.
Cyber Crimes
.Watch / Click 🔮 Play button 👆
#
Internet Banking Fraud / Suicide of Victims - Part 1
Internet Banking Fraud / Suicide of Victims - Part 2
__________________________________________
Use Translate [ Right Side -> ] [ Top ^ ]
Read Text in your Language
__________________________________________
Internet / Online
ATM / Credit Card Frauds
and
Victim Suicides
Traced
The Culprits were Traced
to a Remote Place / a Village
which was not even heard.
Most of such Crime Groups,
operate from Remote places,
two tier / three tier cities / towns/ villages
in undeveloped areas /
Non-Suspicious Premises
[ so that doubts do not arise ]
The Culprits had jumped
various IP Adresses
[ so that, their IP Adress can not be traced.
The IP Address of Devices
from which, they were commiting Crimes ]
The Cuprits reached,
Bank's Server
and
Toll Free Number of the Bank
From the Toll Free Number
of the Bank
calls were made to Victims
across the Country
[ in various States / Cities / Towns ]
Impersonification
Mobile Calls
were made to victims
by impersonification
The Culprits made calls
representing as
some one...
who they were not....
The Culprits made calls
representing as
Bank Officials
The Cyber Police / Technical Cell / Cyber Cell
traced the Source IP Address
of devices used
( Laptops / Desktops/ Mobile Phones, Wifi Routers )
to a Remote place / a Village
Suspicion
Presence of Many Many
Mobile Towers...
huge Quantum
of
Mobile Calls...
that too in ...just a Village
arose... Suspicion
[ A village...where...not even...
proprer education facility was not there...
The question was...which
activity
were those people
Occupied in ?
Education
Most of the Culprits,
did not even have
basic / proper education
Training
The Culprits were given training
in Internet / Online frauds
Age Group
Most of the Culprits were in the age group of
15 - 25 years
Intermediary Bank Accounts
The Fraudster Mobile Callers
transferred money
from
Victims' Bank Accounts
to
Intermediary Bank Accounts
The Money Parked / Kept
was later
Withdrawn [ Cash Drawing ]
or
transferred to
Multiple e Wallets
The Owners / Holders
of
Intermediary Bank Accounts
The Fraudsters had obtained
Many Many Sim Cards
from various places in the country
with Fake KYC documents
( Proof of Identity / Proof of Address )
E Wallets
were associated with
Such Mobile Numbers
In some cases,
using
ATM / Debit / Credit Card
Number
and
CVV Number
of Victims
the Fraudster
Mobile Callers
purchased
Luxury Items
on
Online Shopping Sites
and took delivery
at Fake Address
or
Place/ Premises at which,
Culprits
stayed temporarily
In some cases,
Order for Purchase
was placed on
Online Shopping Sites
then,
before delivery of goods,
Order was Cancelled,
and culprits took
cash refund to their
Bank account
from
Online Shopping Sites
then
withdrew Cash
from the Bank Account
Complaints Registration Web Page
The Culprits also revealed that,
they accessed
Complaints Registration Web Page
on Bank's Site
They got Details of
Card Holders like
* Name
* Card Number
* Phone Number so on
Its a matter of serious concern.
Even after 128 / 256 bit encryption of Web pages,
if culprits were able to access
Complaints Registration Web Page
on Bank's Site
Bank's have to take
Stringent Security Measures to
protect their web pages from
unauthorised Access
Whether there is any information leakage
at the end of
Back-end offices
or
Companies to which,
certain work of the banks is outsourced
Whether Banks have to consider
doing
all activities related to the bank
in-house
( whether Major or Trivial )
IMEI Numbers
The Culprits had
discarded / discontinued
Mobile numbers / Sim Cards
after the Crimes.
The IMEI Numbers
The Mobile Numbers...
Currently Active
on
The Handsets with those
IMEI Numbers
were Traced
Be Alert...Be Aware...Be Prepared
Jai Hind
CFB CrimeFreeBharat
[ A National Police Mission under BPRD/ MHA/ GOI ]
Click 👆 / For Other Posts
For Public Awareness
Forward / Share with Others 🙏
.
Use Translate [ Right Side -> ] [ Top ^ ]
Read Text in your Language
__________________________________________
#
A Missing Complaint.
The Victim's Laptop
disclosed a
A Friend Request
from a
Fake F book Profile
Then a Luring Chat
Started by the
Culprit's F book Profile
with
Victim's F book Profile
Traced :
The IP Address of the
WIFI Router
was traced.
