Cybersecurity expert Amit Dubey decodes the Sanchar Saathi app controversy amid government mandates for pre-installation on all smartphones. Designed to track lost devices via CEIR, block stolen IMEI numbers, and report fraud calls/scams, the app has recovered over lakhs of phones, but critics raise alarms over privacy risks from permissions like call logs.
#SancharSaathi #AmitDubey #CyberSecurity #PrivacyDebate #SnoopingApp #CEIR #CyberFraud #IndiaTechNews #DoT #DigitalIndia #IMEIBlock #ScamAlert #India
🔊 LIKE ➡ SHARE ➡ SUBSCRIBE
📰 Breaking news. ⚡Live updates. 🔍 Trusted stories — all in one app. Download the Asianet News App today 👇
🍎 iOS: https://apps.apple.com/in/app/asianet-news-official/id1093450032
🤖 Android: https://play.google.com/store/apps/details?id=com.vserv.asianet&hl=en_IN
For More Updates:
Follow us on our What's app Channel: https://whatsapp.com/channel/0029Va5Bq3yKwqSLSQTxam0r
English: https://newsable.asianetnews.com/
Hindi: https://hindi.asianetnews.com/
Malayalam: https://www.asianetnews.com/
Kannada: https://kannada.asianetnews.com/
Tamil: https://tamil.asianetnews.com/
Telugu: https://telugu.asianetnews.com/
Bengali: https://bangla.asianetnews.com/
Like us on Facebook: https://www.facebook.com/AsianetNewsa...
Follow us on Twitter: https://twitter.com/AsianetNewsEN
Follow us on Instagram: https://www.instagram.com/ann.newsable/
➡ If you like our video, give us a thumbs up and subscribe to our channel to get the daily dosage of news, entertainment, sports and more.
#SancharSaathi #AmitDubey #CyberSecurity #PrivacyDebate #SnoopingApp #CEIR #CyberFraud #IndiaTechNews #DoT #DigitalIndia #IMEIBlock #ScamAlert #India
🔊 LIKE ➡ SHARE ➡ SUBSCRIBE
📰 Breaking news. ⚡Live updates. 🔍 Trusted stories — all in one app. Download the Asianet News App today 👇
🍎 iOS: https://apps.apple.com/in/app/asianet-news-official/id1093450032
🤖 Android: https://play.google.com/store/apps/details?id=com.vserv.asianet&hl=en_IN
For More Updates:
Follow us on our What's app Channel: https://whatsapp.com/channel/0029Va5Bq3yKwqSLSQTxam0r
English: https://newsable.asianetnews.com/
Hindi: https://hindi.asianetnews.com/
Malayalam: https://www.asianetnews.com/
Kannada: https://kannada.asianetnews.com/
Tamil: https://tamil.asianetnews.com/
Telugu: https://telugu.asianetnews.com/
Bengali: https://bangla.asianetnews.com/
Like us on Facebook: https://www.facebook.com/AsianetNewsa...
Follow us on Twitter: https://twitter.com/AsianetNewsEN
Follow us on Instagram: https://www.instagram.com/ann.newsable/
➡ If you like our video, give us a thumbs up and subscribe to our channel to get the daily dosage of news, entertainment, sports and more.
Category
🗞
NewsTranscript
00:00Today I have with me Amit Dubey. He's one of India's most trusted cyber security experts.
00:17First of all, thank you so much for joining in and having a discussion on this entire political
00:23chaos around Sanchar Saathi application which is a completely government built application.
00:30I really want to begin with a very simple question. The government release regarding this app says that
00:37all of the companies they need to ensure that this application is pre-loaded in the devices
00:45and it says that they need to ensure that the pre-installed Sanchar Saathi application is
00:50readily visible and that its functionalities are not disabled or restricted. So my simple question
00:55to you is that, for example, I get a new brand new phone. If I switch on that phone, will that
01:01application be activated at that time according to this press release that we have in front of us?
01:08No, it will not be activated. It will be pre-installed but not activated. You will have to activate it.
