The Vital Role of Hash Values in law enforcement officers Investigations


Hash values often described as the “digital fingerprints” of digital data set.

In the digital age, where evidence can disappear with the click of a button or be manipulated in mere seconds, the authenticity of data has never been more critical for law enforcement.

Police officers and investigative teams face a unique challenge: how to ensure the digital evidence presented in court remains untampered, reliable, and admissible.


πŸ‘‰   What are Hash Values?

A hash values is one of the method of authenticating a piece of digital data, such as a file, folders, image, or document and storage.

It is a unique alphanumeric code. Even the slightest alteration—a single misplaced pixel or character—results in a completely different hash value.

Any changes mode to the original evidence will result the change of the hash value. It is an essential tool for verifying digital data

For example-

If a hash values are generated for a digital image extracted as evidence from a suspect’s computer, the same value can later be used to confirm the image remains unaltered. This feature is crucial for maintaining the chain of custody in police investigations.


πŸ‘‰   Characteristic of Hash Values:

Hashing program produce a fixed length large integer value (ranging from 80 - 240 bits) representing the digital data.

The Hash Values is usually alphanumeric (containing alphabets and numbers).

Types of hash algorithm are available like MD 5 (message Digest 5), SHA 256 (secure hash algorithm) for use.

MD 5 hashes are typically represented as a sequence of 32 hexadecimal digits.


MD 5 Hash Values of data-

For example:

Text file -                                            “ Ronald injured his friend Jacob”

Complete MD 5 Hash Values-              zeoo2gcd5177824v449bgala2548a043

Even a small change in the text will result in an entirely different hash values.

 

Hash values is algorithm mapping or transaction of one sequence of bits into another.

An electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally impractical   -

▶To derive or reconstruct the original electronic record from the hash result produced by the algorithm.

That two electronic records a can produce the same hash result using the algorithm.


πŸ‘‰  Reality of Hash Values in Investigations

To better understand their importance, let’s examine how hash values are applied in police investigations:

Experts use hash values to validate the contents of hard drives, USB devices, or cloud storage during investigations. For instance, when examining a suspect's computer for evidence of financial fraud, the hash value of each extracted document ensures its authenticity throughout the legal process.

Law enforcement agencies often maintain databases of hash values ​​associated with known illegal content. By scanning devices to match hash values, authorities can instantly identify and remove harmful content without having to see it directly.

 

πŸ‘‰  Finding:

For police departments and law enforcement officers, cannot away from digital data authentication. It’s a necessity. Hash values provide a reliable, capable way to ensure the integrity of evidence in an increasingly digital scene. In the pursuit of truth, these unseen digital fingerprints are proving to be one of the most powerful allies in the fight against crime.


Are you interested in knowing about SIM SWAP FRAUD ?

   SIM SWAP FRAUD



Case study -

Rudra is a businessman who established a big private company residing in Pune City. In present his business is good and he has been profiting by it. He has more than two bank accounts of companies in reputed banks and operates by himself by Internet banking or mobile banking. Bank accounts linked with his registered mobile number.

SIM Swap fraud ”  operates  by scammers for dupe money.

One day, he was busy with his work and three miscalled through an unknown number on his mobile. When Rudra tried to call that number but would not connect. After some minutes, he knew someone had transferred 2.5 crore rupees from his business account. After he contacts the bank about that transaction. Given a complaint to the bank and cyber police. After investigation, it was a clear indication of SIM Swap scam.


What is a SIM Swap scam ?


SIM swap refers to the process of changing mobile SIM cards affixed with registered phone numbers. 


A SIM swap scam involves tactics like SIM splitting and SIM jacking. 


When this occurs without the user’s consent, it is typically for fraudulent purposes.



How does a SIM Swap scam work ?


Step -1

Fraudsters carry out this scam by obtaining a new SIM card from the telecom service provider linked to the victim’s phone number ( by using malpractice techniques)


Step -2

Scammers may use various methods to achieve this, including gathering information, containing banking creditials from the victim’s social media profiles (known as open-source intelligence or OSINT), phishing, or impersonating a telecom customer service representative. 

 

Step -3

By posing as the user (victim), they can easily obtain a new SIM card and deactivate the old one. Consequently, one-time passwords (OTPs) will no longer be sent to the original SIM, preventing the user from receiving alerts for any financial transactions related to their linked bank account. 


Step -4

Instead, fraudsters receive OTPs and other notifications on the new SIM, allowing them to commit financial fraud against the victim’s accounts. 


Step -5

Scammers transfer funds from the victim's accounts to several bank accounts and e-wallets. 



How to avoid becoming a victim of SIM Swap scam?

 Follow the under mentioned tips:

πŸ‘‰Observation and inspect a URL/ Website related to your task before internet banking.  It may be fake or looks original. you can be duped. 

πŸ‘‰Don't share anyone financial and personal info 

πŸ‘‰ use a strong password and change it periodically.  

πŸ‘‰ If there is any problem in the mobile network while using mobile operate, call the mobile service provider. During this period the scammer can change the victim's SIM and Can be used to defraud victims.

