Headlines
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages,pictures,Videos and news.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.
  • Check Google Images for AuthThe Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • It is a heinous crime and punishable offence to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.

More Details

Parents Should Educate Their Children How to Use the Internet to Avoid the Victims of Online Child Pornography Racket

Any content that features a sexual image or images of a child who is being mistreated or sexually exploited is considered child sexually abusive material (CSAM).Publishing or sending content in any electronic format that shows youngsters engaging in sexually explicit behavior is illegal. In India, Section 67B of the IT Act 2000 covers it.

Any content that features a sexual image or images of a child who is being mistreated or sexually exploited is considered child sexually abusive material (CSAM).Publishing or sending content in any electronic format that shows youngsters engaging in sexually explicit behavior is illegal. In India, Section 67B of the IT Act 2000 covers it.

It is illegal to create, distribute, import, receive, or possess any kind of child Pornography.On September 23, 2024, a Division Bench consisting of Justice J.B. Pardiwala and then Chief Justice D.Y. Chandrachud ruled that the Protection of Children from Sexual Offenses Act, 2012 (the “POCSO Act”) makes it illegal to merely view, possess, or store video of children having sex.

As per the POCSO Act’s Section 15(1), “any person, who stores or possesses” “child pornography” and “fails to delete or destroy or report” it faces a punishment of up to 5,000 rupees, and on repeated offenses, up to 10,000 rupees. A more severe penalty of up to three years in prison may result from possession and storage with the purpose to “transmit or propagate or display or distribute,” according to Section 15(2).

Child pornography is defined by the Indian Ministry of Women and Child Development as “any visual depiction of sexually explicit conduct involving a child, including photographs, videos, digital or computer generated images that are indistinguishable from an actual child and an image created, adapted, or modified but appear to depict a child.”

India has ratified a number of international agreements and treaties, such as the Optional Protocol on the Sale of Children, Child Prostitution, and Child Pornography and the United Nations Convention on the Rights of the Child (UNCRC), that are designed to prevent child pornography.

How can we protect ourselves from such offenses?

When interacting with strangers online, exercise extreme caution and always verify their identification. It is a red flag if an online contact is being overly kind to you, pretending to have similar interests, likes, and dislikes, and expressing interest in meeting up in person. Never consent to meet up with a stranger you made online without first telling your parents.

Children should be taught about safe internet conduct and the risks of making friends with strangers they don’t know. If something makes you uncomfortable, stop talking to them right away, let your parents know, and report it on cybercrime.gov.in. If anything you read or see bothers you, let your parents know. For any incorrect post, you can report it to the social media platforms.

The 1098 helpline, also called CHILDLINE 1098, is run by the CHILDLINE India Foundation (CIF) and is a free, round-the-clock emergency phone service for children in India who require care and protection.

Leave a Reply

Related Article

AI Powered Cyber Crime:How to Prevent

AI is used in phishing attacks to create false emails and identify potential targets. Patterns are p ...
March 18, 2025

Defend Yourself from Scammers

Never click on an attachment or link that you receive via text or email.Are there any attachments, Q ...
March 17, 2025

Indian Government’s Initiative to Aware Public…

According to government data, there has been a significant increase in cybercrime cases in India, wi ...
March 15, 2025

Cyber Criminals How They Work?

Any malicious attempt to enter a computer, computing system, or computer network without authorizati ...
March 14, 2025

Sextortion:Take Precautions

In recent years, financial sexual extortion, often known as sextortion, has become a more common sca ...
March 13, 2025

AI Generated Scams:How You Protect Yourself

Anyone with an internet connection may now access AI, which is now widely used. ChatGPT, Gemini, Per ...
March 12, 2025

Other Article

Prevent Cyber Crime

Parents Should Educate Their Children How…

Any content that features a sexual image or images of a child who is being mistreated or sexually ex ...
March 19, 2025
News & Views

Report: Rohingya Militant Groups Kill, Torture…

On New Year’s day last year, a Rohingya community leader, Mohammad Faisal, shared a poem he wrote ...
Bizzare News

Baby in Shopping Bag Sumuggled into…

Turin police have arrested two Moroccan nationals and detained a Moroccan couple in connection with ...
March 18, 2025
Pet Corner

Sapsali Dog Breed

Originally from Korea, the medium-sized dog breed known as Sapsali are also called Sapsaree.The shag ...
Prevent Cyber Crime

AI Powered Cyber Crime:How to Prevent

AI is used in phishing attacks to create false emails and identify potential targets. Patterns are p ...
News & Views

Junta Troops Forcibly Recruit More Than…

Authorities in Myanmar forcibly recruited more than 70 young men from a single town in the south-cen ...

Top