हिमाचल में साइबर फ्रॉड के मामले बढ़ते जा रहा हैं. आंकड़ों को देखें तो हर साल हजारों लोग ठगी का शिकार हो रहे हैं.
Category
🗞
NewsTranscript
00:00।
00:04।
00:06।
00:20।
00:24।
00:28।
00:29How can we protect our smart phones and bank balance?
00:36Our cybercrime, D.I.G. Mohi Chawla Ji is there.
00:39We will understand that the new ways we are being frauded.
00:44How can we protect it?
00:47Thank you, Shriya Ji and all your viewers from the ETV,
00:50Shimla Police and Himachal Police.
00:54First question, how many cybercrime cases are in 2025?
01:00Shriya Ji, we need to understand this.
01:04Post-COVID, there are many services and platforms like this.
01:09Not only in private sector, but in our state's digital platforms.
01:16We need to experience it in the digital space.
01:22We need to see it.
01:23You need to know your telephone, electricity bill,
01:26call your children and schools.
01:29You need to know your train, your taxi, your banking.
01:35When you engage in any domain,
01:38you have to come to the digital platform.
01:39One has to understand.
01:41Himachal is the second largest in the country
01:45to have the highest penetration in terms of mobile services
01:48and internet services.
01:50As many services will grow,
01:52there will be more of the threat of the criminal perpetrators.
01:57We are seeing this experience in the whole wish.
02:00We are seeing this whole wish.
02:01We are seeing this whole wish.
02:02We are seeing this whole wish.
02:04If we just want to talk about cyber station and cyber WVSt.
02:11Hemachal citizens to become secure in order to make it
02:12in 3 cyber stations and police stations and ranges.
02:15We have integrated with them in our cyber station.
02:19Which is integrated by the I4C MHA in the third place.
02:22When a citizen will give us a complaint immediately, he will immediately log in and log in, they will get an acknowledgement number
02:34and the car by real-time basis is being recorded
02:37Let's talk about volume and traffic
02:41We have experienced the 201930 data center, there is a daily average calling
02:52In 2023-2024, we have reached the end of the 24-300.
02:57In 2025, we have about 75-500 calls every day
03:04No doubt, we have about 40% calling for information, inquiries, or small instances for sharing
03:12But in our case, we have reached the end of the year
03:15When people don't understand, they will go to cyber fraud
03:21If we want to talk about it, last year, 114 crores
03:25which is the main threat of the human being
03:28The government is now reported
03:32This year, it will be expected to increase
03:34But, the UNRibleCEM was in October
03:37The UNRibleCEM was integrated into the cyber station 1
03:41The UNRibleCEM was here
03:43And the UNRibleCEM was here
03:44That is why people also have a big trust for the UNRibleCEM
03:46They have a big trust for the UNRibleCEM
03:48They have a one-stop solution for the UNRibleCEM
03:50They are available in the UNRibleCEM
03:52They can always call us, even if there is a problem or a bad crime that we can report about it.
03:58Yes sir, if we talk about 2025, what is the common fraud pattern?
04:04Absolutely, 72% or 74% of these are financial frauds,
04:10which are called stock, investment, telegram platform or whatsapp platform.
04:16One has to understand that in a computer terminology, we call cookies.
04:22Whenever we look on mobile, Facebook, social media or Google or Chrome,
04:28we note cookies.
04:30So, these perpetrators look at cookies, where is flowing.
04:34You think you have seen some investment platform on Facebook.
04:38So, this is what they know that they are looking at this platform.
04:42So, this is why we say that we have to keep our devices.
04:46Coming back to the figures,
04:4872-74% of financial frauds are reported.
04:52And there are 18% of social media frauds,
04:56like Instagram or Facebook,
04:58or cyber-stalking.
05:00Now, when we talk about our last month,
05:02when we were looking at our wishlist,
05:0470% or 71% of our victims are male.
05:10There are 24-25% of our victims,
05:13and there are 72% of children.
05:17And we talk about daily calls,
05:20we have 15-20 calls every day.
05:22So, this is our data center,
05:23and we also talk about children.
05:24Children are below 18.
05:26Now, there are schools,
05:27and colleges,
05:28and colleges.
05:29They have awareness that,
05:30sir, we have cyber-stalking.
