#Fact Check: Old Photo Misused to Claim Israeli Helicopter Downed in Lebanon!
Executive Summary
A viral image claims that an Israeli helicopter shot down in South Lebanon. This investigation evaluates the possible authenticity of the picture, concluding that it was an old photograph, taken out of context for a more modern setting.
Claims
The viral image circulating online claims to depict an Israeli helicopter recently shot down in South Lebanon during the ongoing conflict between Israel and militant groups in the region.
Factcheck:
Upon Reverse Image Searching, we found a post from 2019 on Arab48.com with the exact viral picture.
Thus, reverse image searches led fact-checkers to the original source of the image, thus putting an end to the false claim.
There are no official reports from the main news agencies and the Israeli Defense Forces that confirm a helicopter shot down in southern Lebanon during the current hostilities.
Conclusion
Cyber Peace Research Team has concluded that the viral image claiming an Israeli helicopter shot down in South Lebanon is misleading and has no relevance to the ongoing news. It is an old photograph which has been widely shared using a different context, fueling the conflict. It is advised to verify claims from credible sources and not spread false narratives.
- Claim: Israeli helicopter recently shot down in South Lebanon
- Claimed On: Facebook
- Fact Check: Misleading, Original Image found by Google Reverse Image Search
Related Blogs
Introduction
Ministry of Electronics and Information Technology released draft plans for advancing indigenous research and development in cyber forensics, quantum computing technologies, mobile security, cryptography, and Internet of Things (IoT) security. These roadmaps, crafted by the Centre for Development of Advanced Computing, outline strategic approaches to address various challenges over different timeframes leading up to 2047, marking the centenary of Indian independence. These roadmaps provide valuable insights into the nation's commitment to achieving technical autonomy and bolstering resilience in critical areas of cybersecurity and emerging technologies.
Cybersecurity Roadmap
The cybersecurity strategy serves as a lighthouse for strengthening India's digital defenses. With an eye on the immediate future, the plan seeks to create "Social Media Analytics" by 2026, reflecting the rising relevance of extracting insights from the immense ocean of social media data. Furthermore, the emphasis on "Dark Web Forensics" by 2030 demonstrates an understanding of the shifting danger scenario. Ongoing attempts to detect child abuse and human trafficking reflect a dedication to using technology to address social concerns. The timescale beyond 2047 underscores the lasting nature of these difficulties and the necessity for ongoing innovation. Furthermore, the roadmap highlights plans for GPS and car forensics by 2027 and 2029, respectively, demonstrating a comprehensive approach to cybersecurity that spans numerous technologies.
India's quantum computing strategy outlines considerable research and development plans till 2034. Quantum computing represents the boundary of processing power, and India intends to make major progress in this area. The extended time scale reflects the inherent complexity and limitations of applying quantum physics to practical applications.
The Mobile Security Roadmap prioritises "enterprise-grade" security measures to protect critical business and government data. Furthermore, the plan emphasises the importance of an "indigenous system for secure [operating systems] and mobile device hardware," allowing India to lessen its reliance on foreign technology in the mobile ecosystem.
Cryptography Roadmap
Cryptography is the foundation of secure digital communication, and India's strategy for this sector outlines specific and time-bound objectives. The focus on 'asymmetric cryptography' and safeguarding IoT devices by 2028-33 is consistent with worldwide initiatives to improve digital security. The emphasis on "quantum-resistant cryptography," which indicates a forward-thinking approach to encryption technologies that may endure the arrival of quantum computing, which poses a possible danger to current cryptographic systems, is particularly noteworthy.
Challenges and opportunities
While these roadmaps set a visionary route for India's technologically advanced future, such ambitious undertakings bring both problems and possibilities. The intricacy of quantum computing, as well as the ever-changing nature of cyber threats, needs ongoing adaptation and engagement with the international academic community. Furthermore, establishing self-sufficiency in vital technologies necessitates significant research, development, and talent acquisition investments.
Collaboration and Global Perspectives
In an interconnected society, the success of these roadmaps is dependent on collaboration with the global community. The sharing of information, best practices, and joint research efforts can help India advance and strengthen its capacities in these transformational technologies. Building strong international collaborations would not only boost India's position but also help to progress science and technology throughout the world.
