Cybersecurity expert Amit Dubey decodes the Sanchar Saathi app controversy amid government mandates for pre-installation on all smartphones. Designed to track lost devices via CEIR, block stolen IMEI numbers, and report fraud calls/scams, the app has recovered over lakhs of phones, but critics raise alarms over privacy risks from permissions like call logs.
#SancharSaathi #AmitDubey #CyberSecurity #PrivacyDebate #SnoopingApp #CEIR #CyberFraud #IndiaTechNews #DoT #DigitalIndia #IMEIBlock #ScamAlert #India
๐ LIKE โก SHARE โก SUBSCRIBE
๐ฐ Breaking news. โกLive updates. ๐ Trusted stories โ all in one app. Download the Asianet News App today ๐
๐ iOS: https://apps.apple.com/in/app/asianet-news-official/id1093450032
๐ค Android: https://play.google.com/store/apps/details?id=com.vserv.asianet&hl=en_IN
For More Updates:
Follow us on our What's app Channel: https://whatsapp.com/channel/0029Va5Bq3yKwqSLSQTxam0r
English: https://newsable.asianetnews.com/
Hindi: https://hindi.asianetnews.com/
Malayalam: https://www.asianetnews.com/
Kannada: https://kannada.asianetnews.com/
Tamil: https://tamil.asianetnews.com/
Telugu: https://telugu.asianetnews.com/
Bengali: https://bangla.asianetnews.com/
Like us on Facebook: https://www.facebook.com/AsianetNewsa...
Follow us on Twitter: https://twitter.com/AsianetNewsEN
Follow us on Instagram: https://www.instagram.com/ann.newsable/
โก If you like our video, give us a thumbs up and subscribe to our channel to get the daily dosage of news, entertainment, sports and more.
#SancharSaathi #AmitDubey #CyberSecurity #PrivacyDebate #SnoopingApp #CEIR #CyberFraud #IndiaTechNews #DoT #DigitalIndia #IMEIBlock #ScamAlert #India
๐ LIKE โก SHARE โก SUBSCRIBE
๐ฐ Breaking news. โกLive updates. ๐ Trusted stories โ all in one app. Download the Asianet News App today ๐
๐ iOS: https://apps.apple.com/in/app/asianet-news-official/id1093450032
๐ค Android: https://play.google.com/store/apps/details?id=com.vserv.asianet&hl=en_IN
For More Updates:
Follow us on our What's app Channel: https://whatsapp.com/channel/0029Va5Bq3yKwqSLSQTxam0r
English: https://newsable.asianetnews.com/
Hindi: https://hindi.asianetnews.com/
Malayalam: https://www.asianetnews.com/
Kannada: https://kannada.asianetnews.com/
Tamil: https://tamil.asianetnews.com/
Telugu: https://telugu.asianetnews.com/
Bengali: https://bangla.asianetnews.com/
Like us on Facebook: https://www.facebook.com/AsianetNewsa...
Follow us on Twitter: https://twitter.com/AsianetNewsEN
Follow us on Instagram: https://www.instagram.com/ann.newsable/
โก If you like our video, give us a thumbs up and subscribe to our channel to get the daily dosage of news, entertainment, sports and more.
Category
๐
NewsTranscript
00:00Today I have with me Amit Dubey. He's one of India's most trusted cyber security experts.
00:17First of all, thank you so much for joining in and having a discussion on this entire political
00:23chaos around Sanchar Saathi application, which is a completely government built application.
00:30I really want to begin with a very simple question. The government release regarding this app says that
00:37all of the companies, they need to ensure that this application is preloaded in the devices.
00:45And it says that they need to ensure that the pre-installed Sanchar Saathi application is readily
00:50visible and that its functionalities are not disabled or restricted. So my simple question
00:55to you is that, for example, I get a new brand new phone. If I switch on that phone, will that
01:01application be activated at that time, according to this press release that we have in front of us?
01:08No, it will not be activated. It will be pre-installed, but not activated. You will have to activate it.