01:15For example, there are phones. They give you pre-installed Facebook. They give you pre-installed
01:20some UPI apps because they are bundled with their some commercial understandings. They are pre-loaded
01:26with some OTT platforms, but that doesn't mean that you can use them unless until you create an account,
01:32you log in, you configure, you pay, then only you can use it. So even if it is installed, it's not doing
01:38anything. It is there in your phone. You have to configure it. You have to log in. Then only you can use Sanchar Saathi.
01:45Okay. So if this application is pre-loaded, pre-installed until and unless a user activates
01:51this application, there will be no harm. Is that what you're saying?
01:56There will not be any harm even after you complete it. So I think there is a big communication.
02:00We will come to that later on. But for now, I want to break this.
02:03But I really want to avoid that word harm. In either situation, there's no harm. So we should be very,
02:09very clear about it. Before configuration, it's not doing anything. And even after configuration,
02:16it's not doing anything for you because you have to do it. It is not something which is
02:21automatically doing anything. It is an app which requires an action every time you want to use it.
02:27No, but for example, if I install this application, it will definitely ask me to check mark all of these
02:33pointers. Like I need to give access to all of these XYZ pointers, for example, access to my calls,
02:40messages, notifications, even my camera. All of this needs to be encrypted, needs to be protected
02:47and comes under the right to privacy. But if I give access to all of this, how can you then say that
02:53with this configuration, you will not be harmed?
02:55So that's the communication gap. Giving access of some functionality to an app
03:02doesn't mean that the app is collecting this data. For example, if you would like to know that
03:07this particular app is collecting what kind of data from my device, you just go to PlayStore,
03:12search that app. For example, Facebook, Instagram, Twitter, Discord, WhatsApp, Zangin or Sanchar Sari.
03:18Search that on PlayStore. You will have that icon. Click on that icon. Then scroll down and you will have
03:24an option called Data Safety. Click on that Data Safety button and there is an option called See
03:28Details. Click on that button and then Google because you are downloading it from PlayStore or App Store.
03:34They will be telling you each and every thing. They'll be telling you that this app collects these many
03:40data points from before. If you do the same exercise with Sanchar Satti, it clearly says that this app
03:47does not collect anything. Anything, anything. That makes it very clear. So it's not collecting anything.
03:54Now you can ask me that then why it is taking these permissions. And where is it stored then?
03:59If the access is there, so is it only that the access is there and this data is not downloaded and
04:04stored anywhere? No, it's not downloaded, it's not stored anywhere. I'm just giving you the answer
04:10because I myself have given you both. So there's no collection of data because no collections or no
04:17storage. Simple. Then why it is taking permissions? Why it is taking camera permission? Why it is taking
04:22SMS permission? Why it is taking call log permission? It's taking that permission because the app has some
04:27features where you would like to report those. For example, you have to report a QR code. So you need
04:32camera access to capture that. If you would like to report a call log because you are getting continuously
04:37calls from someone and there are 20 calls, you can't report one by one. So you can give this call
04:42log access that these calls I would like to report to so that this number will be blocked or there
04:48should be a legal action against them. Then there is an option called SMS. Suppose you are getting some
04:51unsolicited communication SMS or WhatsApp or E-PIN. So that access is given only during that time when you
04:58are reporting that content. It is not like that they are reading it all the time. No, they are not collecting.
05:04What you are trying to say is that there is no real-time accessibility of data, but only once
05:10you report is then the government can access the data and then crack down on the crime.
05:16There is no real-time, there is no non-real-time. No offline, no online. No data collection for sure.
05:23Unless simply you give some data and you give that data to report that data. You don't give this data,
05:29you don't give camera access so that somebody can watch you. You give this camera access because you
05:34would like to scan a QR code. Now if you do the same exercise with Facebook and then you will be surprised.
05:41You have given what all data to Facebook. Because in the data collection option in the Play Store,
05:46you will be scared. You could clearly say that Facebook knows your political belief. Facebook knows your
05:52religious belief. Facebook is collecting your financial data. Facebook is collecting your health data.
