious intent to monitor someone's
online activities and invade their privacy. It's important to be aware of these methods to protect
your online security and privacy. Here are various ways in which abusers can track someone
online:

1. **Social Media Stalking:** Abusers can monitor someone's social media profiles to gather
information about their personal life, activities, and relationships.

2. **Email Tracking:** They may use email tracking tools to know when and if an email has been
opened, which can reveal if the victim is active and responsive.

3. **Keyloggers:** Malicious software or hardware keyloggers can record keystrokes, capturing


passwords, messages, and other sensitive information.

4. **GPS Tracking:** Abusers can use GPS tracking apps or devices to monitor the victim's
physical location through their smartphone or other devices.

5. **Spyware and Malware:** Malicious software can be installed on the victim's device to
monitor their online activities, record their conversations, and access personal data.

6. **Fake Social Media Accounts:** Abusers may create fake profiles to connect with the victim
and gather more information about them or to monitor their activities.

7. **Browser History:** Accessing the victim's device and checking their browser history can
reveal the websites they visit and their online interests.

8. **Online Account Passwords:** If the abuser has access to the victim's passwords, they can
log in to their accounts and monitor their communications and activities.

9. **Webcams and Microphones:** Hacking into a victim's webcam or microphone allows for
unauthorized audio and video surveillance.

10. **Location Services:** Mobile apps often request access to the user's location. Abusers may
exploit this to track the victim's movements.

11. **Online Public Records:** They may search for public records, social media posts, or other
publicly available information to gather details about the victim.

12. **Email and Messaging Apps:** Monitoring the victim's email and messaging apps, such as
WhatsApp or Facebook Messenger, can provide insight into their private conversations.

13. **Device Backups:** Abusers can access the victim's device backups stored in the cloud or
on a computer, which may contain sensitive data.

14. **Browser Cookies and Tracking Pixels:** Websites and online services may use cookies and
tracking pixels to collect data on a user's online behavior.

15. **Internet of Things (IoT) Devices:** Smart home devices can be hacked to gather
information about the victim's routines and activities.

Protecting against online tracking involves taking precautions like using strong, unique
passwords, enabling two-factor authentication, regularly updating software and antivirus

Quick Notes Page 13


passwords, enabling two-factor authentication, regularly updating software and antivirus
programs, and being cautious about sharing personal information online. Additionally, if you
suspect you are being tracked, seek help from a trusted source, and consider involving law
enforcement or legal authorities if your safety is at risk.

Quick Notes Page 14


Tech Abuse -Location History
05 November 2023 22:47

Gmail itself doesn't store location history or web activity history. However, if you are concerned
about your Google Account's activity data, including your search history and location history, you
can manage and delete this data through your Google Account settings. Here's how to do it:

**To Delete Your Google Account's Location History:**

1. Open your web browser and go to the Google Account page (https://myaccount.google.com/).

2. Sign in with the Google Account that you want to manage.

3. In the left-hand menu, click on "Data & personalization."

4. Under the "Activity controls" section, find "Location History," and click on it.

5. You may need to sign in again for security purposes.

6. In the Location History settings, you can toggle the switch to "Pause" to stop Google from saving
your location history. If you want to delete your existing location history, click on "Delete Location
History" and confirm your choice.

**To Delete Your Google Account's Web & App Activity:**

1. From the "Data & personalization" page in your Google Account settings, under "Activity
controls," find "Web & App Activity" and click on it.

2. You may need to sign in again.

3. In the Web & App Activity settings, you can toggle the switch to "Pause" to stop Google from
saving your web and app activity. To delete your existing web and app activity, click on "Manage
activity" and use the "Delete activity by" option to choose the time range you want to delete. Then,
click "Delete."

Please note that these actions are specific to your Google Account and may affect your experience
with Google services. Pausing or deleting your location history and web activity will limit the
personalization and recommendations you receive from Google services.

Keep in mind that while you can delete this data from your Google Account, other platforms and
services may also collect data, so it's a good practice to review and manage your privacy settings on
those platforms as well.