01:15For example, there are phones, they give you pre-installed Facebook, they give you pre-installed
01:20some UPI apps because they are bundled with their commercial understandings. They are preloaded with
01:26some OTT platforms, but that doesn't mean that you can use them unless until you create an account,
01:32you log in, you configure, you pay, then only you can use it. So even if it is installed, it's not
01:38doing anything. It is there in your phone. You have to configure it. You have to log in. Then only you can
01:43use some charts. Okay. So if this application is preloaded, pre-installed until and unless a user
01:50activates this application, there'll be no harm. Is that what you're saying?
01:56There will not be any harm even after the conflict. So I think there is a big communication.
02:00We'll come to that later on, but for now, I want to break this.
02:03But I really want to avoid that one harm. In either situation, there's no harm. So they should be very,
02:09very clear about it. Before configuration, it's not doing anything. And even after configuration,
02:16it's not doing anything for you because you have to do it. It is not something which is
02:21automatically doing anything. It is an app which requires an action every time you want to use it.
02:27No, but for example, if I install this application, it will definitely ask me to check mark all of these
02:33pointers. Like I need to give access to all of these XYZ pointers, for example, access to my calls,
02:40messages, notifications, even my camera. All of this needs to be encrypted, needs to be protected
02:47and comes under the right to privacy. But if I give access to all of this, how can you then say that
02:53with this configuration, you will not be harmed?
02:55So that's the communication gap. Giving access of some functionality to an app doesn't mean that
03:02the app is collecting this data. For example, if you would like to know that this particular app
03:08is collecting what kind of data from my device, you just go to Play Store, search that app. For
03:13example, Facebook, Instagram, Twitter, Discord, WhatsApp, Zangin or Sanchar Sari. Search that on
03:19Play Store. You will have that icon. Click on that icon, then scroll down and you will have an option
03:24called Data Safety. Click on that Data Safety button and there is an option called See Details.
03:29Click on that button and then Google because you are downloading it from Play Store or App Store.
03:34They will be telling you each and every day. They'll be telling you that this app collects these many
03:40data points from before. If you do the same exercise with Sanchar Sari, it clearly says that this app
03:47does not collect anything. Anything, anything. That makes it very clear. So it's not collecting
03:54anything. Now you can ask me that then why it is taking these permissions.
03:57And where is it stored then? If the access is there, so is it only that the access is
04:02there and this data is not downloaded and stored anywhere?
04:06No, it's not downloaded, it's not stored anywhere. I'm just giving you the answer because I myself
04:11have given you both the possibilities. Firstly, so there's no collection of data because no collections,
04:16so no storage, simply. Then why it is taking permissions? Why it is taking camera permission?
04:21Why it is taking SMS permission? Why it is taking call log permission? It's taking that permission
04:26because the app has some features where you would like to report those. For example, you have to report
04:30a QR. So you need camera access to capture the recording. If you would like to report a call log,
04:36because you are getting continuously calls from someone and there are 20 calls, you can't report
04:40one by one. So you can give this call log access that these calls I would like to report to so that this
04:46number will be blocked or there should be a legal action. Then there's an option called SMS. Suppose
04:51you are getting some unsolicited communication SMS or WhatsApp or E-PIN. So that access is given
04:56only during that time when you are reporting that content. It is not like that they are reading
05:02it all the time. No, they're not collecting. What you're trying to say is that there is no real time
05:07accessibility of data, but only once you report is then the government can access the data and then
05:15crack down on the crime. There is no real time. There is no non real time. No offline, no online.
05:21No data collection for sure. Unless until you give some data and you give that data to report that data.
05:28You don't give this data. You don't give camera access so that somebody can watch you. You give this
05:32camera access because you would like to scan a QR code. Now if you do the same exercise with Facebook
05:40and then you will be surprised. You have given what all data to Facebook. Because in the data collection
05:44option in the place to report, you will be scared. You could clearly see that Facebook knows your
05:49political belief. Facebook knows your religious belief. Facebook is collecting your financial data.