Based on that,
the Police reached the
Location
It belonged to an elderly family.
where only two elders / Senior Citizens
were there
Internet connection was not working
properly
A delivery boy, ( Culprit )
in the disguise of
helping the elders
removed the WIFI Password
converted
a Closed Network
( with a Security Key / Password )
to
an Open Network
( Unsecured )
Later,
The Culprit and Associate
logged into the WIFI Router
of the elders
( from a near by place
within Router's Range )
Then....
using the
Internet Connection
Created a Fake
Social Media Profile
on F Book
[ The Fake F Book Profile,
the Luring chats,
other related information
was available in
Culprit's Laptop ]
From that Profile,
the Culprits lured the Victim
invited to a Place
and
Murdered the Victim
Leads :
Leads that helped to solve the Case
* Investigation revealed that,
there was a
Quarrel
between the Victim and the Culprit
* The
IP Address of the WIFI Router
and
its Location
Be Alert...Be Aware...Be Prepared
Jai Hind
CFB CrimeFreeBharat
[ A National Police Mission under BPRD/ MHA/ GOI ]
Click 👆 / For Other Posts
.
Use Translate [ Right Side -> ] [ Top ^ ]
Read Text in your Language
__________________________________________
Be Alert...Be Aware...Be Prepared
Jai Hind
CFB CrimeFreeBharat
[ A National Police Mission under BPRD/ MHA/ GOI ]
Click 👆 / For Other Posts
.
__________________________________________
Use Translate [ Right Side -> ] [ Top ^ ]
Read Text in your Language
__________________________________________
#
A Dormant / Inactive
Bank Account is hacked
A Senior Citizen's Account is hacked
Be Alert...Be Aware...Be Prepared
To Activate a
A Inoperative / Dormant
Bank Account,
KYC documents
[ ID Proof / Address Proof ]
have to be
submitted to the bank.
The Culprits had,
submitted the KYC Documents
of the Victim,
with a Forged Signature
[ The culprit employee in the
back-end office,
had scanned the Signature of the Victim
in one of the other documents,
and
pasted it on
KYC documents of the Victim ]
Warning Signal :
The victim, had
not applied for any
Change of Address
But letter came from the bank,
mentioning
Change of Address
A letter containing
New Address,
is received by Victim
When the victim approaches bank,
the victim comes to know that,
a huge amount
is withdrawn from the
bank account
Back-end Office
Many of the banking secondary activities
are done by a
Back-end Office
or Outsourced to a reputed Company
Traced
The Address Change was traced to a
IP Address of a computer
in back-end office
The Address Change was
done
from a particular Computer
Every computer has a specific
User Id
Password
Such a Computer
[ a DMS - Desktop Management System ]
cannot be accessed by
Internet
[ Such computers are connected
to each other by Intranet ]
A particular employee
was using the Computer.
Only that employee had the
User Id
Password
took the
User Id
Password
Be Alert...Be Aware...Be Prepared
Jai Hind
CFB CrimeFreeBharat
[ A National Police Mission under BPRD/ MHA/ GOI ]
Click 👆 / For Other Posts
.
.
Internet
/ Online Crimes
Click 👆
[ Viewer Discretion required /
Not for Kids ]
__________________________________________
Use Translate [ Right Side -> ] [ Top ^ ]
Read Text in your Language
__________________________________________
Be Alert…Be Aware…Be Prepared
Crimes that Occurred:
· # Two Murders
· # Blackmailing / Extortion
Victims:
* A Married Woman,
* A Young Lady
Clues:
Available at the
Crime Scene
A Laptop
with a Chat Opened
Before the Death / Murder
The Police reached the
Suspected Culprit’s Premises
With
IP Address of the
System / Location
( From which
Chat was initiated )
Custody:
The Laptops , Mobile Phones of
The Victims, Suspected Culprits were
Taken into Custody.
CyberCell / Technical Cell:
Recovered the deleted
Chat History
Found some
Nude Photos of victims
shared Online
Blackmailer:
A Blackmailer who
Repaired the Victim’s Laptop
Extorted money, threatened
With the
Nude Photos in the Laptop
[ which, he had made a copy
while
Repairing the Laptop ]
Case Solver:
While the
Laptops, Mobile phones were
In the
Custody of Police
The Culprit started a Chat
( being unaware that
The Laptops/ mobiles were in custody of Police )
The Culprit had initiated the Chat
From a Mobile Phone
With
IMEI number / Location Details
The
Police reached the
Culprit’s Location
The Culprit
Was a
Juvenile ( less than 18 Years )
The Culprit
Used Fake Photos to
Lure the Victims
The Culprit’s Father
Committed a Murder
Trying to protect the Culprit
( Booked under Section 302 / 304 )
Another Person,
Who was a Associate of the Blackmailer
Committed a murder
( revealed by the blackmailer,
Confessed by the Murderer )
( Booked under Section 302 / 304 )
CFB CrimeFreeBharat
[ A National Police Mission under BPRD/ MHA/ GOI ]
Click 👆 / For Other Posts
Jai Hind
.
Click 👆
Report to the Police...immediately
● Remote Neural Monitoring
● Pulsed RF Radiation
.
. Cyber Crimes . Watch / Click 🔮 Play button 👆