#any cyber fraud
Explore tagged Tumblr posts
growbusinessworld11 · 7 months ago
Text
Cyber Crime Complaint kaise kar
Tumblr media
So, if any cyber fraud or online scam has happened to you and you want to register your complaint under cyber crime, then in today's blog I will tell you how you can file your complaint under cyber crime. Now I am saying the right complaint here because many people register complaints under cyber crime but there some details are wrong or the complaint itself is wrong due to which it takes a long time. The complaint that remains for some time remains pending and after that the complaint is closed. Now this is not my first blog. Even before this I had made a blog and posted it on my channel on how to register a complaint in cyber crime.
And on top of that, you people have got around 2 lakh views, in which the money of many people has been frozen and the money has also been returned. Now I am making this blog after the new update of 2024 that within 2024, there will be a rise in the cyber crime website. What new changes have happened and in what way can you people lodge your complaint and this will not be a demo complaint, this is the complaint of our client or subscriber who wanted to register in cyber crime, then I will give you a live complaint of absolutely everything. I will show you how to file the correct complaint and I will also show you how many minutes or hours after filing the complaint, action is taken on it and your money gets frozen.
Also Read- bank account freeze by noida cyber crime
So without wasting time let's start the blog. If you are visiting our channel for the first time then make sure to subscribe the channel because a lot of such content keeps coming on our channel and such content is already there. If any fraud or scam has happened to you then you can know how you can get your money back and share this blog with your friends who have also been cyber fraud or cyber scammed. And if you want to register your complaint under cyber crime, then let's start the blog while sitting at home, so first of all you guys have to go to google.com.
And the search here is Cyber Crime. As soon as you type, the first option you will see is Cyber ​​Crime Portal. You people have to click on it. Let's click, after that you people will get to see multiple options here. So you people have to click on Register a Complaint and Financial Fraud, okay here also you will get to see multiple options, you people have to click on Financial Fraud and after that you can read this detail, after that you people have filed complaint. Have to click on And click on this act. Okay, so what are the things you should have to lodge a complaint? Any complaint, no matter whether it is financial fraud or any other kind of fraud.
Also Read- Vapi cyber cell bank account freeze karde to kya kare
So, what all should you have, which is the Mentorial details, it is given inside every complaint, okay, so first of all, you people should have the date and time of the incident, meaning on which day that thing happened to you, you people should know the incident. Key detail means a rough detail, you can write it in Hindi or English, it should have 200 characters and no special character should be used inside it. Apart from that, you should have some ID proof like Aadhaar. You can apply card here or apart from that here you can also apply PAN card. Okay, apart from PAN card, you can also apply driving license or anything else. Age ID proof, the format of which you are making your complaint should be.
That JPG should be inside JPG or PNG is fine and its size should be less than 5 MB. In this case, if any bank scam or online fraud happens to you, then what are the things required by you first of all? You should know your bank or wallet address, the 12 digit transaction or UTRO, the date of transaction, you should know the amount of fraud, apart from that, soft copy of relevant evidence for example, your screenshots. If you have WhatsApp2, you will have to show that here on this platform, you have been cheated. For example, if it has happened on any website, then you can also put that, what should be its format, it should be below 10 MB.
Now apart from this, this is an optional detail for the example of a suspect who has committed a fraud on you. What details do you have regarding him so that the suspect can be caught using the software? For example, you have his mobile number and email ID. If you have any ID proof that he has sent or has sent a photo, then all those things are there. If you apply these things then your chances increase a lot, then all these things are mandatory, you try as much as possible. If you can give more information, you all have to give it. Okay, so what will happen is that the fraudster will be caught soon or he does not have quick identification, so first of all you guys have to click on Create a New Account, after that you People have to select their state, after that you have to type your email ID, whatever your email ID is, type it here, type the mobile number and click on Get OTP, OTP will come, fill it and captcha code. Have to fill and click on submit
This will create your ID which will remain inside the cyber crime. If your ID is already created, if you have forgotten it then you have to click on Forget ID and enter your mobile number. You will get OTP, after that you have to fill the captcha code and click on submit. You have to do this, what will happen with this, your ID will be there, a message will come on your mobile number, so you can see, now we have the ID already created, so we log in directly, okay, so first of all we login. We fill the ID here and after that we enter the mobile number here and click on Get OTP, like you click on OTP, an OTP will come on your phone, that OTP you people have entered here. If you have to fill it, let's fill the OTP quickly.
Also Read- how to unfreeze bank account from ghaziabad cyber cell
After filling the OTP, you guys have to fill the captcha code here, so let's fill the captcha code also which is z a t yvi, the small letters are to be filled only, whether it is big or small, you guys can see it. If you fill it wrongly then you will have to process everything again. Ok, click on submit, after that you will see some details like this. So first of all you people have to go inside the user profile. After this you have to enter your details here like your name etc. So let's fill them. First of all we will fill the name of our client here then it will come in the title Mr. Message Doctor Mr. Mrs. So you can choose as per your choice. If you can, our clients are Ms. So we use Ms. after that their name will come.
So we have filled Kajal here, after that their mobile number will come, so whatever mobile number will be your client's or sorry, it will be yours, you all have to fill it here, after that you have filled their date of birth. You have to fill the same date of birth which will be there on any ID proof. If it is on Aadhar Card then fill that date, it will be better. After that you have to select the gender and after that you all have to fill it here. You have to fill the email ID here on which you will get updates related to the complaint, so we have filled the email ID here, after that you have to fill the name of father, mother or spouse, then we are filling the name of the spouse. And after that you people have to type the complete address here, whatever is the address of your house, you people have to enter it here, after entering everything, you people have to update it. This is for those people who are first. We are registering the time complaint, we will click on update and click on OK, after that you all have to click.
Report Cyber Time Pay and after that you will get to see the pay option here. First of all, we select in all categories whoever has been fraud with you, our clients have transferred money from bank to bank, that is why we You are selecting internet banking related plot. If you have done it through UPI, then you can do UPI. Now here, if you have lost your money, you will say yes. After that, first of all, you have to enter your details, then select your bank account first. Their bank account is Central Bank of India, so we will type it here, after that we will enter our bank account number here, then we will enter the bank account number here, after that we will enter the transaction ID. Which is of 12 digits, which you people have to fill when you transfer money to someone, UTRO there, let's fill it here and after that you people have to enter the amount, whatever. Your amount will be there, you have to fill it here.
And you have to enter the date on which you have transferred the money. You have to enter it here. If you know the time then you can enter it. If you don't know then there is no problem. Click on Save in the same way. You guys have to enter all the details here. Our client had two transactions, so we have entered the two transactions here. Now we have to enter the details of the account in which the money has gone, that is, if the suspect's is ours, then the suspect is ours. If we have transferred within the bank itself, then we will select the bank, after that we will select the name of the bank. Okay, so we search the name of the bank here which is Install Bank. After selecting the bank, now We have to fill the account number of the froster here.
So we enter the account number of Froster's bank account, after that we have to fill the transaction ID and after that we have to enter the amount, that is, the amount of fraud that has happened with the transaction ID, we have to enter it here. You have to select the date again and click on Add More, then in the same way you have to enter the details of the other transactions here, we have entered both of them here, okay, after that it will ask you that Approximate time, when the fraud started with you, then you guys have to put that date i.e. the first transaction, which is the first transaction you did, you guys have to put the details here, so we have mentioned the first transaction. had done
That was done on 26th at 8:8, you people have to put those details. You people delayed in making any report. Yes, we did not do it. After that, we have to tell where the incident took place. If you can, we do not know the ID. If we know the name, then we enter it here. VIP Advance. Okay, after that we know the bank account number. So we have the bank account number now, so we enter it here. There is a little more space here. We will remove the space on it, that's why I had already told you to enter here as much details as you have, so we have put the details here, click on the bank key and save and next, after that whatever is missing of yours is here. You guys have to fill the details like here her husband's name is missing.
So we put it here, okay after that we will scroll down and want to upload any ID proof, I have put the Aadhar card here, so we upload it here, click on save and proof, save and complete. Clicking means that you people have to verify all the details you have entered properly once, I verify everything properly here, whatever I have put here, if everything is correct. If yes, then we will do it by clicking on 'I agree' and 'Confirm' and 'Submit', after that your complaint will be registered, okay, after that you can download its PDF file by clicking on 'Download PDF', okay. If you are seeing this type of error many times, your complete copy is not downloading.