Quick Notes Page 15


Tech Abuse Facebook Security
05 November 2023 22:48

Enhancing your privacy on Facebook involves adjusting various settings to control who can see
your posts, who can contact you, and what information is visible on your profile. Here are the
steps to enhance your privacy on Facebook:

1. **Log In to Your Facebook Account:**


Open Facebook and log in to your account using your username and password.

2. **Access Privacy Shortcuts:**


Click on the small arrow icon (▼) in the top right corner of the Facebook page to open the
dropdown menu. From there, click on "Settings & Privacy," then select "Privacy Checkup."

3. **Privacy Checkup:**
Follow the prompts in the Privacy Checkup to review and adjust various privacy settings. This
will include reviewing who can see your posts, who can contact you, and more.

4. **Who Can See Your Posts:**


- In the Privacy Checkup or separately, you can set the audience for your future posts. By
default, Facebook often sets this to "Friends." You can choose to make your posts public, visible
only to friends, or customize the audience for each post.

5. **Profile Information:**
- Click on "Profile and Tagging" on the left-hand side of the Privacy Settings and review who
can post on your timeline, who can see what others post on your timeline, and who can send
you friend requests. Adjust these settings according to your preferences.

6. **Review Your Activity Log:**


- From the Privacy Settings, you can click on "Activity Log" to review and manage your past
activity on Facebook, such as posts, likes, and comments. You can adjust the audience for each
item or delete them.

7. **Timeline and Tagging:**


- In Privacy Settings, click on "Timeline and Tagging" to control who can post on your timeline,
who can see posts you've been tagged in, and other tagging-related settings.

8. **Blocking:**
- In Privacy Settings, click on "Blocking" to manage blocked users and app/blocking settings.

9. **Apps and Websites:**


- In Privacy Settings, go to "Apps and Websites" to review and control the apps that have
access to your Facebook data. You can remove any apps you no longer use.

10. **Location Settings:**


- In Privacy Settings, review location settings under "Location" to control who can see your
location and manage location history.

11. **Face Recognition:**


- In Privacy Settings, you can manage face recognition settings to control whether Facebook
can recognize you in photos and videos.

12. **Notifications:**
- You can adjust notification settings, including email and mobile notifications, under "Settings
& Privacy" > "Settings" > "Notifications."

13. **Password and Security:**

Quick Notes Page 16


13. **Password and Security:**
- In "Settings & Privacy," go to "Settings" and review your login and security settings, such as
login alerts, two-factor authentication, and password changes.

14. **Activity on Other Sites:**


- Under "Settings & Privacy," select "Settings," then "Apps and Websites." Review and manage
your off-Facebook activity settings, which control how your Facebook activity is used by other
websites and apps.

By following these steps and regularly reviewing your Facebook privacy settings, you can better
control your online presence and safeguard your personal information. Remember to keep your
settings up to date, as Facebook may change its features and options over time.

Quick Notes Page 17


Tech Abuse - Dating Apps
05 November 2023 22:50

The popularity of dating apps can vary by region and can change over time, so it's essential to check
your local app store for the most up-to-date and popular dating apps. As of my last knowledge
update in January 2022, here is a list of some popular dating apps for casual dating:

1. **Tinder:** Tinder is one of the most well-known dating apps globally, known for its swiping
feature, allowing users to quickly browse through profiles and make connections.

2. **Bumble:** Bumble gives women the power to make the first move, and it includes features for
both dating and making new friends.

3. **Hinge:** Hinge focuses on providing more in-depth profiles and encourages meaningful
connections based on shared interests and values.

4. **OkCupid:** OkCupid is known for its detailed user profiles and a wide range of compatibility
questions to help you find suitable matches.

5. **Coffee Meets Bagel:** Coffee Meets Bagel provides curated matches each day, emphasizing
quality over quantity.

6. **Grindr:** Grindr is a popular app for LGBTQ+ dating, primarily aimed at gay and bisexual men.

7. **HER:** HER is a dating app and social community for LGBTQ+ women, offering a safe and
inclusive space.

