Category
🗞
NewsTranscript
00:00If telecom companies fulfill their responsibilities in a better and more strict manner, then cybercrime
00:07can be controlled to a large extent. I have some good suggestions on the basis of my
00:12research that I am sharing with you. If they are properly followed, then cybercrime can
00:17definitely be controlled on a large scale. Apart from this, all the cybercrimes that
00:22have happened so far, how can telecom agencies help in their investigation, we can see a
00:28good positive improvement. The first suggestion is that all fraudulent calls come to the users.
00:38Telecom companies should issue dedicated helpline numbers, especially toll-free numbers for
00:43their users. Dedicatedly to report all the crimes related to cybercrime and promote them
00:50in a good way. All their applications, all their recharge messages, their websites,
00:57all these numbers should be displayed with priority, so that users, whether they are
01:02common people or our village brothers and sisters, or any person, can easily understand
01:08that we have to report fraudulent calls on this number. Apart from this, the second suggestion
01:13is that the verification of the SIM, i.e. KYC, should be done at least twice a year.
01:18For this, user categorization, I think, on the basis of commercial and non-commercial,
01:23there is no issue, but still, all consumers should have KYC at least twice a year with
01:30biometrics. The benefit of this will be that if the fake SIMs do not participate in this
01:37verification, then by detecting those SIMs, they will get a lot of help in closing them.
01:43The filtration will be very good. Apart from this, the third suggestion is not only related
01:49to telecom companies, but also for UIDAI. Very few users of Aadhaar cards know how to
01:56lock or unlock their Aadhaar card. So, I also request UIDAI that if all the users who have
02:03an Aadhaar card, if it is locked by default, and users are made aware of how to unlock
02:10it in a very easy way, that people can unlock it by following two steps, this will be very
02:18good. The benefit of this will be that the innocent people of the village or those whose
02:23Aadhaar data is often misused, then it will not be misused. So, users need to be aware
02:29of this at a very high level. The fourth suggestion is to properly observe IMEI. Telecom companies,
02:35such mobile devices or such electronic or digital devices, where multiple SIMs are changed
02:42at a very low frequency, and frequent calls are being made, then such numbers should be
02:48properly monitored by such IMEI devices. Telecom companies should observe it and bring some
02:54red flagging kind of concept so that they can give its reporting properly to the concerned
03:00government agencies, due to which it will be easier to keep an eye on such numbers.
03:06Apart from this, if we talk about owner verification, then many times it is seen that the SIM is
03:12of someone else's name and someone else is using it. So, it is possible that these things
03:17are in the family or outside. So, for such things, the owner should be confirmed whether
03:23he is the original user of this SIM as well as the owner or the user is someone else.
03:29And if this is found, then what should be done in that case for ownership, telecom companies
03:35need to think about it, need to bring provisions. Apart from this, re-registration drive will
03:40be a good suggestion that all the SIMs are activated, no matter how many telecom operators
03:45are there, everyone should start a re-registration drive for their users at the national level,
03:50where all the SIMs that are already activated should be verified by any means. It can be
03:56on the basis of Aadhaar card and mobile number. So, this will ultimately make all the SIMs
04:02that are currently activated, which are in use, which criminals are using, they will
04:09obviously not be able to share their biometric data in this re-registration drive. So, it
04:14can help us a lot to close such SIMs. Apart from this, there are some other suggestions
04:20about telecom alert, how to use the name of any particular person and someone is running
04:29a SIM in his name. Telecom operators should take this responsibility that they alert
04:34their users on the basis of their Aadhaar data or on the basis of their primary data
04:40that how many more SIMs are running in their name and what process they can do to close
04:45them. Although there are many such portals of the government through which you can enter
04:50your Aadhaar card and see, but if telecom operators can provide this facility, it will
04:55be much better for the users. Because of this, if any fake SIMs are running in their
05:00name, then they can directly connect with telecom and close it. Apart from this, a very
05:05good suggestion is that SIMs should also have proper police verification, which is done
05:10for other documents. Although users may have some problems in this, but as far as I think
05:15it is related to the security of the country, it is related to cyber security and it is
05:20related to the security of their own data. So there should definitely be police verification
05:25and at least once a year, action should be taken for this too, that all the users, all
05:30the SIMs they are running, must inform the police and make sure that there is no other
05:35SIM registered in their name and if it is found, then it should be closed. So to a large
05:40extent, the fake SIMs that are running, will also be free from that. Apart from this,
05:46a suggestion is about the banking companies that there should be a source button, SOS
05:55button, which can be used in an emergency. All the banking applications, the authorized
06:00apps of the bank, UPI applications, there should be a source button in them that if
06:05there is a fraudulent transaction or a cyber theft, then simply press a source button.
06:10With the help of that button, the bank will immediately block the previous three transactions
06:15and the money flow of those three transactions will be stopped. Then after a certain time,
06:21when it will be properly studied that how many of these transactions were correct, maybe
06:2672 hours or maybe as long as it should take in an investigation, after that the genuine
06:32transactions will be allowed to continue and whatever was your fake transaction, it
06:37should be at least held so that the real owner of the money can get the money back.
06:42Now the problem is that when the money is transacted, the criminals immediately remove
06:47it and the user does not be able to inform anywhere that the transaction has to be held.
06:53Even if a call is made on 1930, then obviously they take action, but it also takes time.
07:00So a very good suggestion for this will be, as per my research, it is the SOS button,
07:05the emergency button, which immediately any user who has such a financial fraud in his
07:10account, immediately go to the application of your bank or go to the application of your
07:15UPI app and just press the SOS button and a pin or OTP verification process should be
07:20added to it so that it is confirmed that by mistake that button is not pressed and the
07:24last three transactions should be stopped and then action should be taken accordingly.
07:28Here the priority is that the money taken by the criminals should be saved because
07:32investigation is a different thing.
07:34There is complete justice with people when the criminals are also caught, they are also
07:38punished.
07:39Apart from this, the money that was stolen should be returned to their account.
07:42So this critical problem can be solved in a very good way with the SOS button, although
07:47it will take a lot of coordination, but this is such a suggestion that I think should be
07:52implemented at the policy level.
07:54I would like to give some more suggestions for people for cyber security.
07:58Don't be afraid of all kinds of cyber crimes.
08:01To avoid them, use a strong password on your phone.
08:05Apart from this, keep your social media locked with a strong password.
08:09Use special characters, numeric digits, capital, small alphabets.
08:14Be sure to use level 2 verification.
08:17At least once or twice a month.