{"id":72111,"date":"2024-01-04T19:24:12","date_gmt":"2024-01-04T13:54:12","guid":{"rendered":"https:\/\/pwonlyias.com\/stage\/?post_type=editorial-analysis&#038;p=72111"},"modified":"2024-01-05T18:33:13","modified_gmt":"2024-01-05T13:03:13","slug":"cyber-kidnapping","status":"publish","type":"editorial-analysis","link":"https:\/\/pwonlyias.com\/stage\/editorial-analysis\/cyber-kidnapping","title":{"rendered":"Cyber Kidnapping- Challenges and Required Actions"},"content":{"rendered":"<p><b>Context:<\/b> <span style=\"font-weight: 400;\">This editorial is based on the news \u201c<\/span><a href=\"https:\/\/indianexpress.com\/article\/explained\/everyday-explainers\/chinese-boy-utah-what-is-cyber-kidnapping-9093917\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Chinese boy \u2018cyber kidnapped\u2019 in Utah found safe: What is cyber kidnapping, how to protect yourself<\/span><\/a><span style=\"font-weight: 400;\">\u201d<\/span> <span style=\"font-weight: 400;\">which was published in the Indian Express.<\/span><span style=\"font-weight: 400;\"> This article is highlighting the <\/span><b>emerging challenge of \u2018cyber kidnapping\u2019. <\/b><span style=\"font-weight: 400;\">Recently, a Chinese student faced the threat of \u2018cyber kidnapping\u2019. By the time the police traced him, his parents back in China had paid $80,000 in ransom.<\/span><\/p>\n<table style=\"width: 100.301%;\">\n<tbody>\n<tr>\n<th style=\"width: 100%; border-style: solid; border-color: #000000; background-color: rgba(184, 165, 217, 0.53); text-align: left; vertical-align: middle;\"><span style=\"color: #000000;\"><b>Relevancy for Prelims<\/b><span style=\"font-weight: 400;\">: <\/span><a style=\"color: #000000;\" href=\"https:\/\/pwonlyias.com\/stage\/editorial-analysis\/growing-cyber-crime-in-india\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">NCRB Data On Cyber Crime In India<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a style=\"color: #000000;\" href=\"https:\/\/pwonlyias.com\/stage\/current-affairs\/gpai-summit\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Global Partnership On Artificial Intelligence &#8211; GPAI<\/span><\/a><span style=\"font-weight: 400;\">, and <\/span><a style=\"color: #000000;\" href=\"https:\/\/pwonlyias.com\/stage\/current-affairs\/deepfake-technology\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Deep Fakes<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><b>Relevancy for Mains:<\/b><span style=\"font-weight: 400;\"> Cyber Kidnapping- Challenges and Required Actions.<\/span><\/span><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span style=\"font-size: 24pt;\"><b>What is Cyber Kidnapping?<\/b><\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Definition: <\/b><span style=\"font-weight: 400;\">It refers to a crime where the<\/span><b> \u2018kidnappers\u2019 convince their victims to hide,<\/b><span style=\"font-weight: 400;\"> and then <\/span><b>contact their loved ones for ransom. <\/b><span style=\"font-weight: 400;\">The kidnappers monitor victims online through video-call platforms.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The <\/span><b>victims are also made to send pictures<\/b><span style=\"font-weight: 400;\"> that make it look like they are being held captive, which are then shared with their family and make them realize that their loved ones will be harmed if they do not do as the kidnappers ask.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>An Extortion Scheme:<\/b><span style=\"font-weight: 400;\"> It tricks victims into paying a ransom to free a loved one they believe is being threatened with violence or death.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Statistics: <\/b><span style=\"font-weight: 400;\">While there is no clear data yet on how many such crimes occur each year, law enforcement experts say they are on the rise.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Role of Artificial Intelligence (AI):<\/b><span style=\"font-weight: 400;\"> Experts believe that with the rise of AI, such crimes can rise, as scammers can send people voice notes that sound exactly like a loved one in distress.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-size: 24pt;\"><b>How to Protect Yourself from <\/b><b>Cyber Kidnapping?<\/b><b> &#8211; Suggestions by Experts<\/b><\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Being extra careful with calls from unknown numbers.<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Careful while sharing data<\/b> <b>on social media<\/b><span style=\"font-weight: 400;\"> as scammers can use that data for cyber kidnapping.