990 likes | 1k Views
Like millions of others, you may be the victim of cell phone abuse. Cell phone abuse disrupts concentration, conversations, and peaceful moments. Learn about the different forms of cyber crime and how to protect yourself from it.
E N D
MOBILE ABUSE A Real Friend but ……. inconsiderate, annoying discourteous and stupid in public places
Mobile Abuse • Like millions of others, you may be the victim of cell phone abuse. • What is cell phone abuse?
Imagine ….. You are in a public place trying to concentrate on something or in serious discussion with your friend or enjoying a peaceful moment…… • A stranger 5 to 10 feet away starts talking on his cell phone
Your concentration breaks or your conversation ends or your peaceful moment disturbs……. • Now you are a victim of cell phone abuse.
Cell phone abuse results in • 1. Cyber crime • 2. Invasion of privacy • 3. Health hazards • 4. Social problems • 5.Psychological problems • 6. Financial loss
Cyber crime • Includes traditional activities such as fraud,theft or forgery ,when ever a telecommunication system is involved
Cyber • Cyber-, derived from the Greek word Kubernetes meaning Steersman , is used in the terms cybersex, cybernetics, cyberspace, cyberpunk, cyberhomes and cyberhate, but has been largely surpassed by e-
It is used in the computer or electronic context to denote control of the thing represented by the word it precedes- CYBERCRIME
The various forms of Cyber crime are 1.Internet auction fraud 2. Internet service provider fraud 3. Fraudulent web designing 4. Multilevel marketing fraud 5. Health care fraud 6. Mobile phone fraud
Computer and Mobile network intrusion 1.Password Sniffer Programmes that monitors and record the name and password of network users as they log in 2. Spoofing One computer is electronically' looks like’ another computer to gain access
3. Cyber fraud Stock manipulation, fraudulent business opportunities, web auctions, credit card fraud 4. Cyber stalking Sending harassing or threatening e –mail or unwanted files and obscene messages or images
Cyber stalkers usually target women and children who are inexperience in online activities. Stalkers generally lose interest if they don’t get the reactions they seek
Cyber terrorism Use of computers or mobile phones or programmes in attack against others. It is a form of ‘Info war” Computer sabotage Use of internet to hinder the normal functioning of a computer through the introduction of worms, viruses logic bombs etc
Mail Bombs Software that will instruct a computer to do almost anything so that it will send mails for the tracker Credit card fraud Hacking of credit card pin number to withdraw money Identity theft Theft of one’s identity for criminal use
Phishing • Introduction of Malicious codes into links • Eg. Spoofed Bank web sites Pharming Programme that direct the user to another Mocked link
How to escape • Stay anonymous- choose a genderless name 2. Never give name or full address to strangers 3. Don’t respond to harassing or negative messages 4. Avoid uncomfortable situation quickly
5. Watch what you say- don’t flirt online 6. Learn more about internet privacy 7. Don’t give email ID to strangers 8. Frequently change your password and answer to the ‘secret question’ 9. Don’t disclose your password to any one, not even to your friends 10. Don’t hesitate in filing a complaint with the police if there is any cyber fraud
IT Act 2008 • Computer Related Offences • If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.
IT Act Section 66 A • Punishment for sending offensive messages through communication service, etc. • any electronic mail or electronic mail messagefor the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages.
IT Act Section 66 E • Punishment for violation of privacy. • Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
IT Act Section 67 • Punishment for publishing or transmitting obscene material in electronic form • Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons.
CELL PHONES • Perry Long invented First Cell phone in 1940. • The first fully automatic mobile phone system, called MTA (Mobile Telephone system A), was developed by Ericsson and commercially released in Sweden in 1956
Mobile Phone The Global System for Mobile Communication (GSM) and the Code Division Multiple Access (CDMA) Systems are digital mobile phone services.
The system consist of a Base station antenna which communicates with the mobile phones through Radio Frequency (RF) transmission.
The mobile phone system is referred to as “cellular telephone system because the coverage area is divided into “cells “each of which has a base station antenna.
Mobile phones use Electromagnetic radiation in the Microwave range around 2.5 GHz
When we talk on mobile phones, the transmitter takes the sound and encodes on to a continuous “sine wave”. The sine wave radiates out from the antenna and fluctuates evenly through space.
Once the encoded sound has been placed on the sine wave, the transmitter sends the signal to the antenna which then sends the signal out.
The encoded signals are made up of electromagnetic radiations. These waves are picked up by the receiver in the base station tower. The base station antenna emits radiations continuously to make a link with the subscribers.
GSM & CDMA Phones • GSM (Global System for Mobile communications: is the most popular standard for mobile phones in the world. • Code Division Multiple Access (CDMA) is a channel access method utilized by various radio communication technologies.
GPS Phone • A GPS navigation device is any device that receives Global Positioning System (GPS) signals for the purpose of determining the present location. These devices are used in military, aviation, marine and consumer product applications.
Smart Phone • A smartphone is a mobile phone offering advanced capabilities, often with PC-like functionality. • a smartphone is simply a phone with advanced features like e-mail, Internet and e-book reader capabilities
SIM • Subscriber Identification Module (SIM) • The SIM is a detachable smart card containing the user's subscription information and phone book.
This allows the user to retain his or her information after switching handsets. • Alternatively, the user can also change operators while retaining the handset simply by changing the SIM.
SIM • Securely stores the service subscriber key having 15 digits • First 3 digits – Mobile country code • Second 2 digits – Mobile network code • Third 10 digits – Mobile station identification number
EV DO • EV-DO (Evolution-Data Optimized), often abbreviated as EV-DO or EV, is a telecommunications standard for the wireless transmission of data through radio signals, typically for broadband Internet access.
Mobile Phone Terminology • URL – Universal Resource Locator • iPod – intelligent Portable occular device • MPEG – Moving Picture Expert Group • MP3 – Moving Picture – 3( Audio layer 3) • Wi-Fi – Brand name of Wi-Fi Alliance-WLAN • Blue tooth – Open wireless protocol
GPS – Global Positioning System • GPRS – General Packet Radio Service - Blackberry system VoIP Phone – Voice over Internet Protocol Most common type is Skype
Symptoms of Mobile abuse • Inability to concentrate on what you are doing 2. Mild or severe irritability or annoyance 3. Sensitivity to stupid ring tones 4. Initially thinking that the cell phone user is actually talking to you
5. Wishing the user would finish the call 6. Wishing the user would leave the place 7. Wishing that the battery would die
HEALTH HAZARDS Mobile phones uses electromagnetic radiation in the microwave range Part of the radio wave emitted by the mobile phone handset will be absorbed by the head The radiation from a standard GSM handset has a peak output power of 2watts