SlideShare a Scribd company logo
1 of 26
By Viral Parmar
Cyber Disorder
Who AM I
Viral Parmar
Founder of Infinite Defense Foundation
Mozilla Reps, Mozilla Foundation
Initiator of “Logout” world’s biggest Privacy Awareness Campaign
Cyber Security Consultant
Cyber Security Researcher
Solved more than 40 cases of cyber-crime and online frauds.
Trained 50,000+ people till now and aware them about privacy and security.
Given Seminars and workshops in 100+ Organizations.
Always remember: Know hAckiNG, but no HaCKing.
Social Media Addiction
1. Carve with a razor "f57" on your hand, send a photo to the
curator.
2. Wake up at 4.20 a.m. and watch psychedelic and scary videos
that curator sends you.
3. Cut your arm with a razor along your veins, but not too deep,
only 3 cuts, send a photo to the curator.
4. Draw a whale on a sheet of paper, send a photo to curator.
5. If you are ready to "become a whale", carve "YES" on your leg.
If not, cut yourself many times (punish yourself).
6. Task with a cipher.
7. Carve "f40" on your hand, send a photo to curator.
8. Type "#i_am_whale" in your VKontakte status.
9. You have to overcome your fear.
10. Wake up at 4:20 a.m. and go to a roof (the higher the better)
11. Carve a whale on your hand with a razor, send a photo to
curator.
12. Watch psychedelic and horror videos all day.
13. Listen to music that "they" (curators) send you.
14. Cut your lip.
15. Poke your hand with a needle many times
16. Do something painful to yourself, make yourself sick.
17. Go to the highest roof you can find, stand on the
edge for some time.
18. Go to a bridge, stand on the edge.
19. Climb up a crane or at least try to do it
20. The curator checks if you are trustworthy.
21. Have a talk "with a whale" (with another player like
you or with a curator) in Skype.
22. Go to a roof and sit on the edge with your legs
dangling.
23. Another task with a cipher.
24. Secret task.
25. Have a meeting with a "whale."
26. The curator tells you the date of your death and you
have to accept it.
27. Wake up at 4:20 a.m. and go to rails (visit any
railroad that you can find).
28. Don't talk to anyone all day.
29. Make a vow that "you're a whale."
30-49. Everyday you wake up at 4:20am, watch horror
videos, listen to music that "they" send you, make 1 cut
on your body per day, talk "to a whale."
50. Jump off a high building. Take your life.
Protect Your Identity
1. Don’t talk to Unknown people on Internet .
2. Don't give your Information about yourself like:
I. Full name
II. Parents name
III. Date of birth
IV. Address
V. Phone number
VI. Don’t share photos
to anyone online that you don't trust or know.
Cyber Stalking, Cyber bullying, Cyber harassment
IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh
IT act 2008 Section 66A sending Offensive message
IT act 2008 Section 66D cheating by personation
Where the issue stands
• Major issue with school/college going students
• Fake facebook profile
• Sexting – Sexual predators
• Identity theft
• Bullying on public pages
• Pornography
• Defamatory
• Selfie
• 460 millions user online in india
Case Study
• London base fake doctor giving 24 lakhs for kidney and asked for
expense to harvesting the kidney
• Online extortion with 39 yr old women by 34 yr old man got 65 lakhs
• Fake call from mall to verify the transaction and asked the all details
• Girlfriend post the exposing photos of his boy friend on fake profile
• Man created fake profile to get the affection from married woman
• Boys photos were uploaded online by unknown person
• Messages were send to father in law to stop the marriage to happen
• Boy’s photos with past girl friend were uploaded to stop the
engagement
• Fake company mails
• Created fake company and asked for funds to invest
Any Questions
Contact Me
in.linkedin.com/in/viralparmarhacker
viralparmarhacker@gmail.com
facebook.com/viralparmarhacker
twitter.com/viralparmarhack
Stay Connected
Stay Safe
+91 8980808222
Thank You
#LogOutNow

More Related Content

Similar to Cyber Disorder

Reasons As To Why College Athletes Should Be Paid Essay
Reasons As To Why College Athletes Should Be Paid EssayReasons As To Why College Athletes Should Be Paid Essay
Reasons As To Why College Athletes Should Be Paid EssayAmber Wheeler
 
