{"id":10378,"date":"2021-11-29T00:00:00","date_gmt":"2021-11-29T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/29-11-2021\/cyber-enabled-financial-crime\/"},"modified":"2025-09-13T18:28:26","modified_gmt":"2025-09-13T12:58:26","slug":"cyber-enabled-financial-crime","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/29-11-2021\/cyber-enabled-financial-crime","title":{"rendered":"Cyber-Enabled Financial Crime"},"content":{"rendered":"\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Recently, 1000 individuals were held in 20 countries as part of <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Interpol crackdown on cyber-enabled financial crime<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>What are Cyber-Enabled Financial Crime?<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Cybercrime encompasses any crime committed online, including ransomware attacks, cyber-espionage, child pornography and cyber vandalism.<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Social engineering (e.g. phishing email) might be used to launch a cyber-enabled financial assault from the outside.<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It\u2019s not about draining bank accounts or bitcoin wallets; it\u2019s about stealing IP.<\/span><\/span><\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Operation HAECHI-II<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Project:\u00a0<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is the second such operation in a three-year project launched to tackle cyber-enabled financial crime, in participation with the Interpol member countries in every continent.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Specialised units:\u00a0<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Specialised police units from 20 countries, including Hong Kong and Macau, took part in the exercise to <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>target specific types of online fraud<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, such as \u201cromance\u201d scams, investment fraud and money laundering linked to illegal online gambling.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Anti-Money Laundering Rapid Response Protocol (ARRP):<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The operation also saw Interpol officials <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>pilot test a new global stop-payment mechanism<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> \u2013 the Anti-Money Laundering Rapid Response Protocol (ARRP) \u2013 which proved critical to successfully intercepting illicit funds in several HAECHI-II cases.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Purple Notices:<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Based on the findings during the operation, the Interpol published multiple Purple Notices \u2013 police alerts that seek or provide information on modus operandi, objects, devices and concealment methods used by criminals.\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The notices are shared with the member countries to enable exchange of information on emerging criminal methods and establish links between cases.<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">One such notice, requested by Colombia, detailed a <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>malware-laden mobile application using the name and brand of Netflix show \u2018Squid Game\u2019<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The app was in fact a Trojan horse virus that, once downloaded, could hack into the user\u2019s billing information and subscribe to paid \u201cpremium\u201d services without the user\u2019s explicit approval.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Significance<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">INTERPOL in assisting member countries combat a crime which is <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>borderless<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> by nature.<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Pilot implementation of <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>New and state of art global stop-payment mechanism<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, the Anti-Money Laundering Rapid Response Protocol (ARRP), which was designed to intercept illicit funds.<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">A major help provided by flagging the apps which target countries by carrying trojans within them.\u00a0\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Cyber Crime in India<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Definition:\u00a0<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In India, cyber crime can be defined as unauthorized access to some computer system without the permission of the rightful owner or place of criminal activity and include everything from online cracking to denial of service attacks.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Examples:\u00a0<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Phishing,\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Spoofing,\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">DoS (Denial of Service) attack,\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">credit card fraud,\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">online transaction fraud,\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">cyber defamation,\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">child pornography, etc.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Reasons of Cyber Crime<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Ease of Access<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">:<\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Hackers can steal access codes, retina images, advanced voice recorders etc. that can easily fool biometric systems and bypass firewalls can be utilized to get past many security systems.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Capacity to store data in comparatively small space:<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This makes it a lot easier for people to steal data from any other storage device and use it for their own profit.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Cracking the Codes:<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The computers run on operating systems which are programmed with millions of codes.\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The cyber criminals can take advantage of any mistakes at any stage.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Negligence:<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Any negligence while protecting the computer system can provide a cyber-criminal the access and control over the computer system.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Need for Cyber Laws in India<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">As per the recent reports by media, the Union Home Ministry informed the Parliament that <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>cyber-attacks have risen exponentially<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, last year in the country, from 394,499 recorded in 2019, to 1,158,208, citing the data from Computer Emergency Response Team (CERT-In).