Wednesday, December 14, 2022

Deception Prevention Management

"Watch out that no one deceives you." WatchWord of Deception Management Deception Management (c) a new sub discipline innovated by me will save innocent gullible public of billions of dollars/ rupees and save lives of victims of trafficking and other net based crimes . My paper in this context highlights the ease of deceiving people through the use of UPI These days in addition to Perception Management we need Deception Management (c) going by the number of organisations and individuals out to con the gullible public of their hard earned lifetime savings. First principle of Deception Management is to disbelieve completely any claim or promise of exaggerated ROI or rate of return on investment Second principle of Deception Management is never take a cell call without identifying the person or agency at other end . Most of the masters of deception make calls posing as someone else like your bank reps etc Third principle of Deception Management: Never let others know when you are buying or selling property or run into some windfall profits for then it will trigger the vultures to prey on you to take some or all of it from you Fourth principle of Deception Management: most deceivers find technology a great enabler for it enables immunity through anonymity of a faceless website or page. Never invest in anything without knowing who is the person or persons promoting a particular scheme Fifth principle of Deception Management: Never share your confidential information like bank account numbers, passwords, PIN numbers, OTP with anyone . Sixth principle of Deception Management is never take anyone on face value on Facebook or online media- the person posing as a woman may be a predatory man or vice versa. His location may be next door while he claims he is in Singapore or New York . He may claim to be running an enterprise while the only business he is doing is deception and cheating . Seventh principle of Deception Management is that fraudsters play on the greed factor of the investing public and in the guise of pandering to it , dupe the latter . Hence, we need to control our own appetite for excessive profit. The eighth rule of Deception Management is to check the online webprint and reputation of persons and organisations before having any truck with them. Once a doctor came with an associate to canvas for a Hong Kong based investment scheme, when the online webprint was checked it immediately threw up negative feedback about it being a massive fraud from different parts of the globe. A world bank auditor wept saying he did not check the antecedents of an IIT IIM alumnus ‘s scheme on Google and as a result lost two crores of his hard earned savings. People check for their ailments on Google before taking their doctor’s advice but rarely check the online reputation of persons and schemes. The ninth principle of Deception Management is to always keep your gpay or UPI linked bank account with whatever you think is the minimal or maximum balance that you think you would need every month. Keep another account preferably with another bank with your entire deposits and savings but not linked with gpay or UPI The tenth principle of Deception Management is that usually the fraudster gets introduced to a victim by a close friend or family member whom he/ she trusts and the latter may knowingly or unwittingly introduce such a con artist . Hence one should be wary even of the advice of our kith and kin and inner circle . The eleventh rule of Deception Management is that any scheme that offers free products or services is suspect. What is offered as free is a bait to hook the unsuspecting into some nefarious scheme where he / she stands to lose a lot more The twelfth principle of Deception Management (c) is that the deceivers are always innovating faster and smarter and are always devising new ways of duping the less tech savvy members of the public. Jhamtara in Jharkhand has schools to train fraudsters and every day they do phishing crimes across the country to the tune of crores of rupees. They have our personal data like bank account numbers and cell numbers. They clone sim numbers and take control of bank accounts siphoning off money in seconds through UPI to credit fake accounts from which they withdraw the credited funds. The criminals call on the pretext of completing bank KYC and get people to share their OTP . To prevent this type of phishing fraud, never believe anyone saying they are calling from the bank or any other organisation to complete their KYC . Never ever share your OTP with others on Today’s criminals follow this rule : don’t give a hungry man a fish, teach him phishing. (c) Thirteenth Principle of Deception Management (c) Let not one guilty fraudster escape and let not one gullible citizen be defrauded. Other related original concept : KYc Know Your Criminal Fifteenth aspect of Deception Management is that we should detect tell tale signs left by fraudsters like office addresses close to authorities like Central Bank of the country eg RBI , lots of factual and spelling errors. Proximity to authorities is sought to be demonstrated to show the legitimacy of operations. Errors creep in due to lack of care as well as knowledge gaps of criminals . 16 th rule of Deception Management 1)Never take telephone numbers from a Google Search. Take the numbers only from a verified company website. Lots of phishers pose as if their number is that of some service provider for maintenance or repair of domestic equipment like refrigerators, filters etc They then ask the unsuspecting customer to enter their details on an online form as if to register complaint. 17 th Rule of Deception Management Never install any "service app" given to you by a "service agent" over the phone. It is probably a keylogger through which every key stroke is collected by the scammer or a tool through which he can access your files. Only follow links to service apps directly from the verified company website. 18 th rule Don’t enter any payment related website - Amazon, Bank, Booking.com etc while a service app is in use. 19th rule Learn in advance how to uninstall an app in a hurry, and block a credit card in an even greater hurry, keep a set of emergency instructions (how to change passwords etc) pinned to your desk in case needed. 20 th rule of Deception Management Once you make a payment inadvertently or on purpose on a dubious site , change your credit card immediately to prevent further unauthorised debits Password Security In today’s cyber world where everything is virtual and digital guard your passwords like your life 21st Rule of Deception Management is that one should ensure password security by choosing an alphanumeric with special character password, change it periodically as password hackers use AI and latest technology to hack our accounts. Storage of passwords should also be in a digital locker. Password and Pins should be entered with no one doing shoulder surfing to copy it later. 22nd Rule of Deception Management There are no free lunches : whenever you receive a mail or message saying you are to be the beneficiary of a financial bonanza from the widow of a rich man or a banker who has benefitted from a legacy or embezzlement, you can be certain it is a fraud and immediately delete and block the sender . 23rd rule of Deception Management Fraudsters use a missed call, sms or a game app to collect our financial details and then secrete away funds Case study : Just by Giving Blank Calls; Here's How One of the Biggest Frauds in Delhi Happened n one of the biggest online frauds in Delhi, a director of a security services firm was duped of Rs. 50 lakh via a fraudulent transfer from his bank account 24 th Rule of Deception Management: Fraudsters use a female voice online to entice potential victims like lonely elderly but otherwise respectable males to respond to sexting and exchanging videos and then resort to blackmail to extort large sums of money to various accounts. Eg the most recent case of a 65 year old US professor who fell in the trap of sexting with such a gang of fraudsters. Youngsters are also vulnerable to such frauds through what is overtly dating sites 25 th rule of Deception Management is to never use an unsecured or publicly accessed wifi connection to transact from your bank account as lurking criminals can harvest the password and other details to siphon off funds. 26 th Rule of Deception Management: Handle and swipe your credit or debit cards your self and do not hand over to anyone even for a short while for billing as it is enough time to take a copy of the CVV number etc 27th Rule Always install an up to date anti virus software on your devices. Off and on run a scanner to check if any spyware is sitting on your system 28 th rule of Deception Management: be aware and beware of new types of scams like crypto, FEX trading online related,online games like rummy are meant to rip off the gullible of their capital. All these scamsters will claim that approval of regulatory authorities have been obtained to get credibility 29th Rule of Deception Prevention Management: Whenever the person or organisation asks for a large sum of money to process a claim or to lend a much bigger loan, you can presume it is an attempt to defraud you. Came across a firm that obtained from a builder a cheque running into a crore and a half towards first year interest for a huge loan of several crores. The loan amount was never given while they encashed the “ interest cheque”. 30 th Principle of Deception Prevention Management is never pay money for job offers. If there is a precondition to pay a sum of money to an agent or firm to secure a job in the domestic or overseas market, then it is a scam. 31st Rule of Deception Prevention Management: Check periodically and monitor your bank accounts, personal and organisational as many frauds are committed with either direct involvement of bank personnel or connivance 32nd rule of Deception Prevention Management: Whenever you access a website check if it is secured indicated by url starting with https// instead of just http// Many phishing sites create a verisimilitude duplicate of your regular bank or service provider to get your account details and passwords etc Appearance can be deceptive - hence, always double check if the site you think is your service provider is the authentic one or not . 33rd rule of DPM : Don’t be concerned only about unauthorised debits but flag unknown credits of small amounts to your account as these are meant to verify your identity and the correctness of your bank details available with phisher at a remote location. 34 th Rule of Deception Prevention Management : Be aware that the number displayed on the Caller ID may be false or a site URL is not authentic as due to spoofing, fraudsters are able to mask the real number or site URL. 35 th rule of Deception Management is never post sensitive personal information on social media as it will attract attention of different types of fraudsters and predators. Choose your privacy settings. 36 th Rule of Deception Prevention Management: Everyone who claims to be someone may be hiding behind a stolen identity. Fraudsters often use fake or stolen identities of really well known stock brokers, investors to win the trust of potential victims. 37th Rule of Deception Prevention Management: Most of the fraudsters gather vital financial information from our own activities on auction sites, online shopping, second hand goods offer for sales or offering something we desire at a bargain price to bait us. If engagement on such sites are a compulsion use an email I’d and bank account number that is not your main id or account and keep limited funds in it. 38th Principle of Deception Prevention Management is to keep a physical copy of receipts of deposits and share or other investments. There are instances of agents and companies diverting dematted shares and other instruments by deception. Legal heirs also need to see some physical copies or else how will they know of the investments if only held online and protected by secret passcodes. 39th Rule of Deception Prevention Management : many porn sites are disguised phishing sites to mine your financial information. Hence avoid it like the plague for your psychological, emotional as well as financial being

