 Now we move on to the third technical session. A Distinguished Assam Police Service Officer, Papuri Chitya, is presently posted as additional superintendent of police at Special Branch at Quarters Kallipara. As a police officer, she has served in different capacities and has enormously contributed to the law and order separation of the state. She has served as deputy superintendent of police in Bangaigau Chirang and Morigau districts, before joining the Bureau of Investigation of Economic Offences of Assam Police. She has then joined the intelligence team of Assam Police at Special Branch at Quarters Kallipara as additional superintendent of police and is entrusted with the task of leading the team of Assam Police social media center at Cyberdome, which is a prestigious green field project of the Assam Police. For her excellent and extremely dedicated service to the cause of law and order, peace and harmony, she has been the recipient of DGP's Silver Medal. She has got first hand experiences of dealing with cases relating to gender justice and therefore is a befitting person to deliberate on the topic role of police in delivering justice to women. It is indeed a matter of pride to have Madam Papuri Chitya with us today. With these words, I once again welcome you madam and request you to kindly address the gathering. I also request Dr. Smita Shikha Chaudhary to kindly felicitate Madam Papuri Chitya. Thank you Dr. Smita Shikha Chaudhary, over to you madam now. A very good afternoon to everyone present here today for this evening. I am really honored to be able to represent the department that is the platform of the criminal justice system. To present it one and particularly, I being a women myself, it is seeking justice by women meeting is more relatable. So my time is very limited between the lunch and this presentation, so I will go very quickly to my slides. Police as you all know is the term that has been cultivated in our minds from our childhood through Bollywood or Hollywood movies, right? So this is the, you know, in the Indian context police is the last one to arrive at the scene of crime and in the Hollywood movies it is a largely black picture of a policeman who acts as a savior of the victims. So it is both heroic and corrupt at the same time. I will not go into the details of that. Coming quickly to the criminal justice system, the companies of criminal justice system in India are the police, the prosecution, the judiciary, the prison and the correctional services. And the criminal justice process starts with the registration under first information with report which is written by the police officer on receiving an information about commission of an invisible offense. Our role as a police in the criminal justice system starts from there itself, from registering the FIA. I agree there is a gap between, a huge gap between the expectations and the delivery of justice, but with the advent of technology I believe there will be much proficient and speedy delivery of justice to the victims. You can see almost 35% of women have suffered sexual harassment or abuse from non-partners at some point in their lives. Men who witnessed their fathers abusing or harassing their mothers and men who experienced violence in their childhood from their home were more likely to report intimate partner violence as others. I don't know how many of you would relate to this, but I have seen families where when the male in the family is dominant in nature and her wife is very submissive, their kids, the boys in the family have a tendency to treat their female counterparts or expect the same behavior from them. This is my practical experience in the field, 49% of human trafficking victims are adult women, almost 650 million girls estimated to be married before 18 years of age, almost 15 million girls from the age of 15 to 90 have experienced forced sex or rape. In the study, 41% to 60% of women said that they have experienced street harassment when they are stalking, who seen that calling sexual commands, sharing ugliness. The data on crimes against women in India has increased by 15.3% in 2021 according to NCI report. Not only number of cases registered by the rates of crimes against women also increased, the rate of cases registered by young women population increased to 64.5% in 2021 from 56.5% in 2020. A total of 428,278 cases of crimes against women were registered across India in 2021, marking an increase of 15.3% in 2020. Majority of cases on the crime against women were registered under 20 by husband or his relatives, followed by assault on women who intend to outrage for modesty, kidnapping and abduction of women and rape. You can see various types of crimes against women. Data pertaining to these kinds of conventional crimes against women like domestic violence, rape, dowry theft, kidnapping on the feeling as an attack, child rape and so on are mostly available in the NCI viewer site and so I will not go into the details of these crimes against women. Rather, I would like to draw your attention to another form of crime that is very dominant nowadays and is happening on cyberspace. This is the main event of the computer generated world, the internet and cyber laws are the regulations that apply there. During the COVID-19 pandemic, internet-based cyber crimes