So you have to cross it and then you guys have to go back to the cyber website and here you have to click on the check status. As soon as you guys click on the check status, you guys will get to see your amendment number. You have to click and after that there will be a blue colored button at the top. If you want to print it then you have to click on that button and download your cyber crime complaint copy. So in this way you can People can also register their complaint under cyber crime, however, their complaint was registered on 27th and on 28th they got a message that their money was transferred to their account for free. That is, within a short time of 24 hours, their money was frozen in Froster's account by cyber crime. So, you guys saw how quickly action is taken if you register a correct complaint. Cyber crime. Because this is a cyber crime, it takes action very fast against Frost and if the details are correct then the money is spent very quickly.
0 notes
truth4ourfreedom · 10 days ago
Text
THE LEFT IS GETTING SERIOUS AND PULLING OUT ALL OF THE STOPS TO STAY IN POWER! GET READY!!!!
Tumblr media
BOOOM!
Judy Byington Bombshell Report!
Cyber Attack Nationwide Communication Blackout Planned For Nov. 5 Election
DayBreaking News Alert!
Judy Byington’s explosive new report exposes plans for a massive cyber attack aiming to unleash a nationwide communication blackout on Nov. 5, Election Day! Prepare yourselves; this is a warning you can’t ignore. Spread the word before it’s too late!
Free and fair election in 2024? Forget it. The Election Fraud Machine has been hard at work, creating chaos and tampering with early voting across the nation.
On Nov. 5, the Deep State Elites are set to launch a cyber attack to manipulate results, silence communication, and paralyze the nation. Their endgame? Martial Law, giving Biden control to cancel the election and keep the Biden-Harris puppet show running, all in the name of keeping their Global Elite handlers in power.
But it gets worse: Deep State biometric scanners, satellites, and AI have been spotted erasing Trump votes in early voting districts. White Hat Military Alliance has struck back, destroying Dominion voting machines in Ohio that were flipping Trump votes. The Ohio Attorney General has even indicted six non-citizens who illegally cast ballots in previous elections.
In Washington and Oregon, fires at ballot boxes have obliterated thousands of ballots that will never be recovered, all thanks to Antifa, who many believe orchestrated the attacks.
In Texas, election fraud arrests are piling up, while in Utah, voter fraud cases are ignored, leaving dead voters receiving ballots before living ones! No investigation, no answers—just silence from election offices.
Last week in Pennsylvania, non-English speaking “citizens” sporting Harris Walz stickers were pushed to the front of voting lines, directed by “translators” while actual Americans waited outside. Police in the state shut down a voting booth for “overwhelming Republican turnout.” Trump supporters arrested simply for encouraging freedom to vote! Voter suppression is in full swing.And in Florida, people discovered a mysterious box of ballots by the Turnpike. Who left it there? Authorities haven’t figured it out, but the implications are chilling.
Democrats are now fighting to prevent drop box surveillance in Georgia—why would they oppose election transparency unless they have something to hide?Illegal immigrants and non-citizens have been handed voter IDs and social security benefits. Hundreds of thousands of Ukrainian “refugees” now receive American taxpayer money and voter IDs, ready to cast their votes this November.
Reports reveal that 46 out of 50 states confirmed Biden lost the 2020 election in their state, but Congress ignored this to certify Biden’s victory without any investigation.
And it’s not just election fraud—Byington exposes horrifying secrets in her re-released book, “22 Faces”, detailing how Satan-worshipping elites subject children to ritual abuse to maintain control over their victims. Upon its release, “22 Faces” faced vicious attacks by pedophiles desperate to bury the truth. They smeared the book with one-star reviews to suppress its exposure of Satanic Ritual Abuse.
Help expose these monsters: leave a review on Amazon to ensure “22 Faces” reaches the light. The more we reveal, the more innocents we can save.
They want us silent; we won’t be. Spread this message.Join, while it's not too late:
https://t.me/EtheFriendQ
20 notes · View notes
mariacallous · 24 days ago
Text
United States intelligence officials have been quietly issuing warnings to government agencies all summer about a rising threat of extremist violence tied to the 2024 presidential election, including plots to destroy bins full of paper ballots and promote "lone wolf" attacks against election facilities throughout the country.
In a series of reports between July and September, analysts at the Department of Homeland Security warned of a “heightened risk” of extremists carrying out attacks in response to the race. Copies of the reports, first reported by WIRED, describe efforts by violent groups to provoke attacks against election infrastructure and spread calls for the assassinations of lawmakers and law enforcement agents.
Last month, the agency’s intelligence office emphasized in a report that “perceptions of voter fraud” had risen to become a primary “trigger” for the “mobilization to violence.” This is particularly true, the report says, among groups working to leverage the “concept of a potential civil war.” Fears about “crimes by migrants or minorities” are among other top “triggers,” it says.
The documents show that DHS alerted dozens of agencies this summer to online chatter indicating potential attacks on election drop boxes—secured receptacles used in more than 30 states to collect mail-in voter ballots. The text highlights the efforts of an unnamed group to crowdsource information about “incendiary and explosive materials” capable of destroying the boxes and ballots. An extensive list of household mixtures and solvents, which are said to render voter ballots “impossible to process,” was also compiled by members of the group, the report says, and openly shared online.
“The United States remains in a heightened, dynamic threat environment and we continue to share information with our law enforcement partners about the threats posed by domestic violent extremists in the context of the 2024 election,” a spokesperson from DHS tells WIRED. "Violence has no place in our politics, and DHS continues to work with our partners to evaluate and mitigate emerging threats that may arise from domestic or foreign actors. DHS, through CISA, is also helping  election officials and election infrastructure partners bolster resilience in their cyber, physical, and operational security.  The Department continues to advise federal, state, and local partners to remain vigilant to potential threats and encourages the public to report any suspicious activity to local authorities."
The FBI, which is on a distribution list for several of the reports, declined to comment.
The reports were first obtained by Property of the People, a nonprofit focused on transparency and national security, under open records law. The reports contain details about how to commit crimes and avoid law enforcement, which WIRED is not publishing.
Wendy Via, cofounder and president of the Global Project Against Hate and Extremism (GPAHE), says the conclusion reached by DHS matches the consensus of experts in the field: “Election denialism is going to be the primary motivator—if there is going to be violence.”
For decades, a growing number of states have adopted election drop boxes as a way to offer voters a dedicated, secure, and convenient way to submit voter ballots ahead of elections. Today, as many as 35 states allow drop boxes in some capacity, though a handful—nearly all southern—have outlawed their use, mostly over baseless claims about fraud and ballot stuffing. While drop boxes are no less secure than other forms of voting, Republicans have scrambled to block their use in key states, including Wisconsin, where Donald Trump blasted legislation expanding drop boxes as “only good for Democrats and cheating.” Via points to the Republican-led campaign aimed at banning and restricting access to election drop boxes in Wisconsin as a flash point for election denialism and possible violence.
The obsession with the otherwise mundane practice of dropping off ballots prior to election day stems in large part from the widely discredited film 2,000 Mules. The “documentary” depicts a shadowy network of operatives attempting to sway the 2020 election by stuffing ballots in Joe Biden’s favor; the film’s publisher, a conservative media company, has since issued an apology.
While the film’s evidence turned out to be false, it nevertheless provoked a surge of intimidation from far-right groups targeting drop-box voters and the officials defending their use. For the November election, some groups have committed to fundraising in order to surveil the boxes around the clock over public livestream. Others have hosted events near the locations to push conspiracy theories about immigrants. Election denial groups such as True the Vote, meanwhile, are working with myriad others across the country, as WIRED reported this summer, and are establishing a web of operations for waging legal warfare in the aftermath of the vote—if Trump fails to retake the White House a second time.
Spurious claims of voter fraud have remained a mainstay of the former president’s reelection efforts, with Trump preemptively and baselessly claiming that should he lose in November, the election will have been rigged. Claims that the 2020 presidential election was stolen have been exhaustively investigated and debunked by countless judges and state election officials across the country. Property of the People executive director Ryan Shapiro says that though DHS does not mention the political leanings of the subjects in its reports, he believes “the documents make plain that US intelligence is bracing for election- and immigration-related violence from Trump's MAGA minions.”