05:55Facebook is collecting your health data. They are claiming that and it has been mentioned by Google
06:00itself. And Facebook has accepted it. Yes, we are collecting all your call details, your SMS, your OTPs,
06:06your emails. We are listening you all the time. Facebook clearly says that we are capturing all
06:10your voices around your phone. And then we are also copying your call records. We are also copying your
06:15sound records. We are also taking copies of your voice loop. You just scroll, scroll and you will be
06:22scared that, oh, we have given so much data to Facebook. But you have never raised any concern on
06:25Facebook. Or to Google. More than that for sure. Or to any other app. Now there is an app which is not
06:31collecting anything. It is happening. Yeah, I understand what you're saying. Do you think that there is a
06:37greater trust deficit? Because this is not a private entity, but this is a government entity that we are
06:44talking about. Let's suppose if this application had been built by a public private partnership and
06:50there was some private stake in this, then there would have been greater trust in general public
06:56like me or my friends and family around me. They would have, you know, accepted it in a far better
07:01way rather than being a completely government built application because then there will be trust issues.
07:08You think you are suggesting government that, okay, if you would have done it with some private
07:12partnership, there is no such data privacy concern to the user. No, because we generally, for example,
07:18we need to use some application. We generally don't give so much of heed to us what access we are
07:24giving to that application. As you also mentioned, what kind of access we give. Why don't we give that?
07:30Because there is a lack of awareness in general public, but here the government involvement. Exactly,
07:36because it's not because they are private or public doesn't. It's because people don't know.
07:41Yeah. People will react to only those things which will be told to them. Now, there are set of
07:49parties, there are set of journalists, they are talking about it. That's why they know it.
07:53And otherwise, they don't know and they have never checked it. And if you will tell them the clear
07:58picture, okay, this is not like that what you are thinking in your mind that they are listening on
08:03because there is no detective action. There is no server to store your data. So, that's why I think
08:09there is a communication gap. It's not about the public-private or government-private doesn't
08:13matter. If there will be some partnership with some special business group, you will have concern over
08:19there. If it is involving some other countries, you will have concern over there. The concern you can have on
08:26anything. It is not like that. The only thing is that you should have an ability to test it, verify
08:32that whether there is really any concern. For example, people used to ask me that,
08:37can I, should I use DG Yatra? Because they capture our face and they know my travel, it is safe,
08:43it is okay. Not because they don't know that DG Yatra does not capture your face.
08:49DG Yatra just capture your facial parameters and then recognize you based on the hash value,
08:56which is the signature. Now, that hash values cannot be rehashed. It is one direction. For example,
09:04you type a password and the password is hashed. Now, I can use that hash to match in the database,
09:10whether you have typed the same password. But even if I get the hash value, I can't generate the password.
09:15Forget that. But that is the way it has been managed so that the BBC is intact, the security is intact.
09:21But they will definitely raise concerns on it. But they will give their face to Facebook,
09:26to any other app, to Goop, to AI, to anybody else sharing it freely. They don't have any concern.
09:31The concern is only with the government when they are actually doing it for security. Because it is for
09:37you all. It is not for the government. Why do they need to install DG Yatra to do the service? They can do it
09:43easily. There are n number of ways. So, first of all, I would like to make this very clear to the audience
09:49and to the public that government does not need to specifically ask you to install something.
09:54They don't need to do that. They are empowered enough. They can do it without installing anything,
10:01if they want to go. So, don't have that illusion. And this is true with every country. This is not only with
10:08your government, this is with any government, any country. They are powered because they have to
10:12ensure security. And they can even ask a telecom operator or to do any service provider. So, don't
10:19think that they are listening to you on the time. Nobody has time. And this country is of 140 crores
10:26people. You can't do that in Egypt. But we've already seen that Apple has pushed back to this
10:32and is saying that they would want to have a negotiation if there can be something which
10:38is not preloaded but can nudge the users to install the application. Don't you think it'll be better
10:44for the citizens, for the laymen who don't really understand all these technicalities? For example,
10:48you just talked about DG app. I mean, we don't know. Me as a journalist, I didn't know that it actually
10:56does not capture your face but captures the parameters. So, do you think that Apple is giving
11:03a better option to the government that you do not have this preloaded on your devices but you can
11:09nudge the users at the time of first time setup that they can choose and install this application?
