Online Blackmailing: Fight back to regain control of your life
Cyber Crime/Online Fraud

Online Blackmailing: Fight back to regain control of your life

 

Introduction: Online Blackmailing

In 2023, we have seen online blackmailing is emerging as an unfortunate reality of our digital age. It's a cybercrime where a person is threatened with exposure of their private information, images or videos unless they pay a certain sum of money. Online blackmailing is a traumatic experience, causing emotional distress and leading to financial loss. However, it is essential to know that you are not alone, and there are ways to fight back and regain control of your life.

 

Do not accept demands of online blackmailers:

First of all, it's important to know that giving in to what a blackmailer wants is always a bad idea. If you give them money, it will not only encourage them to keep doing bad things, but it will also make you easier to blackmail in the future. It's important to remember that these people can't be trusted, and they have no plans to do what they say they'll do. They might even ask for more money after you've paid the first amount..

 

 

Collect crucial information:

If you are being blackmailed online, the first thing you should do is try to get as much proof as you can. Save any messages or emails the blackmailer sends you, take screenshots of any social media posts, and write down any other communication. This proof can be used later to tell the police about the blackmailing and take legal action.

 

Report it to Cyber Cell/Cyber Police Station:

The next thing that needs to be done is to report the event to the cyber cell of the police station that is geographically closest to you. As a major criminal infraction, blackmailing is taken very seriously by the law enforcement officials that investigate these cases. You should provide them all of the evidence that you have gathered, and they will look into the problem after they have received it. Although it may be difficult to come forward and report the incident, it is essential to keep in mind that the police authorities are there to help you, and they will do everything in their power to bring the blackmailer to justice. Although it may be difficult to come forward and report the incident, it is essential to keep in mind that the police authorities are there to help you.

 

Report to online hosting services:

It is essential to alert the internet platform or service where the blackmailing is taking place, in addition to filing a report with the local law enforcement agency regarding the event. The vast majority of websites and social media platforms have stringent regulations against blackmailing, and they will take the required action to remove any content that is deemed to be in violation of those standards, as well as ban the blackmailer from using the platform. The platform will be able to improve its security procedures as a result of the incident being reported, which will reduce the likelihood of future instances of a similar nature.

 

Seek Support from friends and family for online blackmailing:

You have the option of seeking assistance from a reliable friend or member of your family if you do not feel comfortable reporting the incident to the authorities or the platform directly. It is essential to have someone you can share your experience with and receive emotional support from. In addition, there are a multitude of support groups and organisations available to assist individuals who have been victimised by internet blackmail. These groups are able to offer you counselling services, legal guidance, and assistance in navigating the process of reporting the incident to the authorities. If you contact them, you can receive all three of these benefits.

 

Steps to protect yourself:

It's also essential to take steps to protect yourself online. This includes being cautious about sharing personal information and images with others online. You should also use strong and unique passwords for all your accounts and enable two-factor authentication whenever possible. Regularly checking your privacy settings and restricting access to your personal information is also crucial. Finally, it's important to keep your antivirus software and other security measures up to date to protect yourself from malware and other cyber threats.

 

Judgment of Delhi High Court, April 2023 (Download the judgement from below link). 

The Hon'ble Delhi High Court has issued directions for approaching it for a takedown order in a matter involving "non-consensual intimate images" content, requiring the petitioner to file a sealed affidavit identifying the specific audio, visual images, and keywords being complained against. The Grievance Officer appointed by the intermediary must be sensitized to non-consensual intimate images abuse and interpret it liberally to include sexual content obtained without consent or intended for private relationships. The Online Cybercrime Reporting Portal must have a status tracker for complaints and display redressal mechanisms in all languages specified in the Eighth Schedule, with contact details for each District Cyber Police Station in Delhi on the cybercrime.gov.in website.

Conclusion:

In conclusion, online blackmailing is a serious crime that can have devastating consequences for its victims. However, it's important to know that there are ways to fight back and regain control of your life. By collecting evidence, reporting the incident to the police and online platform, seeking emotional support, and taking steps to protect yourself online, you can minimize the impact of online blackmailing and prevent it from happening again in the future. Remember that you are not alone, and there are resources available to help you through this traumatic experience. 

Cyber Extortion in India: How to deal with it?
Cyber Crime/Online Fraud

Cyber Extortion in India: How to deal with it?

Cybercrime has become more sophisticated and common as technology has become more important in our lives. Cyber extortion, in particular, is becoming a bigger problem in India, where cybercriminals use a variety of methods to get people and businesses to pay them money. This blog post will explain what cyber extortion is, how it works, and what you can do to protect yourself from this type of cybercrime. By knowing how cyber extortion works and taking the right precautions, you can reduce the chance of being a victim of this kind of attack.

 

What is Cyber Extortion?

Cyber extortion is a type of cybercrime where an attacker uses threats or coercion to demand payment from an individual or organization. The attacker may use a variety of tactics to carry out their attack, including stealing sensitive data, locking down computer systems with ransomware, or launching DDoS attacks to disrupt online services. Cyber extortion can be highly lucrative for attackers, and it can cause significant harm to victims.

 

 

 

 

How Does Cyber Extortion Work?

Threats to leak private data, disable access to the internet, or destroy computer hardware are all hallmarks of cyber extortion. The attacker may employ a wide number of techniques, such as:

 

Ransomware: The attacker may employ ransomware to lock down a victim's computer system or encrypt sensitive data, making it inaccessible to the victim. The attacker will then demand payment in exchange for the decryption key or the release of the system.

 

DDoS attacks: The cybercriminal may use distributed denial of service assaults (DDoS) to overwhelm the victim's website with so much traffic that it is unreachable to its genuine visitors. The perpetrator of the attack will then make a demand for payment in exchange for putting an end to the assault.