The concerns of DHS today are reminiscent of warnings shared by the agency two years ago during the midterm elections. Similar bulletins leaked then showing fears among federal security officials that extremists would mount an attack, threaten poll workers, or sabotage infrastructure. The concerns proved largely unwarranted, outside of scattered instances of armed men in paramilitary gear showing up to “monitor” ballot boxes across Arizona—an effort quietly spearheaded in part by True the Vote, which helped make 2,000 mules, involving militias that included the American Patriots Three Percent, an anti-government group.
The election threats flagged in the reports by DHS appear to be growing more extreme over time. No longer restricted to aggressive surveillance and loitering outside polling locations, the risks associated by DHS with election fraud conspiracies today more closely resemble traditional acts of terrorism.
There are, however, some deterrents. The arrests and prosecutions of rioters involved in the January 6 attack on the United States Capitol building are credited by DHS, as well as groups such as GPAHE, with stifling much of the enthusiasm that far-rights groups once held for turning out in big numbers.
“In my lifetime of working in civil rights, the January 6 arrests are the only time I’ve ever seen an arrest or prosecution work as a deterrent,” says Via. “They really do not want to go to jail.”
24 notes · View notes
justinspoliticalcorner · 5 months ago
Text
John Nichols at The Nation:
Donald Trump has made no secret of his determination to govern as a “dictator” if he regains the presidency, and that’s got his critics warning that his reelection would spell the end of democracy. But Trump and his allies are too smart to go full Kim Jong Un. Rather, the former president’s enthusiasm for the authoritarian regimes of Russia’s Vladimir Putin, Turkey’s Tayyip Erdoğan, and Hungary’s Viktor Orbán suggests the models he would build on: managing elections to benefit himself and his Republican allies; gutting public broadcasting and constraining press freedom; and undermining civil society. Trump, who famously demanded that the results of Georgia’s 2020 presidential voting be “recalculated” to give him a win, wants the trappings of democracy without the reality of electoral consequences. That’s what propaganda experts Edward Herman and Frank Brodhead once described as “demonstration elections,” in which, instead of actual contests, wins are assured for the authoritarians who control the machinery of democracy. The outline for such a scenario emerges from a thorough reading of Project 2025’s Mandate for Leadership, which specifically proposes a Trump-friendly recalculation of the systems that sustain American democracy. The strategy for establishing an American version of Orbán’s “illiberal democracy” is not spelled out in any particular chapter of Mandate. Rather, it is woven throughout the whole of the document, with key elements appearing in the chapters on reworking the Department of Homeland Security (DHS), the Federal Communications Commission (FCC), and the Federal Election Commission (FEC). In the section on the DHS, for instance, there’s a plan to eliminate the ability of the agency that monitors election security to prevent the spread of disinformation about voting and vote counting.
How serious a threat to democracy would that pose? Think back to November 2020, when Trump was developing his Big Lie about the election he’d just lost. Trump’s false assertion that the election had been characterized by “massive improprieties and fraud” was tripped up by Chris Krebs, who served as director of the Cybersecurity and Infrastructure Security Agency (CISA) in the DHS. The Republican appointee and his team had established a 24/7 “war room” to work with officials across the country to monitor threats to the security and integrity of the election. The operation was so meticulous that Krebs could boldly announce after the voting was finished: “America, we have confidence in the security of your vote, you should, too.” At the same time, his coordinating team declared, “The November 3rd election was the most secure in American history.” This infuriated Trump, who immediately fired the nation’s top election security official.
In Mandate’s chapter on the DHS, Ken Cuccinelli writes, “Of the utmost urgency is immediately ending CISA’s counter-mis/disinformation efforts. The federal government cannot be the arbiter of truth.” Cuccinelli previously complained that CISA “is a DHS component that the Left has weaponized to censor speech and affect elections.” As for the team that worked so successfully with Krebs to secure the 2020 election, the Project 2025 document declares that “the entirety of the CISA Cybersecurity Advisory Committee should be dismissed on Day One.” The potential impact? “It’s a way of emasculating the agency—that is, it prevents it from doing its job,” says Herb Lin, a cyber-policy and security scholar at Stanford’s Center for International Security and Cooperation.
This is just one way that Project 2025’s cabal of “experts” is scheming to thwart honest discourse about elections and democracy. A chapter on public broadcasting proposes to defund the Corporation for Public Broadcasting as part of a larger plan to upend NPR, PBS, and “other public broadcasters that benefit from CPB funding, including the even-further-to-the Left Pacifica Radio and American Public Media.” More destabilizing than the total funding cut that Project 2025 entertains is a parallel plan to end the status of NPR and Pacifica radio stations as “noncommercial education stations.” That could deny them their current channel numbers at the low end of the radio spectrum (88 to 92 FM)—a move that would open prime territory on the dial for the sort of religious programming that already claims roughly 42 percent of the airwaves that the FCC reserves for noncommercial broadcasting. And don’t imagine that the FCC would be in a position to write new rules that guard against the surrender of those airwaves to the Trump-aligned religious right.
[...]
While project 2025 seeks to rewire the FCC to favor Trump’s allies, it also wants to lock in dysfunction at the Federal Election Commission, the agency that is supposed to govern campaign spending and fundraising. Established 50 years ago, the FEC has six members—three Republicans and three Democrats—who are charged with overseeing the integrity of federal election campaigns. In recent years, however, this even partisan divide has robbed the FEC of its ability to act because, as a group of former FEC employees working with the Campaign Legal Center explained, “three Commissioners of the same party, acting in concert, can leave the agency in a state of deadlock.” As the spending by outside groups on elections “has exponentially increased, foreign nationals and governments have willfully manipulated our elections, and coordination between super PACs and candidates has become commonplace,” the former employees noted. Yet “the FEC [has] deadlocked on enforcement matters more often than not, frequently refusing to even investigate alleged violations despite overwhelming publicly available information supporting them.”
John Nichols wrote in The Nation about how Project 2025’s radical right-wing wishlist of items contains plans to wreck and subvert what is left of America’s democracy.
See Also:
The Nation: June 2024 Issue
19 notes · View notes
i-am-misery · 2 months ago
Text
Tumblr media
I will make you miserable..
Airi kimura, daughter of oizys, legacy of ares, criminal, 18, 5'7, has a high bounty, beware of her
She/her, bisexual, she does not know if she's capable of love, born on November 5, Entp, she will make you feel miserable.
Crimes I have committed
Arson, theft, cyber crimes, fraud, hijacking, murder, manslaughter, aggravated assault, battery, hit and run, embezzlement, extortion, drug trafficking, perjury, piracy, vandalism, money laundering, smuggling, stalking, racketeering, lynching, sedition, blackmail and more.
Some of my powers
She can control mental/emotional misery, sorrow, and woe at will, either lowering its severity or boosting
She is innately more resistant to mental and physical pain.
She is able to enshroud herself with an aura of misery and depression, causing anyone to get too close to them to feel intense feelings of the two and become unmotivated enough to not put as much effort in their attack
She is able to channel any feelings of pain, anxiety, or depression that they are feeling into forming a weapon of these emotions.
She can inflict a limited amount of mental pain upon others nearby, the intensity dependent upon the will of the attacker.
She can inflict a limited amount of physical pain upon others nearby. The more pain inflicted, the more power is drained for them. The continuous usage of this power leads to the user become increasingly fatigued.
People may tell you that I'm psychopath, a lunatic, a creep, or even an apathetic asshole, but im just a girl with issues having some fun and living my best life
My other blogs are @itsyourboyezra, @boy-of-the-flowers, @ride-the-tide, @aphrodites-handmaiden
Taglist
@mhm-im-chaotic-good @gellyhelio @clown-energy-skyrocketing @iceweavercatlover @of-course-im-the-winner @ridethiscowboyy @stephen-the-spider @demeters-daughter-is-done @kiaradaughterofselene @ariathemortal
13 notes · View notes
trulybetty · 1 year ago
Text
oct' 21 x acorns
Tumblr media Tumblr media
Prompt: acorns Pairing: tim rockford x f!reader Word Count: 724 Warnings: T+ mentions of crimes & a touch of spice. Summary: pretty proud of this one and it's use of the prompt 😋 tim knows the way to your heart is discussing the latest research for your podcast.
x. masterlist
Tumblr media
“Acorns? You moving into squirrel crimes now sweetheart?”