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Need to to verify the location of your loved ones<\/b><span style=\"font-weight: 400;\"> before making payments, and to approach the police.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-size: 24pt;\"><b>The Path Ahead: To Curb Cyber Kidnapping<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">With the <\/span><b>advancement of technologies, associated threats are also advancing, <\/b><span style=\"font-weight: 400;\">which needs to be tackled at every level wherever possible like to tackle cyber kidnapping:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Action at Individual and Community Level:<\/b><span style=\"font-weight: 400;\"> Families can come up with phrases or code words that perpetrators would not be aware of.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">People should be aware of how their <\/span><b>personal information <\/b><span style=\"font-weight: 400;\">is public and <\/span><b>remain vigilant.<\/b><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Action at Organization Level: <\/b><span style=\"font-weight: 400;\">Law enforcement agencies and telecommunications companies must take <\/span><b>stringent measures<\/b><span style=\"font-weight: 400;\"> against such calls and messages.<\/span><\/li>\n<\/ul>\n<table style=\"width: 100.4%;\">\n<tbody>\n<tr>\n<th style=\"width: 100%; border-style: solid; border-color: #000000; background-color: rgba(184, 165, 217, 0.53); text-align: left; vertical-align: middle;\"><span style=\"color: #000000;\"><b>Mains Question: <\/b><a style=\"color: #000000;\" href=\"https:\/\/pwonlyias.com\/stage\/mains-answer-writing\/what-is-cyber-kidnapping-evaluate-the-measures-needed-to-combat-this-transnational-cybercrime-effectively-15-marks-250-words\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What is Cyber Kidnapping ? Evaluate the measures needed to combat this transnational cybercrime effectively.<\/span><\/a><span style=\"font-weight: 400;\"> (15 marks, 250 words)<\/span><\/span><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<table style=\"width: 100.135%;\">\n<tbody>\n<tr>\n<td style=\"width: 208.117%;\" colspan=\"2\">\n<p style=\"text-align: center;\"><b>Must Read<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 46.6527%;\"><a href=\"https:\/\/pwonlyias.com\/stage\/ncert-notes\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">NCERT Notes For UPSC<\/span><\/a><\/td>\n<td style=\"width: 161.464%;\"><a href=\"https:\/\/pwonlyias.com\/stage\/daily-current-affairs\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">UPSC Daily Current Affairs<\/span><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 46.6527%;\"><a href=\"https:\/\/pwonlyias.com\/stage\/blogs\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">UPSC Blogs<\/span><\/a><\/td>\n<td style=\"width: 161.464%;\"><a href=\"https:\/\/pwonlyias.com\/stage\/editorial-analysis\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">UPSC Daily Editorials<\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber kidnapping refers to a crime where the \u2018kidnappers\u2019 convince their victims to hide, and then contact their loved ones for ransom. <\/p>\n","protected":false},"author":11,"featured_media":72512,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"tags":[],"paper-wise":[],"subject":[],"acf":[],"_links":{"self":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/editorial-analysis\/72111"}],"collection":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/editorial-analysis"}],"about":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/types\/editorial-analysis"}],"author":[{"embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/comments?post=72111"}],"version-history":[{"count":4,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/editorial-analysis\/72111\/revisions"}],"predecessor-version":[{"id":72265,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/editorial-analysis\/72111\/revisions\/72265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/media\/72512"}],"wp:attachment":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/media?parent=72111"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/tags?post=72111"},{"taxonomy":"paper-wise","embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/paper-wise?post=72111"},{"taxonomy":"subject","embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/subject?post=72111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}