Relevant for Exams
T.N. police warn public about new USSD code cyber scam targeting bank accounts.
Summary
Tamil Nadu police have issued a public warning about a new cyber scam where criminals impersonate courier or delivery service agents. These fraudsters trick citizens into using USSD codes to gain unauthorized access to their bank accounts and social media profiles. This development underscores the critical importance of digital literacy and cybersecurity awareness for competitive exam aspirants, highlighting the evolving nature of cyber threats and the need for vigilance against online fraud.
Key Points
- 1T.N. police issued a public warning regarding a new cyber scam.
- 2Criminals impersonate courier or delivery service agents to defraud citizens.
- 3The scam primarily involves tricking victims into using USSD codes.
- 4Fraudulent access is gained to citizens' bank accounts.
- 5Scammers also target social media profiles for unauthorized access.
In-Depth Analysis
The recent warning issued by the Tamil Nadu police regarding a new cyber scam involving USSD codes is a stark reminder of the ever-evolving landscape of cyber threats in India. This particular scam, where criminals impersonate courier or delivery service agents to gain unauthorized access to bank accounts and social media profiles, highlights critical vulnerabilities in digital literacy and cybersecurity infrastructure. Understanding this incident requires a deep dive into its background, implications, and the broader context of India's digital journey.
**Background Context and Modus Operandi:**
Unstructured Supplementary Service Data (USSD) codes are a communication protocol used by GSM cellular telephones to communicate with the mobile network operator's computers. They are commonly used for checking prepaid balance, activating services, or even for mobile banking (e.g., *99# service). Their simplicity and accessibility, especially for feature phone users or in areas with limited internet connectivity, make them a powerful tool. However, this simplicity also makes them susceptible to exploitation. The scammers leverage social engineering – a psychological manipulation of people into performing actions or divulging confidential information. They pose as legitimate courier or delivery agents, often claiming an issue with a package, and then trick the victim into dialling a specific USSD code. This code, unbeknownst to the victim, is designed to transfer funds, share sensitive information like OTPs, or grant access to their digital profiles, effectively bypassing traditional security measures.
**Key Stakeholders Involved:**
Several entities are directly impacted or involved in combating this threat. **Citizens** are the primary targets and victims, often losing money or having their digital identity compromised. Their lack of digital awareness or urgency created by the fraudsters makes them vulnerable. **Cybercriminals**, often operating in sophisticated, organized groups, are the perpetrators, constantly innovating their techniques. **Law enforcement agencies**, like the Tamil Nadu Police and national bodies such as the Indian Computer Emergency Response Team (CERT-In), are crucial for issuing warnings, investigating crimes, and bringing perpetrators to justice. **Banks and financial institutions** play a vital role in securing customer accounts, implementing robust fraud detection systems, and educating their customers. **Telecom operators** provide the USSD infrastructure and must work to identify and block malicious codes. Finally, the **Government of India**, through ministries like the Ministry of Electronics and Information Technology (MeitY), is responsible for formulating cybersecurity policies and promoting digital literacy.
**Significance for India:**
This scam carries significant implications for India. Economically, it leads to direct financial losses for individuals, eroding trust in digital payment systems and potentially hindering the 'Digital India' initiative, which aims to transform India into a digitally empowered society and knowledge economy. Socially, it creates distress among victims and disproportionately affects less digitally literate populations, widening the digital divide. From a governance perspective, the increasing sophistication of cybercrime poses a challenge to law enforcement and national security, as critical infrastructure could also be targeted. The integrity of personal data, which is fundamental to a citizen's right to privacy, is also at stake.
**Historical Context and Legal Framework:**
Cybercrime in India has evolved rapidly with the proliferation of internet and smartphone usage. From initial phishing attempts to sophisticated ransomware attacks and now social engineering via USSD codes, criminals continually adapt. India's primary legislation addressing cybercrime is the **Information Technology Act, 2000 (IT Act)**, significantly amended in 2008. This Act provides a legal framework for electronic transactions and defines various cyber offences. Sections like **66C (punishment for identity theft)** and **66D (punishment for cheating by personation by using computer resource)** are directly relevant to this scam. Additionally, sections of the **Indian Penal Code (IPC)**, such as **419 (punishment for cheating by personation)** and **420 (cheating and dishonestly inducing delivery of property)**, are often invoked in conjunction with IT Act provisions. The Supreme Court's landmark **K.S. Puttaswamy judgment (2017)** affirmed the **Right to Privacy as a fundamental right under Article 21** of the Constitution, making unauthorized access to personal financial and social media data a violation of this right. Government policies like the National Cyber Security Policy 2013 and the ongoing efforts towards a new National Cyber Security Strategy underscore the nation's commitment to tackling these challenges.
**Future Implications:**
The rise of such scams necessitates a multi-pronged approach for the future. Firstly, there is an urgent need for widespread **digital literacy campaigns** across all demographics, emphasizing critical thinking and vigilance against online fraud. Secondly, **technological safeguards** must be enhanced by banks and telecom operators, including real-time fraud detection and more secure authentication methods. Thirdly, the **legal and regulatory framework** needs continuous evolution to keep pace with new threats, potentially including stricter penalties and faster prosecution. Finally, **inter-agency and international cooperation** are crucial, as cybercriminals often operate across geographical borders, making coordinated efforts essential for effective investigation and deterrence.
Exam Tips
This topic falls under GS Paper III of the UPSC Civil Services Exam syllabus, specifically 'Internal Security' (Cyber Security) and 'Economy' (Digital Payments, Financial Inclusion). For State PSCs, Banking, Railway, and SSC exams, it is relevant for General Awareness, Current Affairs, and Computer Knowledge sections.
Study related topics such as the Information Technology Act, 2000 (and its 2008 amendment), the Digital Personal Data Protection Act, 2023, the role of CERT-In, National Cyber Security Policy, and various government initiatives like Digital India and financial inclusion schemes. Understand the concept of social engineering and different types of cyberattacks (phishing, vishing, ransomware).
Common question patterns include direct questions on relevant sections of the IT Act, analytical questions on the challenges of cybersecurity in India, measures taken by the government to combat cybercrime, the role of different stakeholders, and policy recommendations for improving digital safety. Be prepared for case study-based questions that test your understanding of cybercrime scenarios and appropriate responses.
Pay attention to the economic and social impacts of cybercrime, including its effect on financial inclusion and trust in digital transactions. Understand how these scams disproportionately affect vulnerable populations and what policy interventions are needed.
Familiarize yourself with the constitutional backing for privacy (Article 21 and Puttaswamy judgment) as it relates to data breaches and unauthorized access to personal information, which is a core component of such scams.
Related Topics to Study
Full Article
Criminals impersonate courier or delivery service agents to fraudulently access citizens’ bank accounts and social media profiles