“Ha ha,” you responded dryly,  “ACORNS, the Australian Cybercrime Online Reporting Network.” He raised an eyebrow in interest, you weren’t sure if this was the result of learning what the acronym was for or if it had something to do with you starting the process of peeling off your t-shirt.
When you looked back at him, once the shirt was up and over your head, he was adjusting himself where he was sitting up against the headboard of the bed, his glasses now folded on top of the book he had been reading when you’d entered the room.
“So,” he began, a soft smile playing at his lips as he crossed his arms at his bare chest, “what’s caught your eye?” he asked.
You smiled back at him, a genuine one - he knew the way to your heart, true crime.
“So,” you started, turning to the dresser as you unhooked your bra, “so they were seeing an increase in reports on ACORNS, right? You've got your standard mix of fraud, identity theft, all the usual cybercrime stuff. Nothing to write home about right?”
“But?” Tim pressed, playing along.
“But what got me curious was a pattern of crimes that looked like random, disconnected incidents targeting average people. We're talking about everything from a cafe owner in Sydney to a retired nurse in Perth. And this has been going on for years.”
"Years?" Tim echoed, intrigued. "And they're just noticing this now?"
“Exactly!” you replied enthusiastically, tossing your bra into the laundry hamper and reaching into the dresser for one of Tim’s oversized shirts, what he wore when he actually had more than five minutes at home between cases. “The reports have only now been made public, and by the looks of it it’s taken them this long to even realize something might be off, and because it’s public knowledge, it’s caught the attention of the armchair detectives who are digging in, but no one can find a connection.”
Tim shifted in his seat again, tapping his fingers against his chest thoughtfully. “Not entirely strange though,” he said. “Cyber crimes are still relatively new. Many countries are sitting on data that they just don’t know what to do with besides selling it. Though, with any crime, patterns usually emerge sooner or later, someone slips up. Have they found anything that could point to a single culprit or group?”
“Nothing. Zilch. That's why it's so bizarre,” you said, shimming out of your jeans and kicking them off before walking over to sit beside him on the bed. “But here's where it gets interesting. When you compare these Australian cases to similar crimes reported in neighbouring countries like New Zealand or Indonesia, little patterns start to stand out.”
Tim raised an eyebrow, his attention fully piqued. “What kind of patterns are we talking about?”
You grinned, thrilled by his obvious interest. “Teeny tiny little anomalies,” you took his glasses and book and placed them on your bedside table, “Specific coding sequences, certain times of the day when the attacks occur, even certain types of targets that are more frequently hit in both regions. Individually, these little things don't really mean much. But when you start looking at them collectively and across borders, it’s like a constellation. You begin to see the outline of something much bigger.”
“Sounds like someone's running a long con,” Tim observed.
He uncrossed his arms as you swung your leg over to straddle his hips, your arms wrapping around his neck to rest on his broad shoulders.
“That's what I'm thinking too,” you said, your voice low as you leaned in to place a kiss on his lips.
Tim's hands slid up your sides, his fingers grazing the bare skin of your back under the t-shirt, “You really shouldn't have bothered.” he said, his voice low and husky.
You leaned in closer, your breath hot against his ear, “Bothered with what?” you whispered feigning cluelessness, trailing kisses down his neck.
“The shirt,” Tim replied, tilting his head back to grant you better access. “You're much better without it.”
You laughed softly, the sound sending shivers down his spine. “I needed something to wear.”
“Who said you needed to wear anything at all?” Tim countered, flipping you both over so he was on top of you.
18 notes · View notes
prithvirak · 20 days ago
Text
Understanding Privacy Breaches in India: A Growing Concern
Privacy breaches are becoming a prevalent yet gravely worrisome problem in today's increasingly digital world, especially in India, where a plethora of new cyber threats have been brought about by fast digitization. Data breaches are more dangerous than ever as more people rely on digital platforms for banking, retail, communication, and even government functions. Protecting personal information is essential for both individuals and businesses and not doing so can have dire repercussions. This blog explores the definition of privacy breaches, their effects, and self-defence measures. Any unauthorized access, sharing, or theft of personal information constitutes a privacy breach. This may occur as a result of a deliberate hacking attempt or an unintentional disclosure. Privacy breaches are frequently more personal in nature, focusing on sensitive information like your name, financial information, or private chats, in contrast to data breaches, which usually involve the exposure of vast amounts of data. Millions of people have been impacted by these breaches, which have increased in frequency in India, where internet penetration is rising quickly.
Data leaks are among the most prevalent kinds of privacy violations. When private information is unintentionally made public by inadequate security measures, it is referred to as a data leak. These breaches can happen when businesses neglect to encrypt private information, making it open to illegal access. For instance, millions of people's names, addresses, and identification numbers were made public in 2021 due to a huge database leak in India, raising serious concerns about fraud and identity theft. Unauthorized access is another frequent way that privacy is violated. Cybercriminals obtain unauthorized access to networks or accounts using a variety of methods. For example, phishing is a popular technique where attackers deceive victims into disclosing personal information or login passwords. The attacker can access private accounts, steal information, or even perpetrate financial fraud once they have this data. Phishing assaults have increased in India, where the perpetrators frequently impersonate reputable organizations, such as banks or government offices, in order to trick their victims.  In India, identity theft is yet another common privacy violation. To impersonate someone, criminals take their personal information, including their Aadhaar number. They can start phony bank accounts, commit crimes, or make purchases using the victim's name using this stolen identity. This kind of privacy violation has become especially harmful to the victims, both financially and emotionally, as a result of the increased reliance on digital identification and financial systems.
Another important factor in privacy violations is social media. By excessively disclosing personal information on social media sites like Facebook, Instagram, and Twitter, many Indians unwittingly jeopardize their privacy.�� Social media breaches happen when hackers make use of publicly accessible information to obtain additional private information or coerce users into disclosing even more private information. Alarming facts support the growing trend of privacy breaches in India. Over 1.16 million cybercrimes were reported in India in 2020 alone, a large percentage of which entailed privacy breaches, according to recent data. Victims may suffer terrible financial and psychological costs, and the consequences are frequently permanent. Since more personal information is being kept online than ever before, there is a greater chance of breaches, which makes cybersecurity a critical concern for both individuals and companies. The effects of privacy violations are extensive. Individuals may experience financial loss, reputational harm, or identity theft as a result of data breaches. Knowing that criminals have access to their personal information frequently causes victims to feel anxious or distressed. The repercussions are just as bad for corporations. Legal issues, significant fines, and a decline in customer trust might result from a privacy violation. After a major breach, some businesses may be compelled to close since the harm to their brand is irreversible.
Preventive actions are crucial in the fight against privacy violations. People should exercise caution when using the internet by creating strong, one-of-a-kind passwords for every account, turning on two-factor authentication, and being careful about what they post on social media. In order to guard against vulnerabilities, it's also essential to update programs and software often. Businesses need to make investments in robust cybersecurity procedures, like encrypting confidential information, carrying out frequent security audits, and teaching staff members how to spot phishing scams.
In conclusion, privacy violations are becoming a bigger issue in India that impacts both people and businesses. The threats of cybercrimes will only rise as long as we continue to rely on digital platforms. We can reduce the possibility of falling victim to a privacy breach by being aware of the risks and adopting preventative measures to safeguard personal data. Keep yourself informed, remain safe, and safeguard your online privacy.
2 notes · View notes
jcmarchi · 4 months ago
Text
Deepfake misuse & deepfake detection (before it’s too late) - CyberTalk
New Post has been published on https://thedigitalinsider.com/deepfake-misuse-deepfake-detection-before-its-too-late-cybertalk/
Deepfake misuse & deepfake detection (before it’s too late) - CyberTalk
Tumblr media Tumblr media
Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology, and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 CISSP and holds a Master of Science in Technology Commercialization from the University of Texas at Austin, and an MBA with a global security concentration from East Carolina University.
In this dynamic and insightful interview, Check Point expert Micki Boland discusses how deepfakes are evolving, why that matters for organizations, and how organizations can take action to protect themselves. Discover on-point analyses that could reshape your decisions, improving cyber security and business outcomes. Don’t miss this.
