Fake profiles on social media are a haul most users face. Fake profiles of celebrities are rampant, as also are profiles with fake names and details. These fake profiles are often wont to commit cyber crime anonymously or with an untraceable identity. It’s definitely alarming that there has been a 168% rise in such cyber crimes within the last one year.
It is very interesting that now-a-days many world thefts have their roots in social media. Burglars are creating networks of faux profiles to specialize in potential victims, intrinsically connections allow them to uncover a selection of personal information about users and their whereabouts, making their homes a neater target.
The survey found that 56% of social media users had discussed an occasion , evening or holiday plans ‘wall to wall’ on Facebook, potentially providing opportunities for them to be targeted by criminals.
By befriending kind of the target user’s other friends beforehand, the victim is even more likely to simply accept the fake friend, inadvertently giving the burglar access to all or any or any or any their personal information.
The cases of Cyber extortion have also increased because of excessive personal data available in social networking profiles, and this data is accessible to fake profiles in your friend list.
When we encounter a fake profile, the first step is to report the same to the service provider like facebook or twitter. Most of those Intermediaries/ Service Providers have facility for reporting and blocking fake profiles.
SECTION 66 D of the knowledge Technology Act, 2000 deals with CHEATING BY PERSONATION USING COMPUTER OR COMPUTER DEVICE, which brings within its ambit fake social media profiles.
Whoever, by means for any communication device or computer resource cheats by persona ting, shall be punished with Imprisonment of either description for a term which can reach three years and shall even be vulnerable to fine which may reach one lakh rupees.
This brings into its ambit:
Making a social networking profile during a fake name.
Making a social networking profile in another person’s name.
Performing social networking activity in such other name.
Sending emails or messages from another person’s email id or messaging account.
However, in most cases the aim of making a fake social media profile features a hidden criminal intention of the perpetrator. it's either means to commit the cyber crimes of cyber stalking, cyber defamation.
Both these cyber crimes are punishable under Section 66 A of the knowledge Technology Act, 2000 which makes “using a computer or communication device to send data which is injurious or offensive” an offence. It states that:
Any person who sends, by means of a computer resource or a communication device,-
(a) any information that's grossly offensive or has menacing character; or
(b) any information which he knows to be false, aside from the aim of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device,
(c) any electronic message or electronic message message for the aim of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which can reach three years and with fine.
Explanation: For the wants of this section, terms “Electronic mail” and “Electronic Mail Message” means a message or information created or transmitted or received on a computer, computing system , computer resource or communication device including attachments in text, image, audio, video and therefore the other electronic record, which may be transmitted with the message.
The offence of cyber stalking involves employing a computer or communication device to send information which is grossly offensive, menacing , annoying, and intimidating for a victim.
There are many cases where victims are threatened that if they're doing not pay money to the perpetrator, their photos would be morphed or the opposite kind of humiliation will need to be faced by them.
Cyber defamation involves employing a computer or communication device to make false statements a couple of person and cause insult and humiliation to such person. aside from legal recourse under cyber laws, the victim has legal redress under the law of torts too.
IDENTIFYING the important FACE BEHIND THE FAKE ACCOUNT
Advanced Cyber Forensic Tools and analysis of log files has made it possible to trace the important people behind fake profiles. Their names and addresses are often easily traced so on require action against them.
A victim must file a complaint with the cyber crime cell or Adjudicating Officer within the format mentioned within the knowledge Technology Act, 2000 with the fees payable.
Also, the victim must contact the intermediary to need temporary action against the offender.
It is always advisable to interact with people you personally know on social media, however, if you're doing interact with people you don’t know well it is best to ascertain out mutual friends.
If you're doing spot any fake profiles on social media, you would like to report the same , as you not only will save yourself from cyber crimes, but also many others who could fall prey to such scammers.