Conclusion
India's proposed roadmaps for cybersecurity, quantum computing, mobile security, encryption, and IoT security offer a strategic and forward-thinking outlook on the country's technological future. These roadmaps, which continue well beyond 2047, the centennial of Indian independence, demonstrate India's commitment to long-term resilience and innovation in the face of growing digital problems. The effective implementation of these roadmaps would safeguard India's digital environment and position the country as a worldwide leader in cutting-edge technology, helping to improve society and expand human understanding.
Reference:
Introduction
As per the National Crime Records Bureau (NCRB) ‘Cyber Crime In India Report 2022’, A total of 65,893 cases were registered under Cyber Crimes, showing an increase of 24.4% in registration in comparison to 52,974 cases registered in 2021. The crime rate increased from 3.9 in 2021 to 4.8 in 2022. During 2022, 64.8% of cyber-crime cases registered were for the motive of fraud (42,710 out of 65,893 cases), followed by Extortion with 5.5% (3,648 cases) and Sexual Exploitation with 5.2% (3,434 cases). The statistics released by NCRB show the increased rate of cyber crimes in the country, which poses a significant question of safety in the online world. The rise in cybercrime indicates a rise in emerging criminal groups with malicious intentions, creating new cybercrime hotspots in the country where these groups target and commit cyber crimes despite limited resources.
Cyber Crime Hotspots
Police have recently arrested several cyber criminals in a specific region, indicating that certain areas have become hotspots for cybercrime. Mewat region is one such hotspot indicating a growing trend of cybercrime operating from this area. The Mewat gang's modus operandi is quite different; Cybercriminals in Mewat scam mobile owners just using smartphones and SIM cards without kingpins and targeting mobile owners. The scammers also lure people through online marketplaces such as OLX, in which they pretend to sell possessions and then either physically lure victims to pick-up locations or scam them virtually.
A study conducted by Future Crime Research Foundation and IIT Kanpur in 2023 has revealed that Jamatara city, once considered the cyber crime capital of India, is no longer the epicentre. The study found that 35 hotspots in India are actively involved in cybercrime activities. The top 10 cybercrime hotspots in India collectively account for 80% of cybercrime-related cases in India. These districts are strategically located near India's capital or closer to the National Capital Region (NCR). These districts are strategically placed with multiple borders, making them easy targets for criminals.
Online financial fraud and social media-related crimes are the most common in India. Cybercriminals exploit data as a gold mine, using it to commit crimes. For instance, they can obtain banking and insurance data, use simple AI tools to cheat victims, and they can easily impersonate identities to lure innocent people. In cybercrime hotspots, sextortion is a modern way for cybercriminals to record and demand money. Loan app fraud, OLX fraud, and job fraud also originate from these specific regions.
Recommendations
To counter the challenges posed by emerging cybercrime hubs, the following recommendations are to be considered:
- Advanced threat Intelligence: The digital landscape is evolving, and the threat landscape is becoming more complex. AI's role in cybersecurity is becoming increasingly critical, both positively and negatively, as it helps in understanding and addressing advanced threats. AI is capable of proactive threat hunting, real-time anomaly detection, and swift incident response.
- Enhancing capabilities of Law Enforcement Agencies: Law enforcement agencies must be sensitised to advanced tools or techniques to investigate cyber crime cases effectively. The development and implementation of advanced forensic tools and technologies need to be utilised or implemented to keep up with the evolving tactics of cybercrime perpetrators.
- Continuous Monitoring: Continuous cybersecurity monitoring is crucial for detecting anomalies and preventing cyber-attacks. It involves analysing systems and data to establish baseline security, identify deviations, and investigate potential threats. Cybersecurity experts use data observability tools, artificial intelligence, and machine learning to detect unexpected dataset changes.
- Cyber Security Awareness: Public awareness needs to be higher. Cybercrime prevention and cybersecurity is a shared responsibility of all of us by being aware of the threats and following the best practices. The frequent interaction between law enforcement and the public is necessary to raise awareness about safeguarding personal and financial information. Effective campaigns on cyber security are necessary to educate netizens.