Can you explain how deepfake technology works? 
Deepfakes involve simulated video, audio, and images to be delivered as content via online news, mobile applications, and through social media platforms. Deepfake videos are created with Generative Adversarial Networks (GAN), a type of Artificial Neural Network that uses Deep Learning to create synthetic content.
GANs sound cool, but technical. Could you break down how they operate?
GAN are a class of machine learning systems that have two neural network models; a generator and discriminator which game each other. Training data in the form of video, still images, and audio is fed to the generator, which then seeks to recreate it. The discriminator then tries to discern the training data from the recreated data produced by the generator.
The two artificial intelligence engines repeatedly game each other, getting iteratively better. The result is convincing, high quality synthetic video, images, or audio. A good example of GAN at work is NVIDIA GAN. Navigate to the website https://thispersondoesnotexist.com/ and you will see a composite image of a human face that was created by the NVIDIA GAN using faces on the internet. Refreshing the internet browser yields a new synthetic image of a human that does not exist.
What are some notable examples of deepfake tech’s misuse?
Most people are not even aware of deepfake technologies, although these have now been infamously utilized to conduct major financial fraud. Politicians have also used the technology against their political adversaries. Early in the war between Russia and Ukraine, Russia created and disseminated a deepfake video of Ukrainian President Volodymyr Zelenskyy advising Ukrainian soldiers to “lay down their arms” and surrender to Russia.
How was the crisis involving the Zelenskyy deepfake video managed?
The deepfake quality was poor and it was immediately identified as a deepfake video attributable to Russia. However, the technology is becoming so convincing and so real that soon it will be impossible for the regular human being to discern GenAI at work. And detection technologies, while have a tremendous amount of funding and support by big technology corporations, are lagging way behind.
What are some lesser-known uses of deepfake technology and what risks do they pose to organizations, if any?
Hollywood is using deepfake technologies in motion picture creation to recreate actor personas. One such example is Bruce Willis, who sold his persona to be used in movies without his acting due to his debilitating health issues. Voicefake technology (another type of deepfake) enabled an autistic college valedictorian to address her class at her graduation.
Yet, deepfakes pose a significant threat. Deepfakes are used to lure people to “click bait” for launching malware (bots, ransomware, malware), and to conduct financial fraud through CEO and CFO impersonation. More recently, deepfakes have been used by nation-state adversaries to infiltrate organizations via impersonation or fake jobs interviews over Zoom.
How are law enforcement agencies addressing the challenges posed by deepfake technology?
Europol has really been a leader in identifying GenAI and deepfake as a major issue. Europol supports the global law enforcement community in the Europol Innovation Lab, which aims to develop innovative solutions for EU Member States’ operational work. Already in Europe, there are laws against deepfake usage for non-consensual pornography and cyber criminal gangs’ use of deepfakes in financial fraud.
What should organizations consider when adopting Generative AI technologies, as these technologies have such incredible power and potential?
Every organization is seeking to adopt GenAI to help improve customer satisfaction, deliver new and innovative services, reduce administrative overhead and costs, scale rapidly, do more with less and do it more efficiently. In consideration of adopting GenAI, organizations should first understand the risks, rewards, and tradeoffs associated with adopting this technology. Additionally, organizations must be concerned with privacy and data protection, as well as potential copyright challenges.
What role do frameworks and guidelines, such as those from NIST and OWASP, play in the responsible adoption of AI technologies?
On January 26th, 2023, NIST released its forty-two page Artificial Intelligence Risk Management Framework (AI RMF 1.0) and AI Risk Management Playbook (NIST 2023). For any organization, this is a good place to start.
The primary goal of the NIST AI Risk Management Framework is to help organizations create AI-focused risk management programs, leading to the responsible development and adoption of AI platforms and systems.
The NIST AI Risk Management Framework will help any organization align organizational goals for and use cases for AI. Most importantly, this risk management framework is human centered. It includes social responsibility information, sustainability information and helps organizations closely focus on the potential or unintended consequences and impact of AI use.
Another immense help for organizations that wish to further understand risk associated with GenAI Large Language Model adoption is the OWASP Top 10 LLM Risks list. OWASP released version 1.1 on October 16th, 2023. Through this list, organizations can better understand risks such as inject and data poisoning. These risks are especially critical to know about when bringing an LLM in house.
As organizations adopt GenAI, they need a solid framework through which to assess, monitor, and identify GenAI-centric attacks. MITRE has recently introduced ATLAS, a robust framework developed specifically for artificial intelligence and aligned to the MITRE ATT&CK framework.
For more of Check Point expert Micki Boland’s insights into deepfakes, please see CyberTalk.org’s past coverage. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.
2 notes · View notes
cult-of-the-eye · 1 year ago
Text
Ok unathorised fan treatise characters as avatars:
(SPOILERS)
Gottie:
The desolation
The way this had been a revenge tale from the very start
She knew she was destroying Rob and in doing so she destroyed herself
And she justified it every step of the way
And then she moves on to the next fandom as if nothing happened???
It's all very burn it all down and then do it again
Or she could be the web, with the way she manipulated LITERALLY EVERYONE into believing her version of events to the point where rob was convicted of murder
Rob:
This one's a bit interesting cause we don't actually know rob
All we know for sure is that he was convicted of fraud and murder, he was dating Nathan and gotties thoughts on him
We can be sure that he did commit the fraud, although the murder is a bit more of a grey area
He's giving the slaughter
To me, the slaughter is about making a spectacle of it
The man has been committing fraud but then also cyber bullying people off websites and he's THRIVING
All of his revenge ploys were very public and I think that's the horror of them - everyone ostracised Effie/Gottie and everyone slandered nessiesgirl - that's why it was so terrible
He's also an actor - he lives off the attention while knowing he's got all that darkness under his sleeves
Also he killed Nathan knowing everyone thought he had just disappeared, he tortured gottie with the idea that the police thought she was guilty, that feels very vindictive in this specific way
I'd be willing to think about the stranger!rob or if anyone has any other suggestions
I don't think we have enough information about everyone else to think about them but yeah they're both such terrible people i want to study then under separate microscopes so they don't kill each other
10 notes · View notes
galaxymagick · 8 months ago
Text
230315 jungtw_leo 🐦
@jungtw_leo
낮부터 네이버 안전거래 사기 당했어ㅋㅋㅋㅋㅋ
I've been scammed by Naver's secure transactions since daytimeㅋㅋㅋㅋㅋ
@jungtw_leo
ㅋㅋㅋㅋㅋㅋㅋ 글러브를 샀는데
ㅋㅋㅋㅋㅋㅋㅋ I bought gloves
@jungtw_leo
사기였어ㅋㅋㅋ
It was a scamㅋㅋㅋ
@jungtw_leo
새거 글러브 올라왔는데 개인거래라 샀는데 수수료 안냈다고 다시 수수료까지 내래서 보냈더니 부결 났다고 150만원을 더보내래서 이상하다싶어 찾아보니 사기였음ㅋㅋㅋㅋ
New gloves came up, but I bought it because it was a private transaction. They said I didn't pay the fee, so I sent it again with a fee, and it was rejected.They asked me to send them an additional 1.5 million won, so I thought it was strange, looked it up, and found out that it was a scam.
@jungtw_leo
ㅋㅋㅋㅋ 다른건 괜찮은데 약오르네
ㅋㅋㅋㅋ Everything else is okay, but I'm getting sick of it
@jungtw_leo
글러브 80만원ㅋㅋㅋㅋ
Gloves 800,000 wonㅋㅋㅋㅋ
@jungtw_leo
40만원 두번 보냄ㅋㅋㅋ 이렇게 또 배운다ㅋㅋ
Sent 400,000 won twiceㅋㅋㅋ This is how I learn againㅋㅋ
@jungtw_leo
아니 약오르는데? ㅋㅋㅋ 엄청 약올라 죽겠네?ㅋㅋㅋㅋㅋ
No, it's getting worse? ㅋㅋㅋ I'm going to die because I'm so annoyed?ㅋㅋㅋㅋㅋ
@jungtw_leo
신고한다고 잡히나ㅋㅋ
Will I get caught if I report itㅋㅋ
@jungtw_leo
↳ replying to ⭐️ 아니면 잡아줄까,,,?별빛수사대 출동✨Or do you want me to catch you? Starlight investigation team is on its way ✨
아니 괴롭혀줘
No don't torment me
@jungtw_leo
↳ replying to ⭐️ 위닝 제품이 맞나요 옵바야 Is this a winning product?
