290: Be Safe from Economic Cyber Frauds: Part 1

Reserve Bank of India had published a booklet to make everyone aware of the modus operandi followed by fraudsters for cyber economic crimes. The booklet also lists out do’s and don’ts. Relevant excerpts are summarised below.

 

  1. FRAUD THROUGH PHISHING LINKS : Obtaining your details through fraud KYC links.

Do

+Always cross-check the KYC status with your home branch or through your relationship manager when you receive calls, links or SMS from unknown sources requesting you to update KYC.

+Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Don’t

– Don’t click on unknown/unsolicited links received on the phone/email without verifying it.

– Don’t share your confidential details with strangers.

  

  1. VISHING CALLS : Call regarding Activation or deactivation of insurance policy.

Do

+Always cross-check with your relationship manager or bank branch about any issue before trusting anyone.

+OTP is like a key to your safe wealth, so always keep it away from fraudsters.

+Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting  Portal at https://cybercrime.gov.in

Don’t

– Don’t trust unknown callers claiming to be speaking on behalf of banks asking for confidential information / details. Banks don’t seek such details over phone.

– Never trust strangers in the digital world easily, and be cautious while answering calls from unknown numbers.

 

  1. FRAUD USING ONLINE MARKETPLACES: Obtaining your account info through online selling and buying sites.

Do

+Always remember, UPI PIN is required only to make a payment and is not required to receive any payment.

+Always verify the mobile number In the UPI application before Initiating a payment.

+Report the incident to the nearest Cyber Crime Police Station and Notional Cyber Crime Reporting Portal at https://cybercrime.gov.in

Don’t

– Don’t shore OTP or confidential account details with strangers.

– Don’t enter the UPI PIN to receive on amount from another person.

 

  1. CREDIT CARD ANNUAL FEE WAIVER- FAKE OFFER : Obtaining OTP on this pretext.

Do

+ Be cautious while responding to calls from unknown numbers claiming to be from your bank.

+ Report to your Home branch immediately on realizing the fraud.

+ Block your card to prevent further financial loss.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https:// cybercrime.gov.in

Don’t

– Don’t share your OTP with anyone. Fraudsters might be able to collect your account details. but transactions can only happen if you share the confidential OTP sent to your phone.

 

  1. ATM CARD SKIMMING FRAUD

Do

+ Before initiating any transaction in the ATM machines, ensure that skimming devices ore not present. Skimming devices are hidden by fraudsters by overlapping them with the card insertion slot.

+ Report the fraud to the bank within 3 days of the card cloning incident.

+ Check your transaction history frequently to verify all transactions.

+ Report the incident to the nearest Cyber Crime Police Station and Notional Cyber Crime Reporting Portal at (https:/Icybercrime.gov.in)

 Don’t

– Don’t give your ATM card to anyone on the ATM premises to transect on your behalf. This kind of social engineering is being used to target senior citizens/semi-educated persons who have difficulty operating ATMs.

 

  1. FRAUD USING SCREEN SHARING APP/REMOTE ACCESS : Using a screen sharing app to obtain your info.

Do

+ Verify the authenticity of the offer on the official website of the entity concerned.

+ Install antivirus/spam blocking software on your mobile phone.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Don’t

– Don’t download any applications over links sent through SMS, Email or instant messaging applications.

– Don’t download the screen-sharing application shared by any unknown persons.

– Screen sharing codes generated by these apps should not be shared with unknown persons.

 

  1. SIM SWAP/ SIM CLONING : Obtaining your Sim info and deactivating it at the same time cloning it to carry out the fraud.

Do

+ Verify the status of the SIM card with your Telecom Service Provider when in doubt instead of believing unknown callers.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

 Don’t

– Don’t share confidential details like Aadhaar number and SIM number with unknown callers.

 

  1. FRAUDS BY COMPROMISING CREDENTIALS THROUGH SEARCH ENGINES: Making payment on unknown link.

Do

+ Always obtain the contact details/customer service number, etc. from the official website of the service provider only.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https:/ /cybercrime.gov.in

Don’t

– Don’t contact random phone numbers obtained from web search engines, especially for doing financial translation.

 

  1. SCAM THROUGH QR CODE SCAN: Scanning QR code from unknown source and entering pin.

Do

+ Educate yourself about QR codes before using them.

+ Report the transaction immediately to your bank.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Dont

– Don’t enter your UPI PIN to receive money from another person. UPI PIN is required only for sending a payment, not for receiving.

– Don’t scan QR codes to receive any payment. QR code needs to be scanned for sending a payment, not for receiving Money.

  

  1. IMPERSONATION THROUGH SOCIAL MEDIA : Impersonation on social media and asking for monetary help.

 Do

+ Verify by calling/meeting the real person before making a payment.

+ Always check the account details before making any payment.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Dont

– Don’t keep your personal information like mobile number, email id and friend list open to the public.

– Don’t accept friend requests/ follow requests from people you have never met in person.

 

Bottom Line

It is better to be aware and always play safe.

 

Suggestions and value additions are most welcome

 

For regular updates, please register here

Subscribe

References and credits

Reserve Bank of India.