11:17So, let me tell you that this Sanchar Sati app is not a new app. It's there almost one year.
11:23The portal is there for almost three years. 2222 I think they have launched. In last one year,
11:31I think it has about 10 million downloads already. Almost one crore now. In last one year,
11:39because of this app, we have recovered more than 24 lakhs phones and the 42 lakhs phones were blocked
11:45because of this app. Those were eventually otherwise being used by criminals. And we've already seen the
11:52result. The government wanted to promote it heavily. But whatever awareness we can give,
11:58even Prime Minister Modi has mentioned in his Manki Bah about digital arrest. Last week itself,
12:06we got two cases of digital arrest where people have lost 24 lakhs. So, my point is, and these people are
12:11intellectuals. These people read newspaper every day. They are people who have had high positions in the
12:16government or in private sector. The point is, whatever awareness you do, it won't work in a country
12:23like India. We have been doing it since last 20 years. But people are still are ignorant for a few
12:28basic things. Now, we will have to deduce methods to enable these tools where we can protect them
12:38proactively. So, this was one of that initiative, aggressive initiative, that okay, we'll make part of
12:42their everything. And we'll be, we'll make it visible at the top. It should be clearly visible. It should
12:48not be hidden. This is the clear indication. So that if you have any such, every day you are watching
12:52the tech, every day you know that if something happens, you can report here. And then the crime
12:58can be reported in real time because cyber crime happens in online. And if it is happening, if it is
13:03not stopped in real time, you can't stop. For example, if you are getting continuous calls from an
13:10iteration, they are bothering you. And then you go to a police station and then report it. And
13:15eventually after two months, it has been, some action has been taken against it. It won't help.
13:20You need immediate help. And that will happen through Chakshu portal, Sanchar Sati, go report
13:25law. Similarly, if somebody is sending you nude pictures or obscene messages on WhatsApp, you want
13:31to report it right now and you want action right now. You don't want this action to be taken after three
13:35months because by that time, the person will be confident. This is the mindset of cyber
13:41business right now. They should be blocked immediately in real time. That's why this app is
13:44given to all the users that you report immediately and let them be blocked. They should not have enough
13:51SIM cards to use if their numbers will be blocked. How can they generate SIM cards so fast?
13:57But I think the awareness campaign at the part of the government was too weak because
14:01not many of us knew that this was rolled out back in January this year. And now only when they asked
14:07all the companies to preload it on the new devices is then when we know that this is a big issue.
14:14Amit, I also want to talk about the thing that you just pointed out. For example, if somebody steals my
14:22phone and tries to clone an IMEI of another user and try to operate that phone, that stolen
14:31phone, then the original person will be held accountable, will become a criminal, of course,
14:38because we don't have evidence. And this is one thing which government wanted to crack down on.
14:43But my point is that there are a lot of softwares available online which actually helps with this
14:49IMEI spoofing. So don't you think that the government needs to also work on that aspect?
14:55And I just want to talk about can the government be more proactive rather than reactive? I do understand
15:00when the crime is happening, it's necessary to report it. But don't you think that the government
15:04also needs to be proactive so that all of these spoofing softwares which are available online can
15:10be undone with? Do you know this power of spoofing any number or changing IMEI, we find in only 0.001%
15:21cases. Only in those categories. 99 plus percentage of time criminals are using your phone as it is.
15:29We know that. And that's why we were able to block it. Otherwise, if they all were spoofed, how could
15:34we block that? How could we kill it? How could we retrieve that? Which says something. It says that,
15:38okay, we'll work in that direction. Still, we are doing something for the people. We should not avoid that
15:45efforts. Otherwise, just to focus on those 0.01, we may lose this chunk of misuse. So I think that is
15:55the intention, just of all. As far as proactive actions are taken, this aggression was just to do
16:02the proactive actions on you. See, if the crime happened, then Sanchas Sati can't do anything.