맞아~
thats right~
@jungtw_leo
최근 사기기록 9건이네 이사람ㅋㅋ
This persom has got nine recent fraud recordsㅋㅋ
@jungtw_leo
↳ replying to ⭐️ 택운아 혹시 입금하고 계좌 알려줬으면 은행 가서 계좌도 막아놔야해... 오빠 니 계좌 털어서 다른 사기범죄에 쓸 수도 있어요 그럼 당신도 보이스피싱 사기거래 연루야 계좌 싹 막히고 검찰 조사 받아야된다...Taekwoon, if you deposited money and told me the account, you should go to the bank and block the account...Brother, I could steal your account and use it for other fraudulent crimes. Then, you are also involved in voice phishing fraud. Your account should be completely blocked and you should be investigated by the prosecution.
계좌번호 알려줬는데
I gave them my account number.
@jungtw_leo
↳ replying to ⭐️ 잡기 어려울껄.... 내 친구 저 수법 그대로 당해서 사이버수사대 신고해서 경찰서 왔다갔다 했는데도 못잡고 끝났어... 택운만큼의 금액이었는데... 어렵다고 하더라....It must be difficult to catch…. My friend fell victim to the same method and reported it to the cyber crime investigation team and went back and forth to the police station, but they couldn't catch him… It was the same amount as Taekwoon's… They said it was difficult…
형이 거기서 왜 나와 (형 아닌건 알지만)
hyung why are you there (I know you’re not my brother)
*please excuse any translation mistakes
3 notes · View notes
mariacallous · 3 months ago
Text
French prosecutors gave preliminary information in a press release on Monday about the investigation into Telegram CEO Pavel Durov, who was arrested suddenly on Saturday at Paris’ Le Bourget airport. Durov has not yet been charged with any crime, but officials said that he is being held as part of an investigation “against person unnamed” and can be held in police custody until Wednesday.
The investigation began on July 8 and involves wide-ranging charges related to alleged money laundering, violations related to import and export of encryption tools, refusal to cooperate with law enforcement, and “complicity” in drug trafficking, possession and distribution of child pornography, and more.
The investigation was initiated by “Section J3” cybercrime prosecutors and has involved collaboration with France’s Centre for the Fight against Cybercrime (C3N) and Anti-Fraud National Office (ONAF), according to the press release. “It is within this procedural framework in which Pavel Durov was questioned by the investigators,” Paris prosecutor Laure Beccuau wrote in the statement.
Telegram did not respond to multiple requests for comment about the investigation but asserted in a statement posted to the company's news channel on Sunday that Durov has “nothing to hide.”
“Given the existence of several preliminary investigations in France concerning Telegram in relation to the protection of minors' rights and in cooperation with other French investigation units—for instance, on cyber harassment—the arrest of Durov, does not seem to me like a highly exceptional move,” says Cannelle Lavite, a French lawyer who specializes in free-speech matters.
Lavite notes that Durov is a French citizen who was arrested in French territory with an arrest warrant issued by French judges. She adds that the list of charges involved in the investigation is “extensive,” a wide net that she says is not entirely surprising in the context of “France's ambiguous legislative arsenal” meant to balance content moderation and free speech.
Durov is a controversial figure for his leadership of Telegram, in large part because he has not typically cooperated with calls to moderate the platform's content. In some ways, this has positioned him as a free-speech defender against government censorship, but it has also made Telegram a haven for hate speech, criminal activity, and abuse. Additionally, the platform is often billed as a secure communication tool, but much of it is open and accessible by default.
“Telegram is not primarily an encrypted messenger; most people use it almost as a social network, and they’re not using any of its features that have end-to-end encryption,” says John Scott-Railton, senior researcher at Citizen Lab. “The implication there is that Telegram has a wide range of abilities and access to potentially do content moderation and respond to lawful requests. This puts Pavel Durov very much in the center of all kinds of potential governmental pressure.”
On top of all of this, many researchers have questioned whether Telegram's end-to-end encryption is durable when users do elect to enable it.
French president Emmanuel Macron said in a social media post on Monday that “France is deeply committed to freedom of expression and communication … The arrest of the president of Telegram on French soil took place as part of an ongoing judicial investigation. It is in no way a political decision.”
News of Durov's arrest is fueling concerns, though, that the move could threaten Telegram's stability and undermine the platform. The case seems poised, too, to have implications in long-standing debates around the world about social media moderation, government influence, and use of privacy-preserving end-to-end encryption.
Lavite says the case certainly invokes debates about “the balance between the right to encrypted communication and free speech on the one hand, and users' protection—content moderation—on the other hand.” But she notes that there is a lot of information about the investigation that is unknown and “a lot of blurry zones still.”
On Monday afternoon, Telegram seemed to be receiving a download boost from the situation, moving from 18th to 8th place in Apple's US App Store apps ranking. Global iOS downloads were up by 4 percent, and in France the app was number one in the App Store social network category and number three overall.
8 notes · View notes
unpluggedfinancial · 6 months ago
Text
Why People Oppose CBDCs and the Laws Enacted to Fight Them
Tumblr media
Central Bank Digital Currencies (CBDCs) have become a hot topic in the world of finance. These digital currencies, issued by central banks, promise to revolutionize the way we transact. However, they also face significant opposition. This article explores the reasons behind the opposition to CBDCs and the legislative actions taken against them.
What are CBDCs?
CBDCs are digital versions of a country’s fiat currency, issued and regulated by the central bank. Unlike decentralized cryptocurrencies such as Bitcoin, CBDCs are controlled by the government. Countries like China and the Bahamas have already launched their versions of CBDCs, while many others, including the United States, are exploring their potential.
Reasons for Opposition
Privacy Concerns
One of the primary concerns about CBDCs is the potential for government surveillance. Unlike cash transactions, which are anonymous, digital transactions can be tracked. This could allow governments to monitor individuals’ spending habits and financial activities closely. For instance, a government could potentially know what you buy, when you buy it, and where you buy it. This level of surveillance is unsettling for many who value their financial privacy.
Control and Censorship
CBDCs could also give governments unprecedented control over personal finances. They could, for example, freeze accounts or limit what individuals can spend their money on. This level of control raises concerns about potential misuse of power. Imagine a scenario where political dissenters find their access to funds restricted because of their opposition to the government.
Economic Freedom
Opponents of CBDCs argue that they could erode financial autonomy. Decentralized cryptocurrencies like Bitcoin offer an alternative to the traditional financial system, promoting financial freedom and independence. In contrast, CBDCs are seen as a tool for reinforcing governmental control over the economy.
Security Risks
Digital currencies are susceptible to cyber-attacks and fraud. The infrastructure supporting CBDCs would need to be highly secure to prevent hacking and protect users’ funds. Any vulnerabilities in the system could have severe consequences, including financial losses and disruptions in the economy.
Laws and Regulations Against CBDCs
Opposition to CBDCs has led to the introduction of various laws aimed at restricting or prohibiting their use. Several states in the US have taken significant steps in this direction.
State-Level Legislation
South Dakota: Recently passed a law prohibiting the state from accepting CBDCs as payment and blocking participation in CBDC trials.
Indiana, Florida, and Alabama: Between April and June 2023, these states passed laws excluding CBDCs from the definition of money under the Uniform Commercial Code, potentially discouraging business usage.
Oklahoma: Passed a law preventing the state from participating in CBDC trials or using CBDCs.
Federal-Level Legislation
CBDC Anti-Surveillance State Act: In September 2023, the House Financial Services Committee voted in favor of this act, which would prohibit the Federal Reserve from issuing a CBDC directly to individuals or using it for monetary policy. This bill still needs to pass the full House and Senate.
Political Stances: Former President Donald Trump has vowed to block a CBDC if he becomes President again.
Impact of Opposition
The opposition to CBDCs has significant implications for their adoption and implementation. State-level laws and proposed federal bills create substantial hurdles, signaling strong resistance to their rollout. Concerns about financial privacy and government overreach play a crucial role in shaping public opinion and legislative action. If the opposition successfully limits or prevents the rollout of CBDCs, it could influence global approaches to digital currencies.