Safety Tips for Netizens
Install up-to-date security software and firewalls on devices, use strong passwords for accounts, and regularly update software and applications. Be cautious when clicking on links or downloading files from unknown sources, and be cautious of your personal information.
Conclusion
The rise of Cyber Crime Hotspots in specific regions or districts has significantly exacerbated the issue of increasing cybercrime rates. In order to combat cybercrime more effectively, it is necessary for law enforcement agencies to strengthen their coordination between different states and to adapt advanced technology methods to counter cybercrime threats effectively. Moreover, educating netizens about cyber crime threats and providing best practices is an effective method to counter these threats, considered the first line of defense against cybercrime.
References
- https://ncrb.gov.in/uploads/nationalcrimerecordsbureau/custom/1701607577CrimeinIndia2022Book1.pdf
- https://economictimes.indiatimes.com/tech/technology/no-kingpins-just-a-smartphone-and-sim-card-how-cybercriminals-in-mewat-scam-mobile-owners/articleshow/98062889.cms?from=mdr
- https://www.futurecrime.org/fcrf-cyber-crime-survey-2023
- https://timesofindia.indiatimes.com/city/mumbai/jamtara-loses-crown-as-new-remote-districts-rewrite-indias-cybercrime-map/articleshow/104475868.cms?from=mdr
- https://government.economictimes.indiatimes.com/news/secure-india/80-of-cyber-crimes-from-10-new-districts-iit-report/103921338
- https://www.dw.com/en/how-mewat-became-indias-new-hub-for-cyber-criminals/video-68674527
- https://www.indiatoday.in/from-india-today-magazine/story/into-cybercrime-hotspot-india-mewat-rajasthan-haryana-uttar-pradesh-2381545-2023-05-19
- https://frontline.thehindu.com/the-nation/spotlight-how-nuh-district-in-haryana-became-a-breeding-ground-for-cybercriminals/article67098193.ece
- https://www.opindia.com/2024/04/nuh-mewat-cyber-crime-haryana-police-crackdown/#google_vignette
Executive Summary:
Internship scams have infiltrated the academic landscape, scamming students of many prestigious colleges. The students often prefer to carry out internships to gain knowledge and work experience. These scams use the name of popular multinational companies to exploit the students. This report studies the various case studies, their modus operandi, impact on the students and preventive strategies. This report emphasises the importance of awareness and proactive measures to protect students from falling victim to such frauds.
1. Introduction
Internships are the opportunity to overcome the gap between the practical knowledge acquired at the university and practical experience, to get practical skills and contacts in the field of activity, as well as improve employment prospects. Instead, because of high paying internships and interesting positions students have become targets of work scams. As we have seen with the advancement in digital technology, scammers take advantage of the disguise of the internet, making very neat, smart, and convincing scams.
Internship scams are very prevalent and they include fake job listings and phishing schemes as well as payment frauds which make students lose lots of money and also emotionally expose them. In this specific case, this paper examines how these scams work, the warning signs, and ways of protecting students from falling victim to them.
2. Detailed Modus Operandi of Internship Scams
Internship scams often employ a variety of tactics to attract and deceive unsuspecting students. Below is a detailed breakdown of the common methods used by scammers:
- Fake Job Listings and Offers:some text
- Scammers post attractive internship offers on popular job portals, social media platforms, and even send personalised messages via LinkedIn. These listings often mimic the branding and style of reputable companies, including well-designed logos, professional email addresses, and official-looking websites.
- Example: A fake internship offer from a reputed software firm circulates on a job portal, with a professional landing page. Students who apply are quickly “hired” without any interviews, and are asked to pay a security deposit to confirm their acceptance.
- Upfront Payment Requests:some text
- Scammers ask for payment such as registration fees, training materials, background checks, or security deposits. These payments comes under non-refundable payment and it act as the primary revenue stream for the fraudsters.
- Example: A group of students receive internship offers requiring a payment of INR 10,000 for "training materials" and "online assessments." After making the payment, the students never hear back from the company, and all attempts to contact them were futile.
- Phishing and Identity Theft:some text
- Beyond financial fraud, some scams aim to steal personal information. Fake internship applications often require detailed personal data, including identity proofs, bank account details. This data will be used as identity theft or sold on the dark web.
