Assignment On Tech Abuse

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Certified Cyber Crime Intervention Officer-Jun 23

Assignment on Tech Abuse

1. Research about the case of Justine Sacco. Write a 300word summary of the
incident and what user think about the case.
Justine Sacco became infamous for a highly controversial tweet she posted in December
2013. The public relations executive tweeted a racially insensitive remark that quickly went
viral. The tweet was perceived as offensive, insensitive, and perpetuating racial stereotypes.
Sacco was fired from her position at the media conglomerate IAC, and her online identity
was widely associated with the tweet. The case highlights the power of social media to
rapidly disseminate information and provoke public outrage. Ultimately, the case serves as a
reminder of the need for thoughtful, responsible communication in the digital age. It
highlights the potential consequences of sharing offensive or insensitive content online.

The incident involving Justine Sacco was undeniably a significant social media controversy.
Sacco's tweet was widely condemned for its racially insensitive content, and the subsequent
public backlash led to severe consequences for her personal and professional life. It serves
as a reminder of the power of social media to amplify messages and hold individuals
accountable for their online behavior.

From an ethical standpoint, Sacco's tweet can be seen as offensive and perpetuating harmful
stereotypes. It is important to recognize the negative impact such remarks can have,
particularly on marginalized communities. The swift and widespread condemnation she
faced reflects a societal intolerance for racially insensitive comments and a demand for
accountability.

However, some argue that the magnitude of the public outrage and the subsequent
consequences may have been disproportionate. There are discussions around the nature of
forgiveness and the potential for personal growth and redemption. It raises questions about
whether individuals should be permanently defined by a single misguided comment or
action, or if there is room for education, reflection, and rehabilitation.

Ultimately, the case of Justine Sacco serves as a reminder of the importance of responsible
online behavior and the need to consider the potential consequences of our words in a
digital age. It also highlights the ongoing dialogue surrounding freedom of speech, personal
accountability, and the appropriate balance between condemnation and forgiveness in the
face of offensive or harmful statements.

Reference:

The New York Times, https://www.nytimes.com › 2015/02/15 › magazine

TheWrap, https://www.thewrap.com › case-justine-sacco-twitter-l

Justine Sacco, the PR exec: https://www.vox.com › justine-sacco-iac-match-group

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599


Certified Cyber Crime Intervention Officer-Jun 23
Assignment on Tech Abuse

2. What are the various ways in which the abuser can keep a track of person
online? List all the possible ways.
Here are some potential methods an abuser might employ, although these should not be
used for malicious purposes:

I. Social media monitoring: Abusers can track a person's activities, posts, and
interactions on social media platforms by following their accounts or creating fake
profiles to gather information.
II. Location tracking: Abusers may use location-based services or GPS tracking to
monitor a person's movements, especially if they have access to the person's
smartphone or other connected devices.
III. Keylogging: Keyloggers are malicious software or hardware devices that record
keystrokes on a computer or smartphone, allowing an abuser to monitor everything
the victim types, including passwords, messages, and browsing history.
IV. Phishing and email monitoring: Abusers may use phishing techniques to gain access
to a person's email account, enabling them to monitor incoming and outgoing
messages.
V. Spyware and malware: Malicious software can be installed on a person's device
without their knowledge, allowing an abuser to track their online activities, capture
screenshots, record audio, or access files.
VI. Stalking apps: There are various mobile applications marketed as tools for tracking
the activities of family members, but they can also be used by abusers to monitor
their victims' locations, messages, and call logs.
VII. Wi-Fi snooping: If an abuser gains access to a person's Wi-Fi network, they may be
able to monitor their online activities, such as websites visited and data transmitted.
VIII. Public records and data breaches: Abusers can search public records, such as
property ownership, vehicle registrations, or court records, to gather information
about a person. They may also exploit data breaches to obtain personal information.

It's crucial to take steps to protect user’s online privacy, such as using strong passwords,
enabling two-factor authentication, regularly updating software, being cautious with sharing
personal information online, and utilizing privacy settings on social media platforms. If user
suspect that user are being tracked or monitored online, seek assistance from law
enforcement or a trusted professional who can provide guidance and support.

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599


Certified Cyber Crime Intervention Officer-Jun 23
Assignment on Tech Abuse

3. What are the various ways in which the abuser can keep a track of person
online? List all the possible ways.
To delete user’s location history or web activity history in Gmail, we have to follow these steps:

