Abstract
In 1882, India became the first country in the world to establish telecommunications. Following the introduction of the internet and mobile technologies in India, telecommunications exploded. On August 15, 1995, India's first non-profit mobile phone service was launched. On the same day, the internet was launched in this country. India did not look back after the emancipation and privatisation of this sector; telecommunications seized the lives of Indian inhabitants, and India's telecommunication network quickly became the world's second-biggest.
Introduction
No part of human existence has been left unaffected by communication technology. Even our morning alarm clocks have been phased out in favour of mobile phones. Our mobile phones are continually improving thanks to technological advancements. Mobile phones have evolved into new personal laptops and desktops, capable of storing the same amount of data as our laptops and desktops while also giving flexibility and portability. Smartphones, tablets, and other Internet-enabled devices are fulfilling the activities of our computers, but one critical component is missing: security. The fast expansion of internet-enabled mobile phones helps us to handle our financial transactions, official and institutional activities, and speedy communication via email or social media, among other things.
Use of mobile phones to commit crimes
People may think that the new and updated location features on our phones are nice and smart, but they really make us more exposed to cyber-crime victimisation. Terrorist organisations throughout the world, together with their cyber-team backup, may simply utilise mobile phone location services and carry out their terrorist acts.
People frequently underestimate the portability and, as a result, accessibility of the mobile phone, despite the fact that we ourselves are always on the move with the phone. With the advent of technology, the cell phone has become nothing more than a little yet highly automated computer system. Most of the individuals try to disguise their ignorance of computer crimes by claiming that they cannot be victims, yet they have no concept that they can be harmed by cybercrime, deliberately or unwittingly. Every individual who uses the internet, Bluetooth, or even an infrared-enabled cell phone is vulnerable to cyber thieves.
According to recent estimates, the improvement of communications technology has resulted in a surge in cyber-crime in the country. Hoodlums in society now have more options because of technological advancements, which they use for their own opportunistic advantage. Hackers have hacked Apple's iOS and Google's Android operating systems in the past. As a result, we must be cautious in order to be safe. White-collar crimes have also been aided by mobile phones, since levies with eight digits or more may be inserted into many accounts in a matter of seconds. Legislation and procedural laws to prohibit such crimes have evolved, but they have yet to be effective enough to completely eliminate such crimes. Although specific IMEI numbers on phones are an effective technique to regulate crimes done with mobile phones, they are unable to completely prevent such crimes. As a result, technological and legal actions must be implemented to bring mobile phone-related crimes under the supervision of registered and regulated technological and legal authorities.
Numerous crimes committed through mobile phones
Mobile hacking: Mobile hacking is defined as an unauthorised entrance into a computer system and/or network. Cracking is a phrase that is similar to hacking. Hacking is defined as any action used to gain access to a mobile phone, communication device, computer, or network.
Mobile Cyber Defamation: This type of crime has become increasingly common in today's world. Criminals use their mobile phones, cell phones, and communication devices to send disparaging, humiliating, and obscene SMS or email to slander people and damage their reputation in the eyes of those who hold them in high regard.
Identity Theft: Identity theft is carried out utilising mobile phones, and criminals employ various communication devices to perform crimes such as subscription fraud.
Mobile Cyber Stalking: Cyberstalking is described as a cyber criminal's repeated acts of harassment or threatening conduct directed at a victim using mobile internet services. Stalking is defined as repeated acts of harassment directed at a victim, such as following them, making harassing phone calls, vandalising the victim's property, and leaving written messages or items. Stalking can lead to significant violent activities against the victim, such as bodily injury, and must be recognised and considered as such. Everything is contingent on the stalker's actions.
Bluebugging: As the name implies, this is a Bluetooth-based attack on a cell device. Bluetooth technology is included in almost every mobile phone. We utilise Bluetooth to share photographs, music, and video files, among other things. Hackers might use blue bugging to get total control of our mobile phones. Even if the Bluetooth device is deactivated or switched off, the victim may not be aware that his mobile phone is being targeted. Bluebugging enables an attacker to view the contents of your mobile phone, including your calendar, address book, and contacts, as well as make calls and send messages. The hacker may even listen in on your cell phone talk.
Cloning or re-chapping of a mobile phone: A clone is an analogue mobile phone that has been programmed to impersonate one owned by a legitimate subscriber by using its ESN and telephone number (these numbers are usually obtained by intercepting with a 'scanner' radio, stealing from a dealer's or service provider's records, or directly from the impersonated phone).
Vishing: This is a method of perpetrating financial fraud through the use of a mobile device. On mobile phones, the use of making calls has risen. Online buying and banking activities are now done on mobile phones. As a result, mobile phones have become simple targets for Vishing. The scammer's goal is to make quick money. These types of assaults are comparable to phishing scams.
Smishing: In this day and age, the name "SMS" is self-explanatory. Short Message Service is what it stands for. It's a typical word for sending and receiving text messages on a mobile phone. This is one of the most widely utilised mobile phone services. As a result, criminals are targeting it as a means of satisfying their greed. Smishing is a type of security attack in which a user receives an SMS posing as a valuable service, inducing them to reveal personal information that is later exploited. This is also used to infect the user's cell phone with malware.
Malware: Malware is one of the most serious risks to mobile phones. It is a programme software that is meant to carry out harmful actions on the infected device. Malware infects a user's mobile phone. Victim through SMS, file transfer, and application downloads from the internet, and so forth. Malware infiltrates the target's system and performs its activities without his/her knowledge, and carry out a number of harmful acts activities such as the use of chat time, and so on.