05:57They are claiming that. And it has been mentioned by Google itself. And Facebook has accepted it.
06:02Yes, we are collecting all your call details, your SMS, your OTPs, your emails. We are listening
06:07you all the time. Facebook clearly says that we are capturing all your voices around us.
06:11And then we are also copying your call records. We are also copying your sound records. We are also
06:16taking copies of your voice note. You just scroll, scroll and you will be scared that, oh, we have given so
06:23much data to Facebook. But you have never raised any concern on Facebook. Or to Google. It was more than
06:28that for sure. Or to any other app. Now there is an app which is not collecting anything.
06:35Yeah, I understand what you're saying. Do you think that there's a greater trust deficit?
06:40Because this is not a private entity, but this is a government entity that we are talking about.
06:45Let's suppose if this application had been built by a public-private partnership, and there was some
06:51private stake in this, then there would have been greater trust in general public like me or my
06:57friends and family around me. They would have, you know, accepted it in a far better way, rather than
07:02being a completely government built application, because then there'll be trust issues.
07:08The new thing you are suggesting government that okay, if you would have done it with some private
07:12partnership, there is no such a data privacy concern to the user.
07:16No, because we generally, for example, we need to use some application. We generally don't give so
07:22much of heed to us what access we are giving to that application, as you yourself also mentioned.
07:28Why don't we give that?
07:30Because there is a lack of awareness in general public, but here the government involvement
07:36Exactly, because it's not because they are private or public doesn't matter.
07:39It's because people don't know. People will react to only those things which will be told to them.
07:46Now there are set of parties, there are set of journalists, they are talking about it. That's
07:52why they know it. And otherwise they don't know, and they have never checked it. And if you will tell
07:57them the clear picture, okay, this is not like that, what you are thinking in your mind that they are listening
08:02beyond that time because the data, there is no data collection. There is no server to store your data.
08:07So that's why I think there's a communication gap. It's not about the public private or government
08:12private doesn't matter. If there will be some partnership with some special business group,
08:18you would have concern over there. If it is involving some other countries, you will have concern over
08:25there. The concern you can have on anything. It is not like that. The only thing is that you should have
08:30an ability to test it, verify that whether there is really any concern. For example, people used to
08:36ask me that, should I use DG Yatra because they capture our face and they know my travel, it is safe,
08:43it is okay. Not because they don't know that DG Yatra does not capture your face. DG Yatra just
08:51captures your facial parameters and then recognize you based on the hash value, which is the signature.
08:57Now that hash value cannot be rehashed. It is one direction. For example, you type a password and
09:06the password is hashed. Now I can use that hash to match in the database whether you have typed the
09:11same password. But even if I get the hash value, I can't generate the password. That is the way it has
09:17been managed so that the privacy is intact, the security is intact. But they will definitely raise concerns on
09:22it. But they will give their face to Facebook, to any other app, to Goop, to AI, to anybody else sharing
09:29it freely. They won't have any concern. The concern is only with the government when they are actually
09:34doing it for security. Because it is for you. It is not for the government. Why do they need to install
09:40DG Yatra to do the service? They can do it easily. There are n number of ways. So first of all, I would like to make
09:46this very clear to the audience and to the public that government does not need to specifically ask you
09:53to install something. They don't need to do that. They are empowered enough. They can do it without
10:00installing anything, if they want to go. So don't have that illusion. And this is true with every country.
10:08This is not only with your government. This is with any government, any country. They are powered because
10:12they have to ensure security. And they can even ask the telecom operator or to any service provider.