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from sources deemed reliable and accurate. All copyrighted material belongs to respective owners and is provided only for purposes of wider dissemination.

284: Air Power in Counter Terrorism Operations

Keynote address at Seminar on Counter Terrorism organised by Indic Researcher’s Forum.

 

 

Bottom Line

Airpower has both visible and invisible roles in counter-insurgency role

 

 

Suggestions and value additions are most welcome

 

For regular updates, please register here

Subscribe

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from sources deemed reliable and accurate. All copyrighted material belongs to respective owners and is provided only for purposes of wider dissemination.

283: ARTIFICIAL INTELLIGENCE: DIGITAL TWINS & SURROGATE MODELS

 

 

Defining DT

A digital twin is a digital representation that functions as a shadow/twin of a physical object or process.

The core idea behind Digital twins is to create a virtual model that incorporates all the necessary information about a physical ecosystem to solve a particular problem.

Digital twins are designed to model and simulate a process to understand it and predict its behaviour.

There is no standard definition of a Digital Twin but it can be defined as a bi-directional data link as well as a data processing entity that simulates, forecasts, and regulates a system in real-time and also transfers and stores data.

 

Components of Digital Twins

The basic idea of DT is quite straightforward, linking a physical object to a digital entity through a framework comprising at least the following components:

 

  1. Data Link
  2. Coupling (a two-way interface)
  3. Identifier
  4. Security
  5. Data Storage
  6. User Interface
  7. Simulation
  8. Analysis
  9. Artificial Intelligence
  10. Computation

 

Utility

Digital twin originated from engineering and is related to model-based systems engineering (MBSE) and surrogate modelling.

The usage of digital twins is now more mainstream in software development.

Once the system is modelled as a twin, various existing and new engineering problems can be modelled and simulated, such as predictive maintenance, anomaly detection, etc.

Digital twins can be combined with Augmented Reality and Virtual Reality to model physical processes. 

Digital Twins will have a big role in enhancing Model-based Design and simulation and will extend to AR (Augmented Reality) and VR (Virtual Reality).

Digital twins have a large scope in design and simulation.

This technology will have a significant impact over the next few years.

Surrogate model.

Definition. It is an engineering method used when an outcome of interest cannot be easily directly measured, so a model of the outcome is used instead. For example, in order to find the optimal aerofoil shape for an aircraft wing, an engineer simulates the airflow around the wing for different shape variables (length, curvature, material, ..).

 

For many real-world problems, a single simulation can take many hours, or even days to complete. As a result, routine tasks such as design optimization, design space exploration, sensitivity analysis and  what-if analysis become impossible since they require thousands or even millions of simulation evaluations.

One way of alleviating this burden is by constructing approximation models, known as  surrogate models,  metamodels or  emulators, that mimic the behavior of the simulation model as closely as possible while being computationally cheap(er) to evaluate.

Surrogate models are constructed using a data-driven, bottom-up approach. The exact, inner working of the simulation code is not assumed to be known (or even understood), solely the input-output behavior is important.

 

A model is constructed based on modeling the response of the simulator to a limited number of intelligently chosen data points. This approach is also known as behavioral modeling or black-box modeling, though the terminology is not always consistent.

Though using surrogate models in lieu of experiments and simulations in engineering design is more common, surrogate modelling may be used in many other areas of science where there are expensive experiments and/or function evaluations.

 

DT vis-à-vis SM

 

Digital Twin (DT) is a Physics based model, whereas, Surrogate Model (SM) is a Data based model.

DT is good in the parameter-space represented by physics equations, whereas, SM is good in the parameter-space represented by data, but not covering the space represented by equations

 

Some Interesting Terminologies

 

Artificial Intelligence (AI). A variety of machine learning and deep learning techniques are collectively referred to as AI.

Virtual Reality (VR). creates an immersive experience through VR devices like headsets and simulates a three-dimensional world. VR is used in instructional content and educational material for field workers, oil and gas, defence, aviation, etc.

Augmented Reality (AR). overlays digital information on a physical world. Typically, AR uses conventional devices like mobile phones.

Mixed Reality (MR). allows the manipulation of both physical and digital objects in an immersive world.

Model-based design. A set of technologies and techniques that help engineers and scientists to design and implement complex, dynamic, end-to-end systems using a set of virtual (digital) modelling technologies. Collectively, these technologies can simulate and model physical objects and processes in multiple industries.

Additive Manufacturing.  In the AM approach, first a digital 3D design is created from which the component is printed. The term Additive manufacturing (AM) is used to refer to how technologies like 3D printing are impacting manufacturing. Once the model is digitised, it can be optimised using topology optimization techniques.

 

Bottom Line

 Technology makes the imagination of today into reality of tomorrow.

Technology is a two edged sword – can be used in Civil & Military domain.

 

Suggestions and value additions are most welcome

 

For regular updates, please register here

Subscribe

 

 

References and credits

To all the online sites and channels.

 

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from sources deemed reliable and accurate. All copyrighted material belongs to respective owners and is provided only for purposes of wider dissemination.