Know how they execute digital arrest so you can beat them at their game

 Know how they execute digital arrest so you can beat them at their game

Courtesy Rajshekhar Jha @timesofindia.com

When law enforcement officers recently busted a digital arrest module, they were left aghast at the number of victims they had trapped. A single module had a list of more than 5,000 people. They found similar modules bustled by other agencies.

A ‘digital arrest’ scam entails deceiving internet users to extract their financial and personal data. Have you ever heard about someone who was asked to keep his mobile switched off for hours after being threatened by law enforcement? Did they act as though they had no way out? Then it’s likely they were caught in the web of digital arrest fraud.

Investigation has shown that the scammers employ sophisticated techniques and soft threats to ensure even the most cautious individual becomes ensnared every step of the way from step one. They almost always begin with a threat to install fear and panic.

An officer from Delhi Police’s cyber cell officer explained, “The communication strategy is carefully planned. The target’s vulnerabilities, such as fear of police, are exploited by them, making these speeches even more effective at extracting money and information from unsuspecting individuals.”

The scammers know exactly who they are targeting. They employ a range of tactics to obtain the sensitive data of their customers, particularly targeting the elderly who are more vulnerable. They often use social engineering techniques, such as phishing emails or calls, to trick people into divulging their information. Scammers also exploit stolen identities or leaks from financial institutions, online marketplaces, or darkweb forums to obtain data. In many cases, they even collude with corrupt insiders, such as employees or contractors, who are bribed or coerced into sharing sensitive confidential data, such as customer numbers, balance and bank information.

The gangs use “mule accounts” or “accounts-for-hire” to receive and transfer funds from their victims. These accounts are typically opened by unsuspecting individuals or accomplices who are bribed or coerced into allowing the scammers to use them. Once they receive money from victims, it is transferred into these accounts, making it difficult for law enforcement agencies to track the trail. Using these accounts, the scammers aim to shield themselves from financial transactions, making it difficult for investigators to identify and prosecute them.

To acquire “mule accounts”, the crooks often recruit unsuspecting people using online job postings or social media ads, asking for easy money or legitimate work-from-home schemes, sources said. “These people are then convinced to allow the scammers to use their bank accounts for what they believe are legitimate transactions. In some cases, the scammers may also use coercion, threats or blackmail to obtain control of an account,” said a senior officer. Scammers also buy or rent bulk SIM cards from organised crime groups or people involved in illicit activities.

The continuing use of SIM cards bought on fake documents has also helped the fraudsters. They use these bulk SIM cards to make their calls appear legitimate and avoid detection by using one SIM card per target, said an officer. Crooks exploit vulnerabilities in the system to obtain bulk SIM cards. The bigger module lies acquiring them in bulk using their contacts in telecom firms. Many a times, retail sellers have been found to be selling bulk SIM cards to crooks at discounted rates with no proper verification. “Fake identities are also created to buy bulk SIM cards from telecom operators or authorised retailers. Additionally, the identities used to obtain the identification to get the bulk SIM cards sometimes belong to unknown third parties,” including dark marketplaces, including dark net platforms where bulk SIM cards are sold and the details of people used to obtain them, ultimately aiding digital scammers,” said the cyber cell cop.

Officers also said they had been working with banks to flag suspicious transactions, once flagged by police, trigger an advanced special protocol to prevent free transactions. Investigators then analyze and profile it to identify the flow of money from the victim’s account to the scammer’s account, enabling them to prevent further transactions.


WHY IT’S TOUGH TO STOP FREE RUN OF SCAMMERS

  1. Sophisticated tactics and technology, such as VoIP calls and spoofed numbers, make it difficult to track scammers.

  2. Digital arrest kingpins often operate from outside India’s borders, making it difficult for law enforcement agencies to track or prosecute them.

  3. Anonymity and encryption, such as cryptocurrencies, conceal scammers’ identities and transactions, making it hard to gather evidence.

  4. Lack of awareness and education among victims, especially senior citizens, makes them more susceptible.

  5. The sheer volume of scams overwhelms law enforcement agencies, making it difficult to investigate and prosecute each case effectively.


SCAMMERS’ WEAPONS

  • Insider links with banks
    Scammers may have connections with bank insiders who provide them with sensitive information, such as KYC records of pensioners or elderly people.

  • Access to personal data
    Scammers obtain personal data from sources such as ad names, addresses, phone numbers, from various sources, including data breaches or illegal data markets on dark web.

  • Mule accounts
    Scammers use mule accounts, which are bank accounts controlled by unsuspecting individuals or accomplices, to receive and transfer funds from victims, making it difficult to trace the money trail.

  • Social engineering tactics
    Scammers use psychological manipulation and social engineering tactics to build trust with their victims, making them more likely to divulge their information or comply with their demands.

  • Roleplay scenarios
    Scammers work in networks, with different individuals playing different roles, such as making calls, receiving payments, or providing technical support, making it harder to track and catch them.


Comments

Popular posts from this blog

CPC Pay Matrix for IIT, IIS, IIM, NITIE, IISER, NIT and IIIT7th CPC Pay Revision for Faculty and Scientific and Design Staff in Cen 7th trally Funded Technical Institutions (CRTI