10:18So don't think that they are listening all the time. Nobody has time. And this country is of 140 crores
10:26people. You can't do that. But we've already seen that Apple has pushed back to this and is saying that
10:33they would want to have a negotiation if there can be something which is not preloaded, but can nudge
10:40the users to install the application. Don't you think it'll be better for the citizens, for the laymen
10:45who don't really understand all these technicalities? For example, you just talked about DG App. I mean,
10:51we don't know. Me as a journalist, I didn't know that it actually does not capture your face, but
10:58captures the parameters. So how do you think that Apple is giving a better option to the government
11:05that you do not have this preloaded on your devices, but you can nudge the users at the time of first
11:11time setup that they can choose and install this application. So let me tell you that this Sanchar
11:20Sanchar Sati app is not a new app. It's there almost one year. The portal is there for almost
11:26three years. 2022 I think they have launched. In last one year, I think it has 10 million
11:33downloads already. Almost one crore. In last one year, because of this app, we have recovered more
11:41than 24 lakhs phones. And the 42 lakhs phones were blocked because of this app. Those were eventually
11:47otherwise being used by criminals. And we have already seen the result. The government wanted to
11:54promote it heavily. But whatever awareness we can give, even Prime Minister Modi has mentioned in his
12:01Monkey Bar about digital arrest. Last week itself, we got two cases of digital arrest where people have
12:08lost 24 crores. So my point is, and these people are intellectuals. These people read newspaper every
12:13day. They are people who have had high positions in the government or in private sector. The point is,
12:20whatever awareness you do, it won't work in a country like India. We have been doing it since last
12:2520 years. But people still are ignorant for a few basic things. Now we'll have to deduce methods to
12:34enable these tools where we can protect them proactively. So this was one of that initiative,
12:40aggressive initiative, that okay, we'll make part of that every and we'll make it visible at the top.
12:46It should be clearly visible. It should not be hidden. This is the clear indication. So that if you have any such
12:51video, every day, you are watching the tech. Every day, you know that if something happens,
12:55you can report it. And then the crime can be reported in real time. Because cyber crime happens
13:00in online. And if it is happening, if it is not stopped in real time, you can't stop. For example,
13:06if you are getting continuous calls from an international worker, they are bothering you.
13:12And then you go to a police station and then report it. And eventually, after two months,
13:16some action has been taken against it, it won't help you. You need immediate help. And that will
13:22happen through Chakshu portal, Sanchar Saathi. Go, report, block. Similarly, if somebody is sending you
13:28nude pictures or obscene messages on WhatsApp, you want to report it right now and you want action right
13:33now. You don't want this action to be taken after three months. Because by that time, the person will be
13:38confident. This is the mindset of cyber crime. They should be blocked immediately in real time. That's why this
13:44app is given to all the users. That you report immediately and let them be blocked. They should
13:50not have enough SIM cards to use if their numbers will be blocked. How can they generate SIM cards so
13:56fast? But I think the awareness campaign at the part of the government was too weak because not many of
14:02us knew that this was rolled out back in January this year. And now only when they asked all the companies
14:08to preload it on the new devices is then when we know that this is a big issue. Amit, I also want to
14:15talk about the thing that you just pointed out. For example, if somebody steals my phone and tries to
14:24clone an IMEI of another user and try to operate that phone, that stolen phone, then the original person
14:33will be held accountable will become a criminal, of course, because we don't have evidence. And this
14:40is one thing which government wanted to crack down on. But my point is that there are a lot of softwares
14:45available online, which actually helps with this IMEI spoofing. So don't you think that the government
14:52needs to also work on that aspect? And I just want to talk about can the government be more proactive
14:58rather than reactive. I do understand when the crime is happening, it's necessary to report it. But don't you
15:03think that the government also needs to be proactive so that all of these spoofing softwares which are
15:09available online can be undone with?
15:13You know, this power of spoofing any number or a changing IMEI, we find in only 0.001% cases.
15:21Only in those cases. 99 plus percentage of time, criminals are using your phone as it is. We know
15:29that. And that's why we were able to block it. Otherwise, if they all were spoofed, how could we
15:34block it? How could we help them? How could we retrieve them? Which says something. It says that,
15:38okay, we'll work in that direction. Still, we are doing something for the people. We should not avoid that
15:45efforts. Otherwise, just to focus on those 0.01, we may lose this chunk of misuse. So I think that
15:55is the intention, just of all. As far as proactive actions are taken, this aggression was just to do
16:01the proactive actions on them. See, if the crime happened, then Sanchas Sathi can't do anything.