Conclusion
The debate over CBDCs is far from over. While they promise to modernize the financial system, the concerns about privacy, control, economic freedom, and security cannot be ignored. The laws and regulations against CBDCs reflect a broader political and societal debate about the future of money and financial autonomy. As this debate continues, it is essential to stay informed and engaged with developments in digital currencies.
Call to Action
What are your thoughts on CBDCs? Do you support their implementation, or do you have concerns about their impact? Share your opinions in the comments section below.
For more insights on financial freedom and digital currencies, subscribe to our blog and join the conversation. Don't forget to check out our YouTube channel, Unplugged Financial, where we dive deeper into these topics with in-depth analyses, expert interviews, and practical advice. Join us as we explore the future of money and the potential for a financial revolution!
Subscribe to our blog for the latest articles: Unplugged Financial Blog
Watch our videos and subscribe to our YouTube channel: Unplugged Financial YouTube Channel
Let's learn about the Bitcoin evolution together!
3 notes · View notes
myriadxofxmuses · 6 months ago
Text
MULTIMUSE QUESTIONAIRE
RULES: Answer the questions with the Muses that would best fit the answers. Bonus if you give details why.
1) Rank your softest Muse and your toughest Muse. (Personality-wise) Softest would be Ofreyja. She is naive in a lot of ways and her heart is always on her sleeve. She is just so open to everything that it's easy for others to take advantage of it.
Toughest is definitely Oscar. Hands down. His training, lack of fear, and determination see him through pretty much anything.
2) Which Muse would blow through $1000 quickly? Ivy. She does it all the time when she hacks people's credit cards. But don't worry. It's always people who deserve it. And they get the money back anyway when they claim it as fraud so there's no real damage. Plus Ivy is more than capable to cover her tracks to avoid detection, so it's a win for both parties.
3) Do any of them have nicknames? Is there a meaning behind them? Ethan is so affectionately called E or E-Heazey. Both of which he hates. And there isn't any real meaning behind them. Just his douche bag, yuppy friends and their typical frat boy behavior.
Gage had a few - Rage Gage, Turnstile, Messaih. Plus the usual entertainment bullshit of 'big man on campus', 'ladies man', etc. The ones that matter however have meaning behind each one. Rage Gage because he loved Tencious D growing up. Turnstile because he's a whore. And Messiah because his parents names are Mary and Joseph.
Ivy is known as 8bit-Cyanide to those involved in the cyber world. It's her handle.
Silas has been given two by his bandmates. Speedy and Tree Hugger. He got Speedy because of his addictions to both cocaine and sugar. And Tree Hugger because of his upbringing in a cult.
Emily has been affectionately named Vinny by her brother because of her love for Vincent Van Gogh. Plus it's so specific to them that it can also be used as a code word if needed - something Oscar likes to point out to her as often as possible.
She has affectionately named him Oscar the Grouch as a testimate to his serious nature.
4) Are any of them up-to-speed on the latest trends? Anyone more old school? Ofreyja, Gage, and Ivy are pretty up to date with trends. Emily and Oscar tend to be more old school. Ethan and Silas could honestly care less, but they don't need a whole lot of help staying on point with things. It comes naturally for them.
5) Who has the best relationship with their siblings? Emily and Oscar. But they barely beat out Gage and Celeste.
6) Karaoke night! Who is likely to grab the mic first and bust out a tune? Ivy. Usually when she's gotten tipsy enough to do so. And her voice isn't half bad either. Also Ofreyaja, but she's not that great. She just has fun with it.
7) Who is least likely to enter a beauty pageant/model? Emily, Oscar, and Sydney
8) If your Muses visited a haunted house where actors scare you, who would panic and who would be unfazed? Panic would be Oscar. It would trigger his PTSD and he knows it, so he avoids them. Unfazed is definitely Gage and Silas.
9) Are any of your Muses particular about taking certain modes of transportation? Gage loves older race cars, but he doesn't drive them much to keep them pristine. Other than that, no, not really.
10) Share a little-known fact about any Muse. Oscar can wiggle his ears.
tagged by: @uncxntrxllable
tagging: @waveofstars , @heartxshaped-bruises , @strictlyoc , @strictlycanon , @amongxthexcrowd , @missautumn , @ruinedsoulsrp , @huntrcssqueen , @disposablelover , @lostxones , @sheiismother
6 notes · View notes
vortship · 1 year ago
Text
Tumblr media
FULL NAME. Halinor Artay Nima NICKNAME. Hal ALIASES.‏ Starriest (online moniker)‏‎ PRONOUNS. she/her HEIGHT.‎‏‏‎ ‎‏‏‎4'0" AGE. 12 ‎‏‏‎ ‎ ZODIAC. Aquarius ‎ SPOKEN LANGUAGES. Vortian, Galactic Standard, English ‎‏‏‎ ‎‏‏‎
‎‏‏‎ ‎ 𝐏𝐇𝐘𝐒𝐈𝐂𝐀𝐋 𝐂𝐇𝐀𝐑𝐀𝐂𝐓𝐄𝐑𝐈𝐒𝐓𝐈𝐂𝐒 ―
HAIR.‎‏‏‎ In disguise, her hair is a burnt orangey red color, it's incredibly wavy and falls about shoulder length‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ FACIAL HAIR. ‎‏‏‎ ‎‏‏ ‏ EYES. Wide and violet with heavy black lashes.‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ SKIN TONE. Out of disguise, her skin is a natural pink, in disguise she's pale, and in both forms, her face is dusted with freckles. BODY TYPE. Lanky, long legs and a short torso, looks like she'd fight a hamster and lose. VOICE. Her speaking voice claim is Mei Whitman, typically slightly nasally, always speaking at a rapid pace, but able to switch to a lower register with slightly more "grit" when she's serious. ‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ DOMINANT HAND. ambidextrous ㅤ‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ POSTURE. ‎Usually standing up straight, but still in a relaxed position, like she's trying to seem a little taller than she really is. Often can be found leaning against stuff, especially when she's being overly dramatic, has a habit of switching her weight from one foot to another or swaying lightly. She's very flighty, antsy, and can't be still.‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ SCARS. ‎‏‏A lot of them on her hands from working unprotected with electrical equipment, a large one on her upper arm from an incident involving a ship-hijacking she was apart of. MOST NOTABLE FEATURES. A huge, sharp-toothed grin, sometimes goofy, sometimes foreboding. Also has a small tattoo on her shoulder to signify she's apart of the Nima crime family. ‏‏‎ ‏‏ 𝐂𝐇𝐈𝐋𝐃𝐇𝐎𝐎𝐃 ― PLACE OF BIRTH. Region 9, Vortㅤ HOMETOWN. Detroit, Michigan (verse-dependent) ㅤ ‎ SIBLINGS. Finn Nima, and six other brothers.‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ PARENTS. Voxia Artay- an ill-fated woman who died of a space plague known as Entrops Krun Nima‎‏‏‎- Feared mafia leader, father to his seven sons that act as enforcers for his deadly organization. Has been executed by the Irken military. ‎‏‏‎ 𝐀𝐃𝐔𝐋𝐓 𝐋𝐈𝐅𝐄 ―
OCCUPATION. ‎Hacker both for cash and for fun. She's a tiny thorn in space's side and now Earth's. ‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ CURRENT RESIDENCE. Detroit, Michiganㅤ‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ CLOSE FRIENDS. (Formerly) Niri Litch, otherwise verse dependent FINANCIAL STATUS. In poverty (spends all the money she gets on useless stuff she doesn't need) DRIVER'S LICENSE. nope‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ CRIMINAL RECORD. Yes. Including but not limited to acts of cyber terrorism, fraud, harassment, vandalism, a billion counts of theft probably, criminal contempt of court, as well as being an accessory to several murders and other crimes. ‎‏‏‎ ‎ VICES. Pugs that are more abomination than animal, overly-sweet food, and Kpop‏‏‎
SEXUAL ORIENTATION. PREFERRED EMOTIONAL ROLE. PREFERRED SEXUAL ROLE. ‎‏‏‎ ‎ TURN OFFS. ‎.‏ TURN ON'S. ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ LOVE LANGUAGE. ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ RELATIONSHIP TENDENCIES. ‎‏‏‎ ‎‏‏‎
‎‏‏‎ ‎‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ 𝐌𝐈𝐒𝐂𝐄𝐋𝐋𝐀𝐍𝐄𝐎𝐔𝐒 ―
CHARACTER'S THEME TUNE. KIRA - Digital Girl‎ BLACKPINK- Pretty Savage Poppy- I'm Poppy HOBBIES TO PASS THE TIME. Playing the launchpad, making music, singing, dancing, ‏‏‎tinkering, shitposting on social media, watching reality tv. ‎‏‏‎ ‎‏‏‎ ‎ LEFT OR RIGHT BRAINED. ‎‏‏‎left-brained ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎‏‏‎ ‎ SELF-CONFIDENCE LEVEL. High confidence but mid to low self esteem, if that makes any sense.