πŸ‘‰ Contact Bank All financial transactions notifications/alerts to intimate the user via SMS as well as email. - If a victim's SIM Swap by a scammer and operates a financial transaction by cyberspace, As a result, alerts/notifications will be received on email.


πŸ’₯ For Police Report:

Use www.cybercrime.gov.in

Use cyber helpline Number -1930 ( Most effective means against scams).


Aisa bhi ho raha hai........to learn form this newsπŸ‘‡





“ Keylogger ” used by Cyber Criminal for Online Fraud


  Be careful while surfing any communication device….

Case study -

Yashwant worked as Assistant Manager in Well known undertaking Central Government company. His company had enforced a data security policy and so he was not allowed to carry personal communication devices like mobile phone, other internet in the office. hence used to visit cyber cafe located near the company to do internet banking and other personal transactions on the internet.

Keylogger ” used by Cyber Criminal for Online Fraud

One day he visited a branded showroom for purchase clothes. And try to pay the bill by debit card. The showroom man swiped the debit card and observed that there was insufficient balance in the account. same contact the bank informed and an amount of  Rs. 64,000/-  was transferred from his bank account to some other account.

During the investigation of the case, the police revealed that the accused visited a cyber cafΓ© and installed a keylogger program in the computer and collected the debit card data  after two days from the cyber cafΓ© computer.  And used data for  transferring Yashwant's funds. Keylogger ” used by Cyber Criminal for Online Fraud


πŸ‘€

This fraud  has occurred due to the installation of a keylogger in a cyber cafΓ© computer by a cyber criminal. Yashwant is an educated person but  digitally illiterate and not aware, he would not have use outsider computer for internet banking transactions. πŸ‘€


If you don't want to be a part of online fraud, you need to be digitally literate. So this is a must know….

πŸ‘‰ What is the Keylogger ?

A Keylogger is an application or form of  spyware which is used to capture online user activity like keystroke on a keyboard.

Keylogger ” used by Cyber Criminal for Online Fraud

πŸ‘‰How to install a  keylogger by a cyber criminal ?

Cyber criminals can install keylogger programs into computers by  Phishing email, USB drive, short links, Remote access tools such as TeamViewer or Anydesk. 

πŸ‘‰How does keylogger work for illegal activities  ?

Keylogger can be used by cyber criminals for illegal activities such as stealing credit / debit  card details, password, personal sensitive information and Organization /Institution/Companies  important information.

πŸ‘‰Which signs that your computer/ electronic communication device  has a keylogger ?

A slow browser, a lag in mouse movements or keystrokes, and  not visible from the cursor. 


πŸ‘‡Follow the tip:

Do not use an outsider/others computer or electronic communication device for internet banking or other important transactions. it may be loss for you.

Strong Password Tricks for Online Users.

 



 

Password protect our communication devices, computers, electronic social media accounts and  sensitive personal  information from unauthorized access and cyber criminals.


It allows  access to information  only to authorized
online users. It has a crucial role in virtual world users.


πŸ‘‰Password attack-

Cyber criminal use many method to access accounts including Dictionary brute- force attack may also be used Password capturing tools the ” Keylogger ”  on victim's computer or electronic device 



πŸ‘€Strong password tricks for safe in virtual world from cyber criminals-


πŸ‘‰Always use different passwords for different accounts to ensure the password is strong.


πŸ‘‰A strong password should contain a combination of uppercase, lowercase, numbers and  special characters.


πŸ‘‰Immediately change any password which might have been shared or revealed by mistake.


πŸ‘‰All user-level passwords (e.g., email, web, desktop computer, etc.) shall be changed periodically (at least once every three months)


πŸ‘‰Don’t use password contains birthday name, ID proof and other password information, search as address and phone numbers commonly used word such as name of family members, pet, friends, colleagues , movie/ novel/ comics character etc.


πŸ‘‰ Don't choose select “ remember my password “  option for banking and sensitive sites Strong Password Tricks for Online Users


πŸ‘‰ Passwords must not be communicated through email messages or other forms of electronic communication such as phone to anyone.


 πŸ‘‰All access codes including user ID passwords, network passwords, PINs etc. shall not be shared with anyone. These shall be treated as sensitive, confidential information.


 πŸ‘‰Passwords shall not be stored in readable form in batch files, automatic logon scripts, Internet browsers or related data communication software, 


πŸ‘‰ Don't use your biometrics ( fingerprint etc.)at untrusted terminals / places.


πŸ‘‰ If the password is shared with support personnel for resolving problems relating to any service, it shall be changed immediately after the support session. 


πŸ‘‰The password shall be changed immediately if the password is suspected of being disclosed, or known to have been disclosed to an unauthorized party. 


πŸ‘‰The password shall contain more than eight characters.

 

πŸ‘‰The password shall not be a common usage word such as names of family, pets, friends, co-workers, fantasy characters, Strong Password Tricks for Online Users. etc.


 πŸ‘‰The password shall not be based on computer terms and names, commands, sites, companies, hardware, software. 


πŸ‘‰The password shall not be based on birthdays and other personal information such as addresses and phone numbers.