\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Lack of awareness for adequate cybersecurity.<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The high rise in online activities due to lockdown imposed to curb covid-19 pandemic situation.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Government Initiatives To Tackle Cyber Crime in India&nbsp;<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>The Indian Computer Emergency Response Team (CERT-In):<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It operates as the national agency for tackling the country\u2019s cybersecurity, and has helped in lowering the rate of cyber attacks on government networks.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Indian Cyber Crime Coordination Centre (I4C)<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">To act as a nodal point in the fight against cybercrime<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">To prevent misuse of cyber space for furthering the cause of extremist and terrorist groups<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Cyber Surakshit Bharat\u00a0<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Aiming at strengthening the cybersecurity ecosystem in India in line with the government\u2019s vision for a \u2018Digital India\u2019.<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Launched by the Ministry of Electronics and Information Technology (MeitY) in association with the National e-Governance Division (NeGD).<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>National Critical Information Infrastructure Protection Centre (NCIIPC)<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is a central government establishment, formed to protect critical information of India, which has an enormous impact on national security, economic growth, or public healthcare.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Botnet Cleaning and Malware Analysis Centre\u00a0<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The central government has also launched Cyber Swachhta Kendra, which is a cleaning bot used for malware analysis and detecting malicious programs.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Personal Data Protection Bill<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">In order to protect Indian users from global breaches, which focuses on data localisation.\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The bill implies the storage and processing of any critical information related to individuals only in India.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Appointment of Chief Information Security Officers (CSIO)<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The government of India has also issued a written guideline for the CISOs of government organisations, highlighting the best practices for securing applications, infrastructure, and compliance.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Website Audit<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Amid the increasing number of government website hacking, email phishing, data theft, and privacy breach cases, the Indian government has planned to conduct an audit on all the government websites and applications.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Crisis Management Plan<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">This initiative is aimed at establishing a strategic framework for employees and leaders to prepare for a breach incident.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Training &amp; Mock Drills<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The government organisations have also started organising and conducting cybersecurity mock drills to assess the cybersecurity posture of organisations.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Way Ahead<\/u><\/strong><\/span><\/span><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Global Cooperation:<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Establish multi-dimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, internet companies, and financial institutions.\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Interpol\u2019s financial crime unit is currently working with member countries to integrate the system into the existing communication channels.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Governmental Measures:<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Training Programmes for tackling cyber-attacks<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Creating\u00a0 full-fledged Army of Cyber Professionals<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Setting up of Robust Governance<\/span><\/span><\/span> <span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">with support from established centres like Defence Cyber Agency, Indian Cyber Crime Coordination Centre and Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre)\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Individual Level:<\/strong><\/span><\/span><\/span>\n<ul class=\"wp-block-list\">\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Using Strong Passwords\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Keeping social media accounts private<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Securing mobile devices\u00a0<\/span><\/span><\/span><\/li>\n\n\n\n<li><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Protecting the computer with security software<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Source<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/www.thehindu.com\/news\/national\/1000-held-in-20-countries-as-part-of-interpol-crackdown-on-cyber-enabled-financial-crime\/article37717158.ece\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 11pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #1155cc;\">TH<\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News What are Cyber-Enabled Financial Crime? Operation HAECHI-II Significance Cyber Crime in India Reasons of Cyber Crime Need for Cyber Laws in India Government Initiatives To Tackle Cyber Crime in India&nbsp; Way Ahead Source: TH<\/p>\n","protected":false},"author":1,"featured_media":10379,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[75,122,114,26,123],"class_list":["post-10378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-challenges-to-internal-security","tag-communication-networks","tag-cyber-crime-security","tag-gs-3","tag-media-social-networking-sites"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/2728196Screenshot.png","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/10378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=10378"}],"version-history":[{"count":1,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/10378\/revisions"}],"predecessor-version":[{"id":54048,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/10378\/revisions\/54048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/10379"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=10378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=10378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=10378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}