 

Theft of sensitive data: It is possible for the attacker to take sensitive data, such as client data or financial information, and then demand a ransom from the victim if they do not agree to disclose the data.

 

Threats of violence or physical harm: Unless a ransom is paid, the assailant in some situations may threaten the victim or the victim's family with violence or other forms of bodily harm unless the ransom is paid.

 

What Steps Can You Take to Deal with Cyber Extortion?

If you are a victim of cyber extortion, it's important to take immediate action to protect yourself and minimize the damage. Here are some steps you can take:

Consult a Cyber Law expert:  CYBER LAW CONSUTATION

Do not pay the ransom:

Even while it may be tempting to pay the ransom in order to regain access to your systems or data, doing so would simply encourage the attacker to carry out their illegal acts in the future. In addition to this, there is no assurance that paying the demanded sum would result in either the recovery of your data or the restoration of your systems.

 

Contact law enforcement: If you have become a victim of cyber extortion in India, it is important to approach the enforcement authorities as soon as possible. The first step is to file a complaint with the police cybercrime cell or the nearest police station, providing as much evidence as possible, such as emails or messages sent by the extortionist. The police will conduct an investigation, and if necessary, can seek the assistance of forensic experts to gather evidence. It is important to cooperate with the police and provide any information they may require during the investigation. If the extortion involves financial transactions, the victim should also inform their bank and credit card company and take necessary steps to safeguard their accounts.

 

Disconnect from the internet: If your computer systems have been affected with malware or ransomware, disconnect them immediately from the internet to prevent the attacker from gaining access to your data or inflicting more damage.

 

Restore from backups: If you have backups of your data, use them to restore your systems instead of paying the ransom. Make sure to thoroughly scan your backups for malware or ransomware before restoring them.

 

Work on your cybersecurity: Take steps to improve your cybersecurity posture to prevent future attacks. This may include implementing stronger passwords, regularly updating your software, and using anti-malware software to detect and remove threats.

 

Consider cyber insurance: Cyber insurance can provide financial protection in the event of a cyber-attack. Check with your insurance provider to see if you have coverage for cyber extortion.

 

Conclusion

In conclusion, cyber extortion is a substantial risk that carries the potential to have significant repercussions for organisations and individuals in India. You can lower the likelihood of becoming a victim of cyber extortion if you take preventative steps to protect yourself from becoming a victim of cybercrime. For example, you can improve your cybersecurity posture by performing regular data backups. If you do end up becoming a victim, it is imperative that you maintain your composure and take the necessary precautions to limit the extent of the harm and protect yourself from further assaults. Dont fogot to report a cyber crime on its national helpline number 1930. Keep in mind that you should never give in and pay the ransom, and you should always report the event to the authorities. You can avoid danger in a world that is becoming more digital if you keep a sharp eye out for potential threats and take preventative steps to safeguard yourself.

What Does The Law Say About Data Protection?
Agreement & Contract

What Does The Law Say About Data Protection?

Data Protection has emerged to be a leading concern in today’s world due to the rise in the number of cybercrimes. The current Indian legal framework is inadequate in dealing with the threat posed by cyber-crimes. The Supreme Court of India has also recognized the need and importance of legislation that seeks to protect the personal data of the citizens. Based on this report, the Personal Data Protection Bill was tabled in the Parliament. The Bill has not yet become a law. Once passed, it will become the sole law addressing data protection issues in India, replacing Section 43A of the Information Technology Act, which regulates data privacy in India currently. 

 

 

The Information Technology Act, 2000


In 2008, Section 43A was inserted in the Information Technology Act along with Section 72A to address the issue of protection of personal data. Section 43A makes a company that collects sensitive personal data and fails to protect the same, thereby causing wrongful gain or loss liable for damages. Sensitive personal data is nothing but sensitive information that may be used to identify a person. For instance, information like password, biometrics, medical records, physical and mental health, financial information, or any other information which relates to a person, and which can be misused against that person.

 

However, information of an individual that is freely available from a public domain or under the Right to Information Act is not included under sensitive personal data or information. Section 72A spells out the penalty for unauthorised disclosure of such information. Any person who discloses sensitive personal data shall be liable to be imprisoned for a term not exceeding three years or fine up to INR five lakhs or both. 

 

 

The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011


The Sensitive Personal Data or Information rules presently regulate data protection in India. They only apply to companies and individuals based in India. The Sensitive Personal Data Information Rules, mandate the following:

 

  1. Rule 3 lays down an illustrative list of information that may be considered as sensitive personal information. It includes information like passwords, credit/ debit card information, biometrics, sexual orientation, medical history, physical and mental health condition. 
  2. Rule 4 makes it mandatory for a company to draft a privacy policy and make such policies accessible for the people who are giving their personal information. 
  3. Rule 5 and Rule 6 contain certain basic duties and obligations which are to be complied with by the company seeking information.
  4. Rule 8 mandates certain reasonable security practices and procedures that all companies are required to adopt. 

 

 

Conclusion 


The Sensitive Data Protection Rules have been inadequate in addressing the issue of data protection. Not having a dedicated law aimed at data privacy, is altering India’s image in the world. The Personal Data Protection Bill, 2019 (PDP), as stated earlier, if passed, will become an exclusive law regulating data protection in India.

 

The PDP seeks to protect not only sensitive personal information but personal information of all kinds. It calls upon companies that collect and determine the purpose of collection of personal information to follow certain safeguards in order to protect the data from being leaked. Among other things, the PDP, stresses on the consent of the individual for the processing and usage of his personal data. If passed, it can go a long way to provide proper data protection mechanisms in India.