10 notes · View notes
movedtodykedvonte · 2 years ago
Text
Ok but would any of the cyber citizens care if Spamton was ever found out to have gotten help from the phone? The Addisons knew the calls were part of his success so I can assume others figured this out as well, yet it doesn’t seem like it affected him getting to the high life.
It just makes me wonder if Spamton had created this added layer of anxiety and imposter syndrome on top of unbreakable reliance on the phone because he convinced himself that he needed to seem special and qualified on his own. That he had to deny outside help or alliance cause he, the least likely addison, was seen as this self made man and success story, at least in his mind. That he didn’t need a safety net cause he was the net!
Too afraid and ashamed to ask for help when things came crashing down cause he didn’t want to seem like a dependent fraud when no one would’ve cared either way.
22 notes · View notes
agtictl23 · 1 year ago
Text
SESSION 5. COMPUTER CRIME
READ: ICTL TEXTBOOK CHAPTER 4
OPTIONAL REFERENCE: L&T BOOK CHAPTER 19
‘Computer Crime’ v. ‘Cybercrime’: Computer and internet usage is on the rise due to lower costs and easier accessibility. As it is another mode of transaction and one that is heavily dependent on the interaction through computers and automatic agents rather than face-to-face meetings, it is another avenue for crimes to perpetuate. What we call “cybercrime” largely consists of common crime, the commission of which involves the use of computer technology, and for which penalties already exists under the Penal Code. Substantively, there is no difference between generic individual crimes such as fraud, theft, extortion, harassment, forgery, impersonation, etc. and their cyber-analogues. Only those that relate specifically to computer usage and materials, etc. are specialized offences for which the Computer Misuse Act (CMA) was specifically enacted to tackle. What is the difference between “Computer Crime” and “Cybercrime” and how are they treated under Singapore’s criminal law?
The Computer Misuse and Cybersecurity Act: The original Computer Misuse Act (CMA) arose directly out of the increased usage of computers and the internet as well as to protect certain features from objectionable activities. We will be generally considering the Act, its coverage and effect, and some cases illustrating the offences committed thereunder. To deal with new potential abuses of computer systems, the Computer Misuse Act entered into force in 1993. Thereafter, the CMA was amended from time to time to keep up with the changes in technology and to addresses new potential computer abuses such as denial or interruption of computer services and unauthorised disclosure of access codes. The Act was renamed in 2013 as the Computer Misuse and Cybersecurity Act (Cap 50A, 2013 Rev Ed) (CMCA), and provided for penalties proportionate to the different levels of potential and actual harm that may be caused by an offence. For example, it defines a class of critical computer systems (“protected computers”) and provides them with enhanced punishment in case of an offence. This applies to computers used by important institutions including the police, civil defence force, the military, national utilities companies, telecommunications companies, transportation services, major banks, and various emergency services. The CMCA also sought to enhance security, deter computer criminals with harsh penalties, and broaden the powers of the police to investigate such misdeeds. The CMCA was amended in 2017 with additional provisions to deal more with cybersecurity concerns; however, in 2018, after the enactment of the Cybersecurity Act (CA), the CMCA reverted to CMA with the security provisions moved to the CA.
Computer Crime Offences: The offences under the CMA are found in Part II of the Act, from sections 3 to 10. All the provisions provide for enhanced penalties when damage is caused, but the question is damage to what, and in what form? Also, under section 11, there is further enhanced punishment if the computer concerned is a “protected computer” (e.g. computers used for public safety, national defence, hospitals, etc.). The abetment and attempt of any of the CMA offences also constitutes the offence abetted or attempted and is punishable as that offence under section 12. The extra-territorial scope of the CMA is provided for under section 13. What is its effect and how effective can it be in the cyberspace where many actors can be sited, and acts can be committed, in other countries?
Consider the following:
Unauthorised Access to computer material (s.3 CMA): Mainly enacted to deal with hacking, it has since shown that it can extend to other forms of modus operandi. Present some reported cases and scenarios to explain how the provision works and what is required to make out a case under this provision. Do the “knowledge” relate only to the act of securing access or does it also relate to the lack of authorisation? What constitutes “unauthorized access”?
Access to computer material to commit/facilitate the commission of other offences (s.4 CMA): Examples are fraud, impersonation/identity theft or theft of finances such as credit card skimming, Phishing, Carding, Pharming. Explain the statutory limitations/conditions to the scope of this provision and the need to read/couple it with a substantive provisions in other criminal law statutes (esp. the Penal Code). Which offences/provisions in the Penal Code are relevant here. What are the differences between ss.3 & 4 of the CMA?
(a) Unauthorised Modification of computer material (s.5 CMA): The usual cases involve the defacing of websites through the use of computer viruses or worms, etc. Explain the elements of the provision and provide real world examples of such offences. (b) Unauthorised Use or Interception of computer services (s.6 CMA): The cases often involve phone/pager cloning and the tapping of cable broadcast service for free usage or mischief. Explain the elements of the provision and provide real world examples of such offences.
(a) Unauthorised Obstruction of computer usage (s.7 CMA): This will apply, for example, to system attacks, e-mail bombing and denial of service attacks. Explain the elements of the provision and provide real world examples of such offences. (b) Unauthorised Disclosure of access codes (s.8 CMA): An example is the transfer of one’s password to another to gain access to a computer or network without permission. What constitutes “wrongful gain”, “unlawful purpose” and “wrongful loss”? Explain these elements of the provision and provide real world examples of such offences.
(a) What is the objective and effect of the new provisions of the CMA in relation to the use of personal data obtained through existing offences and the act of obtaining tools to commit CMA offences (new ss.9 & 10 CMA). Compare these provisions to the existing provisions of the Act (e.g. the current provision on abetment and attempted (s.12 CMA). (b) What is the purpose and effect of the changes to the jurisdictional provision, particularly from the cybersecurity standpoint? (amended s13 CMA).
Future of Cybersecurity: Cybersecurity is increasingly an issue that the government is concerned with. Although the CMA contained provisions for the Minister to act and for investigations into cybersecurity issues, the Act was amended in 2013 to give the Minister even stronger powers to prevent or counter threats to national security, etc. by taking any measures necessary to prevent or counter any threat to a computer or computer service or any class of computers or computer services. These may cover the “cyberterrorism” phenomenon. Due to the heightened concerns with cybersecurity, the Act contained interim provisions on the issue until a standalone Cybersecurity Act was enacted in 2018. Nevertheless, the CMA provisions continues to be relevant as a part of the arsenal against cyber attacks and to address security concerns.
Cybersecurity Act: The 2018 Act is mainly procedural and relates to CIIs, empowering the Cybersecurity Commissioner to investigate and prevent breach/leak incidents, certification of service providers as well as breach reporting obligations. The approach is one of ‘light touch’ and can overlap with the work of the PDPC and the police under the CMA.
Reference: (optional)
Gregor Urbas, An Overview of Cybercrime Legislation and Cases in Singapore, ASLI Working Paper Series No. 001, December 2008
Cases:
Lim Siong Khee v Public Prosecutor [2001] 2 SLR 342; [2001] SGHC 69 [ss 2(2), (5), 3(1), 8(1)]
Public Prosecutor v Muhammad Nuzaihan bin Kamal Luddin [2000] 1 SLR 34; [1999] SGHC 275 [ss 3(1), 5(1), 6(1)(a)]
Statutes: (for reference in class, important provisions will be highlights during class)
Computer Misuse Act (2020 Rev. Ed.)
Cybersecurity Act (No. 9 of 2018)
CoE Cybercrime Convention
3 notes · View notes