Thursday, February 25, 2010

Icons who con

Icons are rightly called icons as they start with a belief," I can"and when in time they end up as "I-cons", they start conningthemselves and the rest of the world. The greatness in every human being is not being explored byone and all because of the blinding adulation of modern day Icons inevery field from Obama to Woods. Woods for instance had his iron intoo many fires, and was putting in greens and blondes, to use agolfing expression. Unless, the image of these icons are destroyed inthe common man's psyche, we will not wake up to the latent greatnessthat lies in each of us. A few icons like our own Sachin do hold uptheir end but these are more the exception than the rule. Most of themprove that they not only have feet of clay but libidos and minds ofclay. True it is cynicism but realistic cynicism meant to liberate thecommon man from the modern opium of the masses.




"Topper syndrome" or icon syndrome ensures that the graph of human performance is highly skewed with just one or a few people at the top of the graph with most struggling on the slope up and many sliding down the other side- While we can never have a completely flat curve, taking our focus off icons and focussing on our own inner greatness or potential as you would prefer to call it and save us the disappointment and disillusionment or deception of millions and it will ensure a less skewed distribution of human excellence as well as wealth. Building on the foundation of one over-invested skill or attribute is in fact what leads to the toppling of the icon. It was interesting to see the conception of the early Tamil thinker's 133 feet statue at Kanyakumari- the sculptor has built the statue on a solid base 38 feet high and the remaining 95 feet of the person of Thiruvalluvar occupies the space above. The sculptor's concept coincides with the division of the Thirukurral into three sections, Virtue, Wealth and Pleasure with the solid base or foundation or pedestal coinciding with Ethics or Virtue and atop that is built the sections comprising Wealth and Pleasure embodied in the body of the thinker. My thesis is Value is Competence and my argument is that very often these so called icons have attributes or achievements far beyond their competence or the ability to handle it.