I. Open user’s web browser and go to the Google Account homepage


(https://myaccount.google.com/).
II. Sign in to user’s Google Account if user haven't already.
III. Once signed in, locate and click on the "Data & personalization" tab from the navigation
menu on the left side of the page.
IV. Scroll down to find the "Activity controls" section and click on the "Web & App Activity"
option.
V. On the next page, user will see a toggle switch. If it's already off (grayed out), it means user’s
web activity history is disabled. If it's on (blue), click on it to turn it off.
VI. A confirmation dialog will appear. Click on "Pause" to confirm and disable user’s web activity
history.
VII. To delete user’s existing web activity history, scroll further down on the same page until user
find the "Delete activity by" option. Click on it.
VIII. In the dialog box that appears, user can select the timeframe for which user want to delete
the data. User can choose to delete activity from the past hour, past day, past week, or select
a custom date range.
IX. Once user have selected the desired timeframe, click on the "Delete" button. A confirmation
prompt will appear.
X. Review the information and click on "Delete" to confirm the deletion. User’s web activity
history within the chosen timeframe will be removed.
XI. Note: The process mentioned above is specifically for web activity history. If user also want
to delete user’s location history, user can find the "Location History" option in the same
"Activity controls" section. Follow similar steps to turn it off or delete user’s location history
if it's enabled.

It's important to remember that disabling or deleting user’s web activity and location history may
affect personalized experiences and recommendations from Google services.

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599


Certified Cyber Crime Intervention Officer-Jun 23
Assignment on Tech Abuse

4. What are the various ways in which the abuser can keep a track of person
online? List all the possible ways.
To enhance user’s privacy on Facebook, user can follow these steps:

a) Access user’s Facebook account and click on the downward-facing arrow in the top
right corner of the page.
b) From the dropdown menu, select "Settings & Privacy" and then click on "Settings."
c) Privacy Settings:
d) In the left-hand sidebar, click on "Privacy" to access the Privacy Settings and Tools.
e) Who Can See User’s Future Posts:
f) Under the "User’s Activity" section, click on "Who can see user’s future posts?"
g) Choose the desired audience from the options provided, such as Friends, Public, or
Custom.
h) Limiting Past Posts Visibility:
i) To limit the visibility of user’s past posts, click on "Limit Past Posts" in the "User’s
Activity" section.
j) A confirmation dialog will appear. Click on "Limit Past Posts" to restrict the visibility
of user’s previous posts to Friends only.
Profile and Tagging Settings:
k) In the Privacy Settings and Tools, click on "Profile and Tagging" in the left-hand
sidebar.
l) Who Can See What Others Post on User’s Profile:
m) Click on "Who can see what others post on user’s profile?"
n) Choose the desired audience from the options provided, such as Friends, Public, or
Custom.
o) Review Tags:
p) Enable the "Review tags people add to user’s posts before the tags appear on
Facebook?" option.
q) This will allow user to review and approve tags before they appear on user’s
timeline.
r) Timeline and Tagging Settings:
s) In the Privacy Settings and Tools, click on "Timeline and Tagging" in the left-hand
sidebar.
t) Who Can Post on User’s Timeline:
u) Click on "Who can post on user’s timeline?"
v) Choose the desired audience from the options provided, such as Friends, Only Me,
or Custom.

Review Posts User're Tagged In:

Enable the "Review posts user're tagged in before the posts appear on user’s timeline?"
option.

This will give user control over the posts user're tagged in before they are visible on user’s
timeline.

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599


Certified Cyber Crime Intervention Officer-Jun 23
Assignment on Tech Abuse

Apps and Websites:

In the Privacy Settings and Tools, click on "Apps and Websites" in the left-hand sidebar.

Manage Future Activity:

Click on "Manage Future Activity."

Choose the desired settings to control whether user’s activity is shared with apps and
websites connected to Facebook.

Privacy Checkup:

To review and adjust additional privacy settings, click on the "Privacy Checkup" option in the
"Privacy Settings and Tools" section.

This interactive tool guides user through various privacy settings and allows user to make
changes based on user’s preferences.

It's important to regularly review and update user’s privacy settings on Facebook to ensure
user have the level of privacy user desires.

5. Find the top 10 applications on mobiles for casual dating.


Please note that the popularity and availability of dating applications may vary depending on
User’s location and the mobile platform a user uses. However, here are ten popular mobile
applications for casual dating that have gained significant popularity globally:

Tinder: Tinder is one of the most well-known dating apps, offering a simple swiping interface
to match with potential partners based on their profile pictures and brief bios.
Bumble: Bumble is a dating app where women make the first move. It allows users to
connect and chat, but only if the woman initiates the conversation within 24 hours of
matching.
OkCupid: OkCupid is a dating app that uses an algorithm to match users based on their
responses to personality questions. It offers a mix of casual and more serious dating options.
Hinge: Hinge focuses on building meaningful connections by emphasizing detailed profiles
and conversation starters based on shared interests.
Plenty of Fish (POF): POF is a dating app that offers both free and premium features,
allowing users to browse and message potential matches.
Grindr: Grindr is a dating app specifically designed for gay, bisexual, trans, and queer
individuals. It focuses on location-based matching and facilitates casual encounters.
HER: HER is a dating and social networking app for queer women and non-binary individuals.
It provides a safe space for LGBTQ+ individuals to connect, date, and build communities.
Coffee Meets Bagel: Coffee Meets Bagel sends curated matches, or "bagels," to users every
day, encouraging more intentional connections and conversations.