16:06Sanchas Sathi will only help you proactively. If something is approaching you, calling you,
16:12at that time, you can report the number to your block. But if you have already lost money,
16:16then for that Sanchas Sathi is not doing anything. Sanchas Sathi. And why? Because
16:22cyber security is a mutual responsibility. It can't be achieved in isolation. See,
16:28if I get a call from some unknown number and I've been targeted, I know that this is a
16:32fraudster's number, but I have not reported it. Actually, I have enabled that criminal to know
16:36something else. I should have reported it. Because this is also my response. If I see
16:42a girl walking on the road alone and there are people who are disturbing her and if I don't report,
16:49that is also my responsibility. It's a mutual responsibility. So in cyberspace, we wanted
16:55community to bring, they should join hands together and they should put this effort so that we can
17:00target things together. Otherwise, it's not possible. I'll give you a real example. Suppose I get
17:06every day tons of cases and these victims are so desperate.
17:21The basics are that if I go to get the KYC of that safe card, it belongs to some farmer or
17:27who does not know there's a bank account on his name. If I go to trace the KYC of that bank account
17:32where you have transferred the money, it belongs to some vegetable banker in West Macon, who does not
17:38know there's a bank account on his name. If I go to find the owner of the phone, I mean, this is a stolen
17:46phone. It's being reported by someone in Delhi. Now, we don't know anything about that. Neither the phone
17:53belongs to him nor a bank account or the SIM cards. The only thing that we know is his location
17:59and he will not be there in his location for more than two hours. He'll be keep changing his location.
18:03Even if I create a pattern, maybe mostly in the border areas and if we try to
18:09never do some hoops and brooks, if we arrest him, we'll not have enough evidence to even prosecute it in the
18:16law. We can prove that this person is the same person. How do we know it? Right. It is not
18:24practically possible. So the point is post-mortem activities won't help. The only thing will help
18:30you report law, report law. That is the only thing. Amit, because you also coordinate with law enforcement
18:38agencies and help them crack down all these cyber criminal cases, you must be knowing what is the
18:44scenario like in all the other countries? Because we see that predominantly the countries like Russia,
18:50China, we see major cyber crime activities, hackers from those countries trying to get into systems
18:56of other countries. How is the scenario in other countries? How do they tackle it? Do you think
19:01that it's important that only government, you know, do this basis preloaded applications on new phones?
19:08Do you think that there can be better way? And how do you compare this with what is happening in
19:12other countries in terms of cracking down on cyber criminal cases?
19:18So Hina, first of all, we are mixing two things. We are actually telling about the expertise of
19:25Russian hackers. Russian hackers do not hack Russians. Yeah, Russian hackers actually target other country.
19:35They don't target users like you and me. We are not bothered. We are not, we don't have problem
19:41because of the Russian hackers. Rather than we don't have problems with the Indian hackers also.
19:45These are not hackers. They are not tech savvy guys. They are not engineers. They are uneducated people
19:51from Jamkara, Mewad, Albarbu, Haratpur, Aurangabad, all these 65 hotspots. They are targeting you and they are
19:59using social engineering. They are manipulating you. So antivirus or security, you don't need it in your phone,
20:05you need it in your brain. That is the problem. Now, whatever expertise Russia has, Israel has,
20:11Turkey has, it doesn't matter. It is not harming them. Okay, now we come coming to the point,
20:17how do they tackle cybercrime over there? First of all, let me make it very clear that every country
20:21is struggling. Every country is facing more cybercrime than India. Let me give you some figures.
20:26Australia, they are losing 30 billion dollars every year. India is losing 1 billion or maybe 10 billion.