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography EssayLeonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography EssayReina Rosado
 
What Is Narrative Essay Writing
What Is Narrative Essay WritingWhat Is Narrative Essay Writing
What Is Narrative Essay WritingMelanie Smith
 
Essay About My Friendship. Online assignment writing service.
Essay About My Friendship. Online assignment writing service.Essay About My Friendship. Online assignment writing service.
Essay About My Friendship. Online assignment writing service.Kimi Allen
 
How To Write A Scientific Essay
How To Write A Scientific EssayHow To Write A Scientific Essay
How To Write A Scientific EssayKristen Lee
 
Best Scholarship Essays Writing Company
Best Scholarship Essays Writing CompanyBest Scholarship Essays Writing Company
Best Scholarship Essays Writing CompanyAnn Montgomery
 
The power of public sociology
The power of public sociologyThe power of public sociology
The power of public sociologylisawadephd
 
Political Issues Free Essay Example. Online assignment writing service.
Political Issues Free Essay Example. Online assignment writing service.Political Issues Free Essay Example. Online assignment writing service.
Political Issues Free Essay Example. Online assignment writing service.Alyssa Hase
 
Political Issues Free Essay Example
Political Issues Free Essay ExamplePolitical Issues Free Essay Example
Political Issues Free Essay ExampleLaura Benitez
 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpointkristen
 

Similar to Cyber Disorder (11)

Reasons As To Why College Athletes Should Be Paid Essay
Reasons As To Why College Athletes Should Be Paid EssayReasons As To Why College Athletes Should Be Paid Essay
Reasons As To Why College Athletes Should Be Paid Essay
 
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography EssayLeonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
 
What Is Narrative Essay Writing
What Is Narrative Essay WritingWhat Is Narrative Essay Writing
What Is Narrative Essay Writing
 
Essay About My Friendship. Online assignment writing service.
Essay About My Friendship. Online assignment writing service.Essay About My Friendship. Online assignment writing service.
Essay About My Friendship. Online assignment writing service.
 
How To Write A Scientific Essay
How To Write A Scientific EssayHow To Write A Scientific Essay
How To Write A Scientific Essay
 
Best Scholarship Essays Writing Company
Best Scholarship Essays Writing CompanyBest Scholarship Essays Writing Company
Best Scholarship Essays Writing Company
 
The power of public sociology
The power of public sociologyThe power of public sociology
The power of public sociology
 
Pornography
PornographyPornography
Pornography
 
Political Issues Free Essay Example. Online assignment writing service.
Political Issues Free Essay Example. Online assignment writing service.Political Issues Free Essay Example. Online assignment writing service.
Political Issues Free Essay Example. Online assignment writing service.
 
Political Issues Free Essay Example
Political Issues Free Essay ExamplePolitical Issues Free Essay Example
Political Issues Free Essay Example
 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpoint
 

More from Viral Parmar

We are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLWe are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLViral Parmar
 
The malware effects
The malware effectsThe malware effects
The malware effectsViral Parmar
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters? Viral Parmar
 
JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019Viral Parmar
 
JS authentication with auth0
JS authentication with auth0JS authentication with auth0
JS authentication with auth0Viral Parmar
 
Extreme Web Exploitation
Extreme Web ExploitationExtreme Web Exploitation
Extreme Web ExploitationViral Parmar
 
Facebook Breach - A wake up call
Facebook Breach - A wake up callFacebook Breach - A wake up call
Facebook Breach - A wake up callViral Parmar
 
Who is spying on you ?
Who is spying on you ?Who is spying on you ?
Who is spying on you ?Viral Parmar
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the webViral Parmar
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical HackingViral Parmar
 

More from Viral Parmar (14)

We are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLWe are Building Dystopia using AI & ML
We are Building Dystopia using AI & ML
 
The malware effects
The malware effectsThe malware effects
The malware effects
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters?
 
JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019
 
WebVR
WebVRWebVR
WebVR
 
Rust Hack
Rust HackRust Hack
Rust Hack
 
JS authentication with auth0
JS authentication with auth0JS authentication with auth0
JS authentication with auth0
 
XSS
XSSXSS
XSS
 
Extreme Web Exploitation
Extreme Web ExploitationExtreme Web Exploitation
Extreme Web Exploitation
 
Facebook Breach - A wake up call
Facebook Breach - A wake up callFacebook Breach - A wake up call
Facebook Breach - A wake up call
 
Who is spying on you ?
Who is spying on you ?Who is spying on you ?
Who is spying on you ?
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Cyber Disorder

  • 2. Who AM I Viral Parmar Founder of Infinite Defense Foundation Mozilla Reps, Mozilla Foundation Initiator of “Logout” world’s biggest Privacy Awareness Campaign Cyber Security Consultant Cyber Security Researcher Solved more than 40 cases of cyber-crime and online frauds. Trained 50,000+ people till now and aware them about privacy and security. Given Seminars and workshops in 100+ Organizations. Always remember: Know hAckiNG, but no HaCKing.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14. 1. Carve with a razor "f57" on your hand, send a photo to the curator. 2. Wake up at 4.20 a.m. and watch psychedelic and scary videos that curator sends you. 3. Cut your arm with a razor along your veins, but not too deep, only 3 cuts, send a photo to the curator. 4. Draw a whale on a sheet of paper, send a photo to curator. 5. If you are ready to "become a whale", carve "YES" on your leg. If not, cut yourself many times (punish yourself). 6. Task with a cipher. 7. Carve "f40" on your hand, send a photo to curator. 8. Type "#i_am_whale" in your VKontakte status. 9. You have to overcome your fear. 10. Wake up at 4:20 a.m. and go to a roof (the higher the better) 11. Carve a whale on your hand with a razor, send a photo to curator. 12. Watch psychedelic and horror videos all day. 13. Listen to music that "they" (curators) send you. 14. Cut your lip. 15. Poke your hand with a needle many times 16. Do something painful to yourself, make yourself sick. 17. Go to the highest roof you can find, stand on the edge for some time. 18. Go to a bridge, stand on the edge. 19. Climb up a crane or at least try to do it 20. The curator checks if you are trustworthy. 21. Have a talk "with a whale" (with another player like you or with a curator) in Skype. 22. Go to a roof and sit on the edge with your legs dangling. 23. Another task with a cipher. 24. Secret task. 25. Have a meeting with a "whale." 26. The curator tells you the date of your death and you have to accept it. 27. Wake up at 4:20 a.m. and go to rails (visit any railroad that you can find). 28. Don't talk to anyone all day. 29. Make a vow that "you're a whale." 30-49. Everyday you wake up at 4:20am, watch horror videos, listen to music that "they" send you, make 1 cut on your body per day, talk "to a whale." 50. Jump off a high building. Take your life.
  • 15.
  • 16. Protect Your Identity 1. Don’t talk to Unknown people on Internet . 2. Don't give your Information about yourself like: I. Full name II. Parents name III. Date of birth IV. Address V. Phone number VI. Don’t share photos to anyone online that you don't trust or know. Cyber Stalking, Cyber bullying, Cyber harassment
  • 17. IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh IT act 2008 Section 66A sending Offensive message IT act 2008 Section 66D cheating by personation
  • 18.
  • 19.
  • 20. Where the issue stands • Major issue with school/college going students • Fake facebook profile • Sexting – Sexual predators • Identity theft • Bullying on public pages • Pornography • Defamatory • Selfie • 460 millions user online in india
  • 21. Case Study • London base fake doctor giving 24 lakhs for kidney and asked for expense to harvesting the kidney • Online extortion with 39 yr old women by 34 yr old man got 65 lakhs • Fake call from mall to verify the transaction and asked the all details • Girlfriend post the exposing photos of his boy friend on fake profile • Man created fake profile to get the affection from married woman • Boys photos were uploaded online by unknown person • Messages were send to father in law to stop the marriage to happen • Boy’s photos with past girl friend were uploaded to stop the engagement • Fake company mails • Created fake company and asked for funds to invest
  • 22.
  • 23.