8. **Plenty of Fish (POF):** POF offers a free dating service with a large user base, providing various
features to help users find matches.

9. **Ship:** Ship is a unique app that allows your friends to get involved in your dating life by
helping you find matches and giving advice.

10. **DOWN Dating:** DOWN is an app that emphasizes casual and discreet encounters, allowing
users to express their intentions directly.

Please note that the popularity and availability of dating apps can change over time, and new apps
may have emerged since my last update. Always exercise caution when using dating apps, protect
your personal information, and be mindful of your safety when meeting new people in person.
Additionally, it's a good idea to read app reviews and user feedback to determine which app aligns
best with your preferences and goals.

Quick Notes Page 18


Tech Abuse Bad comments
05 November 2023 22:53

Kathy Griffin
US broadcaster CNN
ditched comedian Kathy
Griffin from its New
Year
programme after she
posed with a fake
decapitated head of
President Donald
Trump.
Griffin apologised after
it provoked outrage -
her New Year's Eve co-
host
Anderson Cooper said
he was appalled. Quick Notes Page 19
he was appalled.
In addition, Griffin lost a
number of other jobs as
a consequence of the
joke.
Trump said it was "sick"
and his wife Melania
called the photo
"disturbing".
"Kathy Griffin should be
ashamed of herself,"
said the president. "My
children,
especially my 11-year-
old son, Barron, are
having a hard time with
this." Quick Notes Page 20
this."
In a video message
posted on Twitter,
Griffin "begged" for
forgiveness and said
she had "crossed a
line" - however she later
retracted the apology
telling ABC's
The View: "I'm not
holding back on this
family. This family is
different
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Jack Maynard
Jack Maynard pulled
out of I'm A Celebrity... Quick Notes Page 21
out of I'm A Celebrity...
Get Me Out Of Here! in
2017
after just three days in
the jungle.
The YouTube star, who
has 1.4 million
followers, left after a
series of tweets -
most of which dated
from 2011 to 2013 -
were published in the
Sun while he
was in Australia.
It emerged that as well
as racist and
homophobic tweets,
Quick Notes Page 22
homophobic tweets,
Jack had also asked a
14-year-old fan to send
him nude pictures on
his Facebook account.
Maynard later
apologised saying he
was "young" and
"careless" when he sent
the posts, adding:
"Don't put anything
online you wouldn't say
to your mum."
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

James Arthur
The pop star had to
cancel his Quick Notes Page 23
cancel his
engagements in
November 2013 after
suffering a
Twitter meltdown.
The Say You Won't Let
Go singer used abusive
language to One
Direction's
Louis Tomlinson and
former X Factor winner
Matt Cardle.
Things came to a head
when he unveiled a rap
song in which he used
a
homophobic slur
Quick Notes Page 24
homophobic slur
against musician Micky
Worthless and advised
him to shoot
himself.
The star apologised on
Twitter saying he was
"deeply deeply sorry to
any gay or
lesbian people out
there".
A few months later
Arthur was officially
dropped from Simon
Cowell's record
label Syco, with Cowell
commenting: "I think
Quick Notes Page 25
commenting: "I think
James, unfortunately,
has had so
many issues with what
he has done publicly -
which is a real issue
with me.
Somebody should have
told him to shut upand
just put the records
out."
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Azealia Banks
The 212 rapper was
dropped from her UK
booking agency and
axed from her Quick Notes Page 26
axed from her
headline slot at grime
and hip-hop festival
Born & Bred following
racist and
homophobic tweets to
Zayn Malik.
Her Twitter account
was also blocked after
the string of aggressive
tweets
aimed at the Pillowtalk
singer.
The row started when
Banks claimed Malik
had copied her work for
his new Quick Notes Page 27
his new
video, Like I Would.
Banks also posted a
string of derogatory
comments about the
UK rap scene,
saying that British
rappers "never have
swag" and British rap
music was a
"disgrace" to the genre.
The US rapper later
apologised for using
homophobic language
in a Facebook
post saying: "Words
hurt. And while I may
Quick Notes Page 28
hurt. And while I may
be immune to every
word and be
thicker skinned than
most, it doesn't mean
that I get to go around
treating people
with the same
toughness that made
my skin so thick.
"Because, that IS how
people get thick skin...
by being subjected to
name
calling/belittlement/abus
e and it's not fair.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-