20:32But Australia is definitely more than that. Then Japan, then UK, then US. UK is losing 3 million
20:39pounds every day. It's the official record. Every day they are losing 3 million pounds to cybercrime
20:44and close to 1.5 billion pounds a year. So let's be very honest that every country is facing this
20:50problem because this cannot be stopped by just... But the countries that you're mentioning, I'm sorry,
20:56I'm interrupting, but the countries that you're mentioning, they are not building something on a
21:00government level and deploying it on this scale on all the new devices and even the old devices
21:06trying to roll out updates to install this application. These countries, they must be tackling
21:11it in a different way. They are doing it even more monitoring than us. Any country which is,
21:16which you feel secure, more secure than India, they are secure because they do more monitoring.
21:20Otherwise, they can't manage. There are infiltrators, there are criminals. If you purchase anything in UK,
21:26or if you create a bank account and you try to cheat someone, they can monitor that transition within
21:34seconds and they can catch you. Because they are monitoring from your social security numbers,
21:39they are monitoring each and every activity to a single server. Despite of that monitoring,
21:44they are losing 3 million pounds. Because people themselves are paying that much now. Nobody is stealing it.
21:50They are mentally prepared to transfer. They are mentally convinced to transfer. So my point is,
21:56monitoring is going to be a lot of regulations. But they can't stop at 100% because if the person
22:03himself has decided to pay to someone, he'll pay. You can't forcibly stop it. Because he's convinced
22:08either in some lucrative offer or either he's scared or he's having some sort of confusion. But
22:14he is actually doing it willing. That's for sure. So what UK did, UK did a very beautiful thing.
22:21They made a law last year. The law says in October last year. The law says whether it is
22:28mistake of victim or bank, doesn't matter. The bank is responsible to pay 100% money within
22:34five days to the victim. We don't care who has done the mistake. We don't care. Literally don't care.
22:41Now all the banks in UK, they are in panic mode. Because they know that people will take advantage of this
22:46law. They themselves will transfer money to some other account. And they'll say fraud will be
22:50fraud will be. And this is happening. This is exactly happening in last month.
22:59But the government was adamant. They said that all these kind of frauds can't happen without the
23:03involvement of the bank. So we'll have to make them accountable. And they brought that law and it is
23:08actually working in the favor of victims now. But despite of that, the crime is happening. The point
23:13is, if suppose Indian government takes the same call, do you know the repercussions? Do you know
23:20the retaliations? It is not that easy in India. UK can do it. I think the people here will try to
23:28exploit the system as much as possible. And it can't happen. We all know about this,
23:34that these kind of frauds cannot happen with the support of banks, with the support of telecom
23:40operators, with the support of people who are actually enabling them all these infrastructure,
23:45locations, hideouts, even traditional systems. It is true. Why do they get bail so easily?
23:51Keep them in jail at least for two months. And innocent people will be in jail for six months,
23:57but they'll not get bail. Which means there is somebody who's enabling this. Because this is a
24:02business for them. So we should understand this, that there are multiple stakeholders now. It is
24:06not just a group of people that you can target and stop it. When there is an industry of 100,000 crores
24:11in a year, all kinds of support systems will start building. Amit, final brief answer I need from you.
24:18Two quick questions. First, what is the best way in this situation? Because a lot of people are
24:23definitely concerned about this application. What is the best way out for the government so that it is also
24:28able to enable us to help ourselves in this kind of cyber criminal cases, but also ensure that there
24:33is a trust which is secured between public and the government? And secondly, I want to know from you,
24:39what is it? What is the basic things that we can do as general common citizens of the country to
24:45protect ourselves from online cyber crime activities?
24:49As far as government is concerned, government is trying hard. I'm sure that this initiative is
24:55also because of that problem. We have been pushed too much that the crime is increasing, you are not
24:59doing anything. They have got thousands and thousands of cyber commandos in three states.
25:07They have got awareness programs running by each and every school, institutions, government institutions,
25:13and that has become mandatory. But whatever cyber awareness program we do, people are still unaware
25:21because unless they are targeted, they become victims. They don't take it seriously. So this is
25:26a human problem. This is a psychological problem. You can't solve it by just putting money or a fund.