- Example: A student applies for an internship that asks for copies of identification documents and bank details. This information sharing led to unauthorised transactions in their bank account.
- Work-from-Home Frauds:some text
- With the rise of remote work, scammers also offer work-from-home internships that require students to purchase software or pay for specialised training. After payment, students are often given irrelevant tasks or no tasks at all, leaving them with no real work experience.
- Example: An internship advertised as a "remote data analysis role" required students to buy a proprietary software licence. After paying, students realised the software was freely available online, and the internship tasks were non-existent.
- Impersonation of Reputed Companies:some text
- Scammers use the name of well-known companies, they modify the email addresses or create fake websites that look original. They use these platforms to send offer letters, making it difficult for students to identify the scam.
- Example: A scammer creates a fake website mirroring a major consulting firm's internship page. The only difference is a minor change in the URL. Dozens of students are duped into paying registration fees.
3. Case Studies of Real-Life Incidents
- Case Study 1: The Certification Course and Internshipsome text
- A group of students received personalised emails from an official domain of a reputed tech industry providing an internship offer. Students were asked to pay Rs 10,000 to undergo a certification course to carry the internship. After paying the amount, the students did not receive any instructions, and the company was found to be nonexistent. The scammer had spoofed the company’s email domain, making it difficult to trace the source.
- Case Study 2: The Social Media Trapsome text
- A student from a university encountered an internship post on Instagram, advertising roles at a popular fashion brand. The application process involved a "screening fee" of INR 5,000. Despite appearing legitimate, the internship was fake, and the brand had no knowledge of the post. The student's personal data was also compromised, leading to unauthorised social media activity.
- Case Study 3: Internship Providing Social Platformssome text
- A popular internship providing platform, faced an incident where a scammer posted fraudulent internship offers under the guise of a major multinational. The scam involved asking students to purchase expensive software to start their work. The platform had to issue warnings and remove the listings after several complaints.
4. The Impact on Students
The consequences of internship scams extend beyond immediate financial loss, affecting students on multiple levels:
- Financial Impact:some text
- Students lose their money, ranging from minor fees to significant payments.
- Emotional and Psychological Distress:some text
- These kinds of scams can lead to anxiety, depression and loss of confidence in availing the opportunities in future.
- Exposure to Further Scams:some text
- Scammers often share details of their victims with other fraudsters, making students susceptible to repeated scams, including phishing attacks, financial frauds, and unsolicited offers.
5. Preventive Measures
- Verification of Internships:some text
- Always verify the authenticity of the internship by researching the company on official platforms such as LinkedIn, the company’s official website, and through trusted contacts or college placement cells.
- Avoid Upfront Payments:some text
- Employers do not ask for money in exchange for job or internship offers. If they demand for any kind of payment, then the employer is not original. Always question the necessity of such payments and consult trusted advisors before proceeding.
- Use Trusted Job Portals:some text
- Apply for internships through recognized platforms like LinkedIn, Internshala, or your college’s placement cell, which have verification processes to filter out fraudulent postings.
- Reporting Scams:some text
- Report suspicious offers to your college authorities, placement cells, and local cybercrime departments. Additionally, use platforms like Internshala’s “Report This Job” feature to flag fraudulent listings.
- Stay Educated and Updated:some text
- It is important to educate students by providing workshops, webinars, and awareness sessions on cybersecurity to stay informed and report about the latest scams.
6. Conclusion
Internship scams are a severe threat to the student society since they manipulate the student’s desire for an internship. The best ways to prevent such cons are by being cautious and receptive to whatever is being offered. Internship seekers, colleges and the placement cells have to work hand in hand to ensure that there is no fear among people seeking internships.
References
- Smith, J. (2024). Internship Scams on the Rise: How to Spot and Avoid Them. Retrieved from example1.com.
- Brown, A. (2023). Student Internship Scams in India: A Growing Concern. Retrieved from example2.com.
- Johnson, L. (2024). How to Protect Yourself from Fake Internship Offers. Retrieved from example3.com.
- Gupta, R. (2024). Social Media and the Rise of Job Scams. Retrieved from example4.com.