Quick Notes Page 29


From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

PewDiePie
The Swedish YouTube
star used the N-word in
one of his videos in
January
2017 and was accused
of anti-Semitism later in
the same month.
As a result, Disney
announced in February
2017 they would cut cut
ties with
PewDiePie - real name
Felix Kjellberg - who at Quick Notes Page 30
Felix Kjellberg - who at
the time was the world's
highest-paid YouTuber.
He was also dropped
from the Google
Preferred advertising
programme, and his
YouTube Red series
was cancelled.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

The Swede later


apologised for using the
racial slur during a
video live stream,
saying he was an
"idiot", but defended
himself against claims Quick Notes Page 31
himself against claims
of anti-Semitism,
saying the comments
had been taken out of
context
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Quick Notes Page 32


Tech Abuse - Deep Fakes
06 November 2023 08:42

Kobe Bryant in
Kendrick Lamar’s music
video:
In Kendrick Lamar’s
music video “The Heart
Part 5,” no one
expected the
artist’s face to morph
into the late NBA player
Kobe Bryant.
Considering the
athlete’s untimely
passing, the video
resonated well with
both his fans and
Quick Notes Page 33
both his fans and
followers of the league,
gaining millions ofviews
within the first few days
of its
release.
Lamar used deepfake
technology to pay
homage to the late
Laker legend.
Bryant’s deepfake in
the music video is so
visually accurate and
spine-chilling
that it looks like he is
the one performing.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-

Quick Notes Page 34


From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Tom Cruise’s TikTok


impersonator:
One of Hollywood’s
most loved and
recognized actors, Tom
Cruise, gained
even more recognition
thanks to a deepfake
created by VFX artist
Chris Ume
and TikTok user Miles
Fisher. The deepfake
had such a high level of
attention
to detail because
thousands of pictures
Quick Notes Page 35
thousands of pictures
were used in rendering
an artificial
version of the actor.
Jim Carrey on The
Shining:
Funnyman Jim Carrey’s
brief and unexpected
appearance in The
Shining is
anything but hilarious.
Besides how well
rendered this fan-made
deepfake is,
Carrey’s facial
expressions are quite
terrifying as he
Quick Notes Page 36
terrifying as he
impersonates Jack
Nicholson in the film’s
typewriter scene
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Barack Obama’s public


service announcement:
In 2018,
BuzzFeedVideo made a
deepfake of former
President Barack
Obama.
The deepfake
accurately and perfectly
mimicked his voice and
gestures to a
point where you Quick Notes Page 37
point where you
couldn’t tell it that the
video was synthetic.
Towards the end of
the video, it was
revealed that actor
Jordan Peele was the
one impersonating the
former president.
The satirical video
raised ethical concerns
among viewers, despite
its message
being that in an age
where disinformationis
rampant, it’s important
for peopleQuick Notes Page 38
for people
to be responsible with
their internet usage.
Donald Trump’s story
about a reindeer:
A YouTube channel
called Sassy Justice
uploaded a deepfake
video of former
President Donald
Trump. Similar to the
Obama deepfake, this
was meant to
amuse the viewers by
comedically
impersonating the
politician.
Quick Notes Page 39
politician.
While there were
inaccuracies with the
audio, it produced a
short snippet of
Trump making odd
remarks and telling a
nonsensical story about
a reindeer
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Hillary Clinton’s
deepfake appearance
on SNL:
On an episode of SNL,
former Secretary of
State Hillary Clinton is
Quick Notes Page 40
State Hillary Clinton is
impersonated by one of
its cast members.
However, a YouTube
video showed a
comparison between
the cast member and a
deepfake of the former
first lady.
The results are
shocking because
Clinton’s face shows no
visible traces of being
rendered. As the
technology becomes
more sophisticated, it’s
expected that
Quick Notes Page 41
expected that
deepfakes will be
harder to notice,
emphasizing the need
for cautionary
measures.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Deepfakes and Their