16:06Sanchas Sati will only help you proactively. If something is approaching you, calling you,
16:12at that time, you can report the number to be blocked. But if you have already lost money,
16:16then for that, Sanchas Sati is not doing anything. Sanchas Sati. And why? Because cyber
16:23security is a mutual responsibility. It can't be achieved in isolation. See, if I get a call from
16:29some unknown number and I have been targeted, I know that this is a fraudster's number, but I have not
16:33reported it. Actually, I have enabled that criminal to move to someone else. I should have reported it.
16:39Because this is also my responsibility. If I see a girl walking on the road alone, and there are
16:46people who are disturbing her, and if I don't report, that is also my responsibility. It's a mutual
16:52responsibility. So in cyberspace, we wanted community to bring, they should join hands together, and they
16:59should put this effort so that we can target things together. Otherwise, it's not possible. I'll give you a
17:04real example. Suppose, I get every day tons of cases, and these victims are so desperate.
17:21The basics are that if I go to get the KYC of that SIP card, it belongs to some farmer or foodie
17:26who does not know there is a SIP card on his name. If I go to trace the KYC of that bank account where
17:32you have transferred the money, it belongs to some vegetable vendor in Westpacombe, who does not know
17:38there is a bank account on his name. If I go to find the owner of the phone, I mean, this is stolen phone.
17:47It's being reported by someone in Delhi. Now, we don't know anything about that. Neither the phone belongs to him,
17:53or a bank account or the SIM cards. The only thing that we know is his location. And he will not be
18:00there in his location for more than two hours. He'll be keep changing his location. Even if I create a
18:04pattern, maybe mostly in the border areas, and if we try to never do some hoops and brooks, if we arrest
18:13him, we'll not have enough evidence to even prosecute it in the court. We can prove that this person is the
18:20same person. How do we know it? Right. It is not practically possible. So, the point is,
18:28post-mortem activities won't help. The only thing that will help you, Sanchak, report law, report law.
18:33That is the only thing. Amit, because you also coordinate with law enforcement agencies and help them
18:40crack down all these cyber criminal cases, you must be knowing what is the scenario like in all the other
18:46countries. Because we see that predominantly the countries like Russia, China, we see major cyber
18:52crime activities, hackers from those countries trying to get into systems of other countries.
18:57How is this scenario in other countries? How do they tackle it? Do you think that it's important
19:01that only government, you know, do this basis preloaded applications on new phones? Do you think
19:08that there can be better way? And how do you compare this with what is happening in other countries in
19:13terms of cracking down on cyber criminal cases? So, Hina, first of all, we are mixing two things.
19:21We are actually telling about the expertise of Russian hackers. Russian hackers do not hack Russians.
19:29Yeah. Russian hackers actually target other country. It's critical. They don't target users like you and me.
19:38We are not bothered. We are not. We don't have problems because of the Russian hackers. Rather,
19:43we don't have problems with the Indian hackers also. These are not hackers. They are not tech savvy guys.
19:48They are not engineers. They are uneducated people from Jantada, Mewad, Albarbu, Bharatpur,
19:55All these 65 hotspots, they are targeting you and they are using social engineering. They are manipulating you.
20:01So, antivirus or security, you don't need it in your phone. You need it in your brain. That is the problem.
20:08Now, whatever expertise Russia has, Israel has, Turkey has, it doesn't matter. It is not harming them.
20:14Okay. Now, we are coming to the point, how do they tackle cybercrime over there? First of all,
20:19let me make it very clear that every country is struggling. Every country is facing more cybercrime than India.
20:24Let me give you some figures. Australia, they are losing 30 billion dollars every year. India is losing 1 billion or maybe 10 billion.
20:32But Australia is definitely more than that. Then Japan, then UK, then US. UK is losing 3 million pounds every day.
20:40It's an official record. Every day they are losing 3 million pounds to cybercrime and close to 1.5 billion pounds a year.