Remember to exercise caution and use these dating apps responsibly, ensuring your safety
and well-being when meeting new people.

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599


Certified Cyber Crime Intervention Officer-Jun 23
Assignment on Tech Abuse

6. List 3 news articles on impact of negative comments on people / celebrities


on Twitter or other social media accounts.

Here are a three news articles discussing the effect of negative comments on
people/celebrities on social media:

 Bollywood celebs quit social media over toxicity….


Link: https://bit.ly/465Qhyl
Source: Hindustan Times | ByRishabh Suri, New Delhi
Jun 21, 2020 08:22 PM IST
 7 Negative Effects of social media on People and Users...
Link: https://bit.ly/3CxCB1x
Source: Makeuseof.com, BY BEN STEGNER, UPDATED FEB 22, 2023
 Celebrity Instagram content linked to negative feelings,
Link: https://bit.ly/3qSBlDv
Source: The Economic Times-Tech, By Sheila Dang, ReutersLast Updated: Oct 01,
2021, 10:03 AM IST

7. List top tools available online for spying on phones and computer systems.
The word spy alone screams scandal. In a time where illegal hacking and camera access have
made many IT experts and big entrepreneurs apprehensive, it is quite normal to feel a little
cynical about digital spying.

However, as with everything, the use of phone spying apps can be both ethical and
unethical, depending on an individual’s preferred use.

List of the Best a few Phone Spy Apps

1) mSpy

2) XNSPY

3) SpyBubble

4) Cocospy

5) uMobix

6) Mobilespy.at

7) Hoverwatch

8) eyeZy

9) Spyera

10) FlexiSPY

***Source: https://www.softwaretestinghelp.com/phone-spying-apps/, Updated: June 9, 2023

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599


Certified Cyber Crime Intervention Officer-Jun 23
Assignment on Tech Abuse

8. List recent cases of use of fake images or deepfakes impacting people in real
life.
 A deepfake bot on Telegram that created over 100,000 deepfake nude images of
unsuspecting women, many of whom had their photos stolen from social media
accounts. This case shows how deepfakes can be used for sexual harassment,
blackmail and revenge porn.
 A deepfake voice scam that used machine learning technology to clone the voices of
people to commit financial crimes. In one instance, a UK-based energy firm was
tricked into transferring $243,000 to a Hungarian bank account after receiving a
phone call from someone who sounded like their German boss. This case shows how
deepfakes can be used for fraud and identity theft.
 A deepfake video that showed former US President Barack Obama calling his
successor Donald Trump a "total and complete dipshit". The video was actually
made by comedian Jordan Peele as a public service announcement to warn people
about the dangers of fake news and misinformation. This case shows how deepfakes
can be used for political satire and manipulation.
9. Which country has witnessed most deaths due to selfies? List 5 incidents.
According to a study by researchers from Carnegie Mellon University and Indraprastha Institute
of Information Delhi, India has witnessed the most deaths due to selfies over the past two years,
followed by Russia and the United States. Some of the incidents that occurred in India are:

 In 2015, a man was killed by an elephant while trying to take a selfie with it at a wildlife park in West
Bengal.
 In 2016, three students drowned after slipping into a reservoir while taking a selfie on a boat in
Nagpur.
 In 2017, two teenagers were electrocuted while taking selfies on top of a train in Delhi.
 In 2018, six people died after being hit by a train while posing for selfies on railway tracks in
Karnataka.
 In 2019, four people drowned after falling into a water tank while taking selfies near Hyderabad.

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599


Certified Cyber Crime Intervention Officer-Jun 23
Assignment on Tech Abuse

10.List 5 consequences / risks of sexting.


Some of the consequences or risks of sexting are:

 Sexting can have negative effects on your mental health, such as anxiety, depression, low self-
esteem, shame and guilt. You might feel pressured to sext by your partner or peers, or regret
sending something that you didn’t want to share.
 Sexting can damage your reputation and relationships. If your sexts get leaked or forwarded to
others without your consent, you might face bullying, harassment, blackmail or revenge porn. You
might also lose trust and respect from your family, friends or partner.
 Sexting can expose you to legal risks. Depending on where you live and how old you are, sexting
might be considered a crime if it involves minors (under 18) or non-consensual sharing of intimate
images. You could face charges for producing, possessing or distributing child pornography.
 Sexting can increase your risk of sexual exploitation and abuse. If you send sexts to someone you
don’t know well or trust completely, they might use them to manipulate you into doing things you
don’t want to do. They might also share them with others who could harm you physically or
emotionally.
 Sexting can interfere with your personal and professional goals. If your sexts get exposed online or
offline, they might affect your chances of getting into college, finding a job or pursuing a career. They
might also cause you stress and distraction that could affect your academic performance and well-
being.

Shounak Ray, e-mail: sr.shounak@gmail.com, Mobile: +91 90889 58599

You might also like