Implications on
Employee Fraud:
Deepfakes can be used
for entertainment, but
they’re not all about fun
and
games. Numerous
safety risks come with
deepfake technology Quick Notes Page 42
deepfake technology
since these tools
can be potentially used
to commit fraudulent
acts.
Like other cybersecurity
risks, you must be
aware of deepfake
threats that can
target the workplace.
Online impostors have
been known to use real-
time
deepfake videos to
extract job candidate
information during
remote interviews.
Quick Notes Page 43
remote interviews.
This allows them to
gather personally
identifiable information
(PII) through
posting fake job
openings and
screenings.
Money, access to
company systems,
espionage, and
unearned career
advancements are what
impostors desire. These
factors explain why the
usual
jobs impostors apply for
Quick Notes Page 44
jobs impostors apply for
are IT and computer
programming,
database, and
software-related job
functions. If you’re
hiring, a strong Know
Your Employee
(KYE process) will
enable you to steer
clear of these risks.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Vigilance Against
Deepfakes:
The examples above
should give you a
general idea of the Quick Notes Page 45
general idea of the
prevalence of
deepfakes. While the
videos above were
initially intended for
entertainment, it’s
important to understand
the possible
implications of this
technology.
Considering how well it
can mimic individuals,
some bad actors may
use the
tool to spread
misinformation and
commit fraud.
Quick Notes Page 46
commit fraud.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Quick Notes Page 47


Tech Abuse - Selfies
06 November 2023 08:49

Rio de Janeiro: Selfies,


which have become a
global sensation in the
last decade
or so, have remarkably
killed five times more
people than shark
attacks.
And the death toll has
crept up incrementally
each year as
smartphonesbecome
more sophisticated and
selfie-sticks increase
the range at which
Quick Notes Page 48
the range at which
people can snap
themselves, prompting
them to take bigger
risks for the perfect
shot.

Between October 2011


and November 2017, at
least 259 people died
taking
selfies around the
globe, according to
India's Journal of
Family Medicine and
Primary Care,
compared to just 50
Quick Notes Page 49
compared to just 50
people killed by sharks
in the same period.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

India Has Maximum


Selfie Deaths Globally.
159 Have Died So Far
India has set up "no
selfie" zones --16 of
them in the city of
Mumbai alone.
(Representational
image)

Rio de Janeiro: Selfies,


which have become a
global sensation in the
Quick Notes Page 50
global sensation in the
last decade
or so, have remarkably
killed five times more
people than shark
attacks.
And the death toll has
crept up incrementally
each year as
smartphones become
more sophisticated and
selfie-sticks increase
the range at which
people can snap
themselves, prompting
them to take bigger
risks for the perfect
Quick Notes Page 51
risks for the perfect
shot.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Between October 2011


and November 2017, at
least 259 people died
taking
selfies around the
globe, according to
India's Journal of
Family Medicine and
Primary Care,
compared to just 50
people killed by sharks
in the same period.
While women take the
most selfies, young Quick Notes Page 52
most selfies, young
men, whoare more
prone to take
risks, make up three
quarters of the selfie
deaths --in drownings,
crashes, falls
or shooting accidents.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

India, with a population


of more than 1.3 billion
and 800 million cell
phones,
holds the record for the
number of people dying
in the act of
photographing Quick Notes Page 53
photographing
themselves, with 159
recorded so far.

That is more than half


of the global total --and
a testament of sorts to
the
nation's love of group
photos and its youthful
population.

India has seen selfie-


snapping groups of
youths die when they
were hit by a
train or drowning when
Quick Notes Page 54
train or drowning when
their boat sank at the
moment they were
clicking the
shutter.

The situation has


become so dire that
India has set up "no
selfie" zones --16 of
them in the city of
Mumbai alone
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

The country came in far


ahead of Russia (16
deaths), the United
States (14) and Quick Notes Page 55
States (14) and
Pakistan.