20:47So, let's be very honest that every country is facing this problem because this cannot be stopped by just
20:52But the countries that you're mentioning, I'm sorry, I'm interrupting, but the countries that you're mentioning,
20:58they are not building something on a government level and deploying it on this scale, on all the new devices
21:05and even the old devices trying to roll out updates to install this application. These countries, they must be tackling it in a different way.
21:12They are doing it even more monitoring than us. Any country which you feel more secure than India,
21:18they are secure because they do more monitoring. Otherwise, they can't manage.
21:21They are infiltrator, they are criminals. If you purchase anything in UK, or if you create a bank account
21:29and you try to cheat someone, they can monitor that transition within seconds and they can catch you.
21:36Because they are monitoring from your social security numbers,
21:39they are monitoring each and every activity to a single circle. Despite of that monitoring,
21:44they are losing 3 million pounds. Because people themselves are paying them now.
21:49Nobody is stealing it. They are mentally prepared to transfer. They are mentally convinced to transfer.
21:54So my point is, monitoring is going to be a lot of regulations. But they can't stop at 100% because if
22:03the person himself has decided to pay to someone, they'll pay. You can't forcibly stop it. Because he's convinced
22:08either in some lucrative offer or either he's scared or he's having some sort of confusion. But he is
22:15actually doing it willingly. That's for sure. So what UK did, UK did a very beautiful thing.
22:22They made a law last year. The law says in October last year. The law says whether it is
22:27the mistake of a victim or bank, it doesn't matter. The bank is responsible to pay 100% money within
22:34five days to the victim. We don't care who has done the mistake. We don't care. Literally don't care.
22:41Now all the banks in UK, they are in panic mode. Because they know that people will take advantage of
22:46this law. They themselves will transfer money to some other account. And they'll say fraud.
22:50Okay, fraud. Okay. Okay. And this is happening. This is exactly happening in last month. But the
22:59government was adamant. They said that all these kinds of frauds can't happen without the involvement
23:04of the bank. So we'll have to make them accountable. And they brought that law and it is actually working
23:09in the favour of victims now. But despite of that, the crime is happening. The point is, if suppose Indian
23:15government takes the same call. Do you know the repercussions? Do you know the retaliations?
23:23It is not that easy in India. UK can do it. I think the people here will try to exploit the
23:29system as much as possible. And it can't happen. We all know about this, that these kind of frauds
23:36cannot happen with the support of banks, with the support of telecom operators, with the support of
23:42people, those are actually enabling them all these infrastructure, locations, high doubts,
23:47even traditional systems. It is true. Why do they get bail so easily? Keep them in jail at least for
23:53two months. And there'll be innocent people, those will be in jail for six months, but they'll not get
23:57bail. Which means there is somebody who's enabling this. Because this is a business for them. So we should
24:03understand this, that there are multiple stakeholders now. It is not just a group of people that you can
24:07target and stop it. When there is an industry of 100,000 crores in a year, all kinds of support
24:13systems will start building. Amit, final brief answer I need from you. Two quick questions. First,
24:20what is the best way in this situation? Because a lot of people are definitely concerned about this
24:24application. What is the best way out for the government so that it is also able to enable us
24:29to help ourselves in this kind of cyber criminal cases, but also ensure that there is a trust which is
24:35secured between public and the government? And secondly, I want to know from you, what is it,
24:40what is the basic things that we can do as general common citizens of the country to protect ourselves
24:46from online cyber crime activities? As far as government is concerned, government is trying
24:53hard. I'm sure that this initiative is also because of that. We have been pushed too much that the crime is
24:58increasing. You are not doing anything. They have got thousands and thousands of cyber commandos in three
25:06states. They have got awareness programs running by each and every school, institutions, government
25:13institutions, and that has become mandatory. But whatever cyber awareness program we do, people are
25:20still unaware because unless they are targeted, they become victims. They don't take it seriously.