05:31Here, a child is following a follow-up on social media platform.
05:35So, we are trying to help them.
05:37Sir, today,
05:38we are seeing that AI has become a lot of people.
05:41So, in the minds of people,
05:42there is also a question,
05:43that the cyber-thug is also doing AI?
05:45You see,
05:46now,
05:47in English,
05:48there is a tip of an iceberg.
05:49We have seen a lot of things in English.
05:51AI is a different domain.
05:53I keep saying that AI is not a future,
05:56but AI is present.
05:58Today,
05:59we are trying to engage our cyber-commandos
06:01to our cyber-commandos.
06:03When we talk about AI,
06:05deep-fakes,
06:06generative AI,
06:08your voice on social media,
06:10your photographs,
06:12your family pictures,
06:14they can generate,
06:15AI can self-generate,
06:17who-who-who-vaisy pictures.
06:19We see daily basis,
06:21mahan-hastiyon,
06:23ahtiyasik-hastiyon,
06:25film stars,
06:26bollywood, hollywood stars,
06:27videos,
06:28so,
06:29this is why we need to have
06:30a better understanding.
06:31Our new knowledge,
06:33which we share the platforms,
06:35we need to know the terms,
06:37we need to know the terms,
06:39we need to know the platforms,
06:41and the security features required,
06:43we need to know that.
06:44I always want to know this simple example,
06:46to our viewers,
06:47that your physical presence is virtual presence.
06:51Please understand.
06:52It's like,
06:53your identity,
06:54your perpetrators are knocking on your house.
06:56If you have locked on the door,
06:58then it will not be able to have it.
07:00So,
07:01we need to know that.
07:02We need to know that
07:03our devices,
07:04our computers,
07:05our systems,
07:06our networks,
07:07our mobiles,
07:08what safety and security are ensured.
07:09This is our goal.
07:10And,
07:11the applications,
07:12UPI payments,
07:14financial applications,
07:15investment applications,
07:16insurance policy,
07:18car insurance policy,
07:19medical policy,
07:20even tickets,
07:21or e-commerce platforms
07:23are going to be the same.
07:24So,
07:25our personal information,
07:26and to share the terms,
07:27our personal knowledge,
07:28and to be able to maintain
07:29and to be able to maintain
07:30their personal knowledge.
07:31My last question,
07:32how do you keep your social media
07:33and your smartphone
07:34and social media?
07:35How do you keep your personal tips
07:36and give us personal knowledge?
07:37As a police officer,
07:38we do not have social media
07:39as a police officer.
07:40We do not have social media.
07:41We do not have social media
07:42as a police officer.
07:43We do not have social media.
07:44We do not have social media
07:45as a different platforms.
07:46People share the information
07:47and share the information
07:48that you feel.
07:49But,
07:50you have your physical identity.
07:51In today's time,
07:52I have my wallet
07:53that is a physical wallet.
07:54But,
07:55our people,
07:56the financial assets
07:58are in cyber space.
08:00You are going to the bank.
08:01You are going to the bank.
08:02Everything is on the click.
08:04You are not going to share market.
08:05You are operating here.
08:06You are operating here.
08:07Even you have gold
08:08and you invest in properties.
08:09You are investing in cyber space.
08:12So,
08:13you must understand
08:14that,
08:15your physical assets
08:16are very important
08:18for cyber
08:19and your platform
08:21and where I am talking about
08:23my identity
08:24is important
08:26in social media
08:27or in different platforms.
08:29Because,
08:30the cases are in identity theft.
08:31You are taking a photo
08:32and a girl's photo
08:34and a girl's photo
08:35of a person's photo
08:36and a girl's photo
08:37will be removed.
08:38They are removed.
08:39They are given pictures
08:40to their family.
08:41They are given photos.
08:42I am aware of that.
08:44I have two important tips
08:46to give you.
08:47If you like
08:48that you have some cyber crime
08:49or not,
08:50it is not your fault.
08:51You are a victim.
08:52Right?
08:53We are approaching
08:55the other
08:56It is a very subtle number, 1930, I repeat, 1930, this is a pan-India number, and all the state police, district police, police stations, even with national units are integrated,
09:11this can be very helpful to you, now let us report. Thank you.