In Russia, people have


fallen from bridges and
high-rise buildings, shot
themselves or even
died while handling a
land mine. Police
issued a guide to
"selfies without danger"
in 2015.

In the United States,


most of those involved
in selfie deaths fatally
shot Quick Notes Page 56
shot
themselves while
seeking the perfect
pose. A number of
people have fallen to
their deaths at the
Grand Canyon.

Rescue services in
Croatia used Twitter to
ask tourists to "stop
taking stupid and
dangerous selfies" after
a Canadian
miraculously survived a
75-meter (250-foot)
fall in the Plitvice lakes
Quick Notes Page 57
fall in the Plitvice lakes
region.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

In January, Taiwanese
social media celebrity
Gigi Wu --known as the
"Bikini
Climber" for taking
selfies on top of
mountain peaks
dressed in a bikini --
died
when she fell into a
ravine. She was 36
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Even when they are not


fatal, selfies can be Quick Notes Page 58
fatal, selfies can be
extremely macabre.

In 2014, a Brazilian
woman sparked rage
online when she took a
smiling selfie
in front of the coffin of
presidential candidate
Eduardo Campos at his
funeral.

Social media influencer


Sueli Toledo also
caused a stir online
when she posted
a picture on Instagram
Quick Notes Page 59
a picture on Instagram
with the caption, "My
look today for the
funeral of a
super friend."

Selfies in places
deemed sacred or
hallowed --especially
when they honor the
dead --can also raise
questions
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

At the former Nazi


death camp of
Auschwitz in Poland,
visited by 2.1million Quick Notes Page 60
visited by 2.1million
people every year,
museum staff do not
hesitate to contact
people who post
selfies deemed to be
inappropriate.
From Brazil to Vietnam
and Germany,
witnesses to traffic
accidents have
posted selfies at the
scene of the crash --
generally seen as
gauche.

More and more,


Quick Notes Page 61
More and more,
selfies --even in tourist
havens --are becoming
a bit of a
nuisance for locals.

Residents of the
picturesque Rue
Cremieux in Paris were
so disturbed by the
constant stream of
selfie-snapping tourists
outside their windows
that they
started their own
Instagram account,
clubcremieux, where
Quick Notes Page 62
clubcremieux, where
they publish pictures
of the most absurd
posers outside their
doors, skewering them
with barbed
captions
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

The same thing


happened in Hong
Kong, where residents
of the vast multi-
colored Quarry Bay
apartment complex put
up signs banning
photos.
Quick Notes Page 63
In Brazil, several youths
made a buzz on
Facebook in 2017 when
they posted
smiling selfies taken
among terrified bus
passengers who had
thrown
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

hemselves to the floor


during a shooting.
Facing the mad frenzy
of endless
selfies, Vienna has
launched a campaign
for a digital detox. Quick Notes Page 64
for a digital detox.
The Belvedere Museum
has put up a largecopy
of Gustav Klimt's
classic
painting "The Kiss" near
the original and added
a giant red hashtag, so
that
visitors can take their
selfie next to the
facsimile and actually
look at the real
work of art.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Quick Notes Page 65


Tech Abuse - Risks of Sexting
06 November 2023 08:53

What is sexting?
Sexting is sharing a
sexual message or
photo through a phone,
email account or
social media site. While
sexting can seem like
no big deal because it
doesn’t
carry the risk of
pregnancy or a sexually
transmitted infection
(STI), it can still
have some pretty
serious consequences.
Quick Notes Page 66
serious consequences.
Sexting consequences
Sexting can negatively
affect your mental
health, relationships
and future. It can
even have legal
consequences.
Before sending an
explicit photo,
remember that once an
image is out there, you
can’t get it back. What if
you and the other
person break up? What
if they share
your message or photo
Quick Notes Page 67
your message or photo
with their friends or
social media networks?
What if
your parents or
teachers found out? In
some cases, the image
could even end up
in the hands of a sexual
predator
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Here are some tips to


avoid serious
consequences from
sexting:
Never take photos of
yourself you wouldn’t
Quick Notes Page 68
yourself you wouldn’t
want everyone to see,
including
your family, classmates
and teachers.
Never forward someone
else’s sex-related
photos or messages.
You could get in
serious trouble,
especially if a person
involved is under age
18.
Sexting can affect your
mental health and
relationships
Sexting can have
Quick Notes Page 69
Sexting can have
potential emotional
consequences like:
• Regret