25:31Whether it is being said by Huda Bachchan or Navarjidin Siddiqui,
25:36So the point is that now government can bring some tools so that they can regulate these systems with the
25:42foundation level. For example, if you are transferring money, you ask four times,
25:46you ask your decision. You don't have to worry about it. You don't have to get it.
25:49Then you will get retired. You ask your decision. You call it 4 times, you will transfer it to 25
25:52thousand dollars. So it's on both sides. So you can delay it. If there is an amount,
25:58we have tried all kinds of suggestions. Honestly speaking, there was a suggestion that you
26:02do not have to worry about it. If you do not have to worry about it, if you do not have to worry about it,
26:07then you will delay half an hour. And give that window to the user who is transferring this money
26:11so that he can take it back. Suppose we have to do it. People start to fraud,
26:15they will transfer the money, they will take the service, they will take the money back,
26:18they will take the money back, they will take the case, they will take the civil mentor.
26:22If there is a criminal, then they cannot do it. So there are some ground level challenges.
26:27And that's why we wanted to build a community and a criminal block. If we could create something
26:36through a criminal, the criminal has to use a SIM card, bank account. We should start blocking that
26:42in real time. If it is done, then it will be done. And I think this is the purpose. If we could
26:48convey this clearly that what is to achieve. If we could do that, this will be a disruption.
26:57Nobody in the world could do this. India would be leading. Only this can be done. We can actually
27:01mobilize crores and crores of people against criminals. We can actually report and block them
27:07whether they are harassing girls, whether they are harassing kids, whether they are cyberbullying,
27:10games apps or anything which is actually enabling criminals to do that crime. We keep blocking them
27:16and this power we give to the users. I think this was the reason. Now coming to your second point,
27:22what we could do as an individual if suppose we don't use such a sati. We have to believe this,
27:28that no crime can take place without your involvement. You would have done something,
27:34whether it is calm, growth, low, mo, calm card. These are the five human vulnerabilities which is
27:39getting exploited in every kind of crime, whether it is cybercrime or any other kind of crime. So it is you,
27:45because we don't teach kids about these human vulnerabilities, they are trapped. We have seen
27:53cases where people were offered jobs and they ended up in Laos and KK Park and being
27:59tortured and they were asked to do the cybercrime and then and it's been happening for years.
28:06Why? Because they could, they could not have, they could not use their common sense that if something
28:12is too good to be accepted, they should at least do some verification. I think these kind of things
28:18are human traits. We will have to revive in the beginning, from the beginning of these kids. That
28:24is something which is a long-term solution. These are the common sense. I always give a one financial
28:32system thumb rule. If everybody will remember that, I can guarantee that 70% cybercrime cannot happen.
28:40I can give you in detail. And the basic thumb rule is, if money is coming in your account,
28:48you should not do anything. Money will come automatically.
28:55So you have to put effort only when you have to transfer. Now, if you take any app,
29:00sir, I got a call from someone. He said that we are transferring grant to your account. Just click
29:04this link and get your money. Sir, I got a call from someone insurance company that there's a dividend
29:08and you please receive this money, install this stuff and you conveniently get this dividend. Sir,
29:12I got a call that you have money from Lottery Hall. Something was coming to your account. You were
29:17actually allowed to receive that. If the money is coming in your account, you should not do anything.
29:21Whether it is clicking a link, QR code, sharing OTP, anything, you should not do anything. Just focus on that simple thumb rule.
29:2870% cybercrime can do anything. Right. And the remaining 30% of it, if there is something
29:34which is offered to you, which looks too good or somebody is scaring you, if you just focus on
29:38these two emotions, wait, verify and then take a call. Sir, there are definitely pros and cons of this
29:45application. But all I can say in conclusion is that there could have been a better rollout
29:51taking into confidence some of the stakeholders, for example, the parliamentarians, because they
29:57point out that this is some kind of an attack on the constitutional right on the citizens of the
30:02country. Thank you so much, Amit Ji, for speaking with Asianet News and giving your perspective on this.
Be the first to comment