25:25So this is a human problem. This is a psychological problem. You can't solve it by just putting money
25:30or efforts. Whether it is being said by Amitabh Bachchan or Navajidin Siddiqui,
25:34who doesn't hear, he will not hear. So the point is that. Now government can bring some tools
25:41so that they can regulate these systems of the foundation level. For example, if you are transferring
25:44money, you can ask for money four times, this is your decision. It's not your decision. It's not your
25:48decision. It's not your decision. It's not your decision. It's not your decision. It's not your decision.
25:50What's your decision? You can call it four times and then you can transfer it to 25
25:53thousand dollars. So both sides do that. So you can delay it. If suppose there's an amount,
25:58we have tried all kinds of suggestions. Honestly speaking enough. There was a suggestion that
26:02you can do that. You can delay it half an hour and give that window to the user who is transferring this money so that he can take it
26:12back. Suppose we can do it. People start to fraud, they start to transfer the money, they start to service,
26:17they start to pay the money, they start to pay the money, they start to pay the money, they start to pay the case,
26:19they start to pay the civil mentor. If they are a criminal, they can't do it. So there are some ground
26:26living challenges. And that's why we wanted to build a community and the criminal block. If we could create
26:35something, criminal has to use a SIM card, bank account. We should start blocking that.
26:42in real time. And I think this is the purpose. If you could convey this clearly that what Sancha Saati
26:50wants to achieve. If we could do that, this will be a disruption. Nobody in the world could do this.
26:58India would be leading it. Only this can be done. We can actually mobilize crores and crores of people
27:04against criminals. We can actually report and block them whether they are harassing girl, whether they are harassing
27:09kids, whether they are cyberbullying, games apps or anything which is actually enabling criminals to do
27:14that crime. We keep blocking them and this power we give to the users. I think this was the reason.
27:20Now coming to your second point. What we could do as an individual if suppose we don't use such a Saati.
27:25We have to believe this, that no clan can take place without your involvement.
27:33you would have done something. Whether it is calm, growth, low, moh, aham ka. These are the five
27:37human vulnerabilities which is getting exploited in every kind of crime. Whether it is cybercrime
27:42or any other kind of crime. So it is you. Because we don't teach kids about these human vulnerabilities.
27:50They are trapped. We have seen cases where people were offered jobs and they ended up in Laos,
27:56in KK Park and being tortured and they were asked to do the cybercrime and then and it's been happening
28:05for years. Why? Because they could they could not have, they could not use their common sense that if
28:12something is too good to be accepted they should at least do some verification. I think these kind of
28:18things are human traits. We will have to revive in the beginning, from the beginning of these kids. That is
28:24something which is a long term solution. These are the common sense. I always give a one financial
28:32system thumb rule. If everybody will remember that, I can guarantee that 70% cybercrime cannot happen.
28:40I can give you in return. And the basic thumb rule is, if money is coming in your account,
28:47you should not do anything. Money will come automatically. So you have to put effort only
28:56when you have to transfer. Now if you take any app. Sir, I got a call from somebody who said that
29:02we are transferring grant to your account, just click this link and get your money. Sir, I got a call from
29:06someone, insurance copy that there's a dividend and you please receive this money and install this stock and
29:10you conveniently get this dividend. Sir, I got a call that you have money from Lottery Hall. Something was coming to your
29:16account. You were actually allowed to receive that. If the money is coming in your account,
29:20you should not do anything. Whether it is clicking a link, QR code, sharing OTP, anything. You should
29:25not do anything. Just focus on that simple thumb rule. 70% cybercrime. Right. And the remaining 30%
29:33is there is something which is offered to you which looks too good or somebody is scaring you. If you just
29:38focus on these two emotions, wait, verify and then take it. Sir, there are definitely pros and cons of this
29:45application. But all I can say in conclusion is that there could have been a better rollout
29:51taking into confidence some of the stakeholders, for example, the parliamentarians because
29:56they point out that this is some kind of an attack on the constitutional right on the citizens of the
30:02country. Thank you so much, Amidji, for speaking with Asianet News and giving your perspective on this.
Comments