Objectification/victimizat
ion
• Bullying
• Depression
• Sadnes
• Social isolation
• Loss of friendships
• Loss of respect for
yourself
• Thinking about or
actually hurting yourself
or others Quick Notes Page 70
or others
Sexting can negatively
impact your future
Sexting can also
negatively affect your
future, such as your:
• Employment
• College admission
• Military admission
• Spot on a sports team
• Scholarships
• Future relationships
• Mental health if you
have to re-live the
consequences of your
decision
Employers and colleges
Quick Notes Page 71
Employers and colleges
often look at
candidates’ social
media profiles and
online presence.
Having nude images or
photos of alcohol or
drug use could
hinder your ability to get
a job or into college one
day.
Legal consequences of
sexting
If a person involved in
sexting is under age 18,
it’s considered child
pornography. The legal
Quick Notes Page 72
pornography. The legal
consequences can vary
depending on the state
where
you live. Some states
consider it a felony to
both send and receive
the photo
(even if you didn’t ask
the person to send the
photo). If the person in
the image
is under 18, you may
face legal
consequences if you’re
the:
• Photo taker
Quick Notes Page 73
• Photo taker
• Person in the picture
• Sender
• Receiver
• In possession of the
photo
Sexting could also put
you at risk for
placement on the Sex
Offender Registry
and possible jail time.
Usually, the
consequences are
harshest for those who
request or share the
photo.
And even if you’re not
Quick Notes Page 74
And even if you’re not
breaking the law, your
school can punish you
and others involved,
even if you’re legal
adults.

What to do if someone
pressures you to sext
If someone asks you to
send a nude photo or
explicit message, you
may be
afraid to turn them
down because you
don’t want them to stop
Quick Notes Page 75
don’t want them to stop
liking you. But if
someone truly cares
about you, they won’t
ask you to do
something that puts
your mental health and
future at risk.
If someone sends you
an unwanted message
or pressures you to
sext, tell a
trusted adult. That’s
sexual harassment and
it’s not OK.