πŸ‘‰ The password shall not be a word or number pattern like aaabbb, qwerty, zyxwvuts, 123321, etc. or any of the above spelled backwards. 


πŸ‘‰ The password shall be a combination of upper and lower case characters (e.g. a-z, A-Z), digits (e.g. 0-9) and punctuation characters as well and other characters. Strong Password Tricks for Online Users


πŸ‘‰  Create acronyms from words in a song, a poem, or any other known sequence of words.


Strong Password Tricks for Online Users

Become Cyber Smart !

 Become Cyber Smart !  


πŸ‘€     “My mobile battery is running low.  Here’s a charging port that will come to my rescue !”.     πŸ‘Ž



           πŸ’«....Become Cyber Smart !πŸ’ͺ                                                                      πŸ‘‰

                                               


Practice Cyber Hygiene Everyday......

πŸ‘‰Cyber-criminals may steal your data and personal details through public charging stations. 

πŸ‘‰You may run risk of compromising you bank credentials or other important information. 

πŸ‘‰Avoid public charging ports or portable wall chargers. 

πŸ‘‰If you must charge your phone, only use a wall socket.

                       

  ..Online…πŸ‘ͺ 

Please....

Change Our Mindset…

 We,

Surviving in real world and virtual world,

To need change mindset, whenever touch virtual world,

 Stop … Think …and Connect..


Sextortion Scam...

 

   ‘Sextortion Scam’

 

" Hello, if you’re alone, then video-  call me...."


   About Sextortion : 

Sextortion is a one of the severe crime of online scam. A type of cyber-attack on individual. “Victims receive video calls or messages from unknown, an attacker threatens to share embarrassing or obscene pictures or videos of person unless you comply with their demands, which may include sending money or performing other actions”. This tactic does not only led to financial losses but also tarnished reputations and, in some cases, caused mental harassment. 

 

How sextortion scam works?

The modus operandi of such frauds keeps changing periodically. The modus operandi of such frauds keeps changing periodically. The victims are usually befriended on Facebook or other social media platforms. And unexpectedly saw a friend request of a charming woman posing as fake name. After receiving, exchange contact numbers and says if you’re alone, then video-call me,”. And just day after the victim received video call on WhasApp in which the woman appeared nude and stated stripping and ask the victim to do same.  Victim followed her instruction and remove his cloth. Succumbing to the bait, the victim unwillingly fell into a trap after disconnected the call. She sent massage “saying that she had recorded it an obscene video, sexually harassed me.  After two day called by another person to victim, claiming to be officer of Cyber Crime Branch, allegedly threaten the victim that his obscene video and sexually harassed woman on online. Case would be registered against victim. Fake officer says if he wants to avoid his arrest  he needs to pay more money as he is required to manage the matter. Unable to find a way out the victim transferred money in varies transactions. Some instances, dupes money under name of the viral of obscene video on social media.  Mounts pressure the victim to transfer money to delete the  video.


Choosing targets by Scammer for the Scam

Targeted person’s Facebook profile is play a lavish lifestyle and

 the scammers track victim digital footprint to figure out his

 paying capacity. The scammers keep track of the social media

 activities of victims. “They analysis comments, likes and shared

 posts of their targeted person, usually men above age of 40 and

 with stable income”. “The scammers analysis the content viewed

 by a targeted person before approaching him. They also observe

 the victim’s all type status, if he is lonely or single, divorced or

 separated, the accused lay the lure for those who they feel

 would be sensitive to such acts.


How to avoid becoming a victim of sextortion scam?

The most important way to protect from dupe is to be aware.

 Always stay alert against cybercrime. How to protect our self or

 family members from digital arrest scam/fraud. Follow the under

 mentioned tips:

- Be cautious on social media.

-Enable two-factor authentication.

- Verify identities: Be wary of unknown or suspicious profiles.

- Be cautious of flattery: Scammers often use compliments togain trust.

- Avoid sending intimate photos or videos.

Avoid Suspicious Links and Attachments: Do not click links or open 

  attachments in messages that ask for your interaction.

 

One of the best Setting for avoid such Scam :

Follow the under mentioned WhatsApp setting for no any stranger can video call to you on WhatsApp. It will be help to safe from such scams.

 Setting:-


Step -1


Click on the 3 dots.   

Step-2

Click on settings 

Step-3

Go on privacy 

Step-4

Select  calls

Step-5


ON the switch of silence unknown callers



 

What to do If a victim of sextortion scam?

If you’re victim…

 1. Don't panic: Stay calm and assess the situation.

2. Don't respond: Ignore all communication with scammers.

3. Refuse to send money

4. Provide personal information and credentials

5. Inform authorities, social media platforms, or email providers.

6. Contact a trusted friend, family member and professional.

7. Repot to Government Authorities:

-To report on cybercrime helpline “1930

-To report on National Cyber Crime Reporting Portal “www.cybercrime.gov.in”

- To report in nearest police station.

-  To file an e-FIRGo to the official website of the local police department or a dedicated e-FIR portal.

 

Mobile Phone Cyber Security

  Introduction: We are living in digital era, mobile phone is not only making calls, and sending massages but also like computer work. I...