00:00In the cybercrime case, we can use a cyber space and use of cybercrime.
00:06We can use investment fraud, job fraud, digital arrest.
00:16There are two or three things.
00:20First, there should be a SIM, there should be a number, WhatsApp or Telegram call most of the time.
00:30If you land here, you can deposit your account.
00:40Most of these accounts are Indian accounts.
00:42There should be a number of accounts or other accounts.
00:46Who is the owner?
00:48Account holder.
00:50The account holder is a new account.
00:55The account holder is a cyber fraudster.
01:03We can be purchased by 2 or 3 accounts.
01:17But the first transaction is the victim account.
01:25So, in our experience, we have a very small account.
01:35We have a very small account that is open in zero balance.
01:41In that account, we have a very small transaction.
01:46If we check the background, this is also a cyber fraudster.
01:51This account holder is used for 3-5 hours.
01:57In this case, the account holder is opened to a cyber fraudster.
02:06This is also a cyber fraudster.
02:19In this case, the DGCID, which is a cyber fraudster,
02:27the DGCID, which is a cyber fraudster.
02:34In this case, the DGCID is used for cyber fraudster.
02:41The account is used for the first layer of LTV.
02:44The victim is used for the first accused.
02:48This account is used for our government.
02:51They are also used for the case.
02:56The account holder is used for Maratha.
02:59The agent is used for Maratha.
03:01We are able to check the case.
03:03In this case, we have the account holder for fraudsters.
03:12The account holder is used for the accounts.
03:15This is the first step of the process.
03:16This is the first step.
Comments