Quick Notes Page 76


Tech Abuse - Tools for online spying
06 November 2023 08:58

mSpy
mSpy is another one in
the great lists of phone
spying apps. What
really
separates it from others
on the list is the fact
that it is primarily used
as a
parental monitoring
app.
It is a feature-rich
platform and contains
capabilities like cell
phone monitoring,
Quick Notes Page 77
phone monitoring,
location tracking,
multimedia file
monitoring, online
activity tracking, etc. It
allows remotely
controlling apps and
programs on a planted
device.
Features:
• Social Media
Monitoring including
Facebook, Instagram,
Snapchat, etc.
• Recovering of deleted
messages,
• Remote blocking of
Quick Notes Page 78
• Remote blocking of
websites/apps/contacts,
etc.
• It has a screen
recorder.
Verdict: mSpy is a great
tool and offers all the
features required for
parental
control. It lets you
monitor every keystroke
& tap and social media
chats &
shared pictures. It
provides all these
monitoring features
without being detected.
Quick Notes Page 79
without being detected.
SpyBubble
SpyBubble is a very
easy spying app to use
and is an even easier
spying
application to install on
the device you want to
monitor. It is a cloud-
based
application that deploys
all of the features that
one has come to expect
from cell
phone spy apps of this
nature.
The device works
Quick Notes Page 80
The device works
spectacularly well on
stealth mode. So the
user of the phone
isn’t even aware as
their calls, messages,
location, and online
activity are
tracked and reported to
you remotely. The app
can also activate a
smart phone’s
camera and take
pictures without the
concerned person
noticing.
All the recorded
Quick Notes Page 81
All the recorded
information is sent and
can be accessed from a
secure web-
based account.
Features:
• Record Calls
• GPS Tracking
• Stealth Mode
• Screenshot Capture
• Remote Camera
Access
Verdict: SpyBubble
gives you full control of
the device it is planted
in, by
silently operating on it
Quick Notes Page 82
silently operating on it
without anyone
noticing. As such, the
application is
extremely intuitive and
is very easy to use.
XNSPY
XNSPY is perhaps one
of the most popular
phone spying apps on
this list. In
fact, it can be deemed
as an industry leader
when it comes to
spyware apps. It
can be a great
surveillance tool to
Quick Notes Page 83
surveillance tool to
keep tabs on your
children as well as your
employees.
It comes jam-packed
with over 30 advanced
features that allow you
to track
incoming/outgoing
phone calls, and keep a
tab on SMS in real-
time. Plus, you
also get to track the
phone’s GPS location,
which comes in handy
while trying
to track your children’s
Quick Notes Page 84
to track your children’s
location or finding a lost
phone.
The app has introduced
more advanced
features in recent years
like WIFI logs
and WhatsApp
monitoring. The app is
constantly evolving and
getting better
with each passing day.
Features:
• Monitor Phone Calls
and Messages
• Access Messenger
Chats Quick Notes Page 85
Chats
• Keylogger
• Track GPS
Monitor Online
Activities
Verdict: XNSPY
combines advanced
features, affordable
price, and robust
customer support to
deliver one of the best
phone spy apps
available today for
both Android and
iPhone users. Its
consistent evolving
nature alone makes it
Quick Notes Page 86
nature alone makes it
worth a buy
Cocospy is a cross-
compatible phone
spying app that is easy
to install and use.
It can be set up and
installed within 5
minutes and works in
complete stealth
mode, thus not allowing
the phone user to be
aware of its presence
on the
device. The app can be
used to monitor almost
everything happening
Quick Notes Page 87
everything happening
on the
target device in real-
time via a
comprehensive
dashboard.
You can check call
logs, track sent and
received SMSs, and
monitor online
browser history without
a hassle. The app also
allows you to track a
person’s
real-time location either
via SIM card or through
GPS technology.
Quick Notes Page 88
GPS technology.
Features:
• Geofence Alerts
• Call Tracker
• Social Media Spy
• Track Browser History
• Stealth Mode
Verdict: Cocospy’s
simple installation and
easy-to-navigate spying
dashboard
have earned it high
praise from several
users worldwide. No
smartphone
activity can remain
hidden with this app
Quick Notes Page 89
hidden with this app
installed and running
discreetly in the
background. The app
works fine on both iOS
and Android phones,
without the
need to jailbreak or root
any devices
uMobix
uMobix is the only app
that grants full access
to a person’s Instagram
and
Facebook accounts.
Users can enter
anyone’s Facebook and
Quick Notes Page 90
anyone’s Facebook and
Instagram, click on
any button there, which
means managing
accounts, adjusting
settings, adding
friends, or deleting
followers.
uMobix is the only app
that works perfectly well
on both iOS and
Android. It
means you can install it
without any hurdles on
the way and monitor it
with no
bugs occurred.
Quick Notes Page 91
bugs occurred.
uMobix doesn’t require
you to jailbreak iOS
devices, unlike many
other
competitors. You just
provide iCloud iD and
password and start
monitoring as
soon as the backup is
performed.
The app provides
absolutely innovative
features, like online
status indicator
(track when the user is
online), real-time
Quick Notes Page 92
online), real-time
reporting for
Androids,Youtube
monitoring, app activity
tracking, etc.
All in all, uMobix offers
the most value for its
price, being among the
most
affordable spy apps on
the market today.
From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Quick Notes Page 93


From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

From <https://www.studocu.com/in/document/indian-institute-of-technology-madras/computer-science/assignment-on-
tech-abuse/49902888>

Quick Notes Page 94

You might also like