view rapidly and intensively. Women and children were the most vulnerable parts of society during the pandemic, making their single targets for cyber criminals. Nowadays, many adults were victim of several financial cyber frauds. Women were exposed to these during the pandemic, in particular housewives and those who use social media. Most of all of you must be aware of that. All of you must have your social media accounts and during the pandemic you have seen that we were hooked on mobiles and through our social media accounts. And those who didn't have the social media accounts, they have also opened during the pandemic. And here we said that in a report that put their predation for the highest number of cases of sexually explicit content online, followed by a sum. Women are most commonly exposed to this kind of crime, cyber crimes like sex torsion, which is a crime where a victim is blackmailed using sensitive and in most cases, doctor videos or photos. In relation to the new forms of sex torsion, you get a call from some stranger or some known person, seemingly known person and you get a video call. And once you on the other side start shooting his clothes, he's a hot cloth and what is happening, he has recorded and it is used for blackmailing the person. There are a lot of victims that have come to us saying and you know, you will be surprised to know all have fallen prey to such kind of sex torsion. Eventually they have blackmailed, turned up giving money to the cyber criminals. Then under this fishing, which is a type of social engineering, where an attacker sends a fraudulent message designed to treat a person who revealing sensitive information to the attacker or to deploy malicious software into verbally sensitive information to the attacker. Or deploy malicious software on the victim's infrastructure to steal the data present there. Then you have cyber stalking. Cyber stalking is like, you know, is a kind of stalking someone physically. It is now just very dampened. I would like to share a case where a bureaucratic friend of mine once came to my office and he showed me a picture of a lady and he requested me to, you know, get access to her Facebook profile. Because he was unable to, he was blocked by this lady and was unable to get access to her Facebook profile. And then I inquired, why do you need her account? And he was like, let me give you a sender. She did it. She is my ex-wife. Now we are separated. I want you to know what is going on in her life. So I just want to, can you please help me? Do you have any hackers in your department who can help me getting her password? And how she is engaged with someone else? I just want to get into the messenger. You know, I just want to look into the chat that she is reading. So then I was like, at that time, and I come selling for some time and then I said, comes to know about it. You will be hired first. Do you know that it is a try? And you cannot stalk someone online. This is also a try. And please refrain from cheating. And if you have anything to know, go and talk to her. It is not the way. So this happens. Then I thought about the word hacking, which is that, you know, every day you must be getting some supports or person. You know, sending some, you have been selected for this interview, you have been selected for this job. You were lecturing all this kind of, with tiny e-words. This is tiny e-words. It is always in the form of vitriol or tiny e-words kind of e-words that you see. And this is all malicious. Once you take that, you will learn altogether that you use the standard of physical bullying done online actually. And mostly the targets are children, where they are being isolated and they are under peer pressure to do something. And if they cannot, they will be sent offensive messages. And ultimately what happens, what we have seen, it is, it damages the mental health of the person immensely. So these are some of, some of, some of the cyber crimes that I have been talking about here. Many more. Of late, we have been facing some newer kinds of cyber challenges. Most popular is location-based dating apps. You must have heard about Tinder. You must have heard about, okay, you will be kind of dating apps, where you find some, it might be you. So, you know, a quality learning actually. So, I express my life, for the duration, seeking for some kind of validation. We are seeking for a companion who will listen to us. And this dating apps are very popular among the, mostly among the single person. 90% are dead. How the leader took each other about their demographic details. They never tell you the exact location or exact profile or exact, your, about your, your standard, the person. So, these profiles stay alert, stay safe on these apps. Then, we change for photographs or videos without the consent of the individual in their images. There are pictures of an ex-partner who updates images or videos in the course of a prior relationship and aims to public these shame and humiliate the meeting in retaliation for any relationship. Harder are the pictures than our necessary partners or ex-partners, and the motive is not always to be mentioned. Images can also be obtained by hacking into the victim's computer, such will be the outcomes of phone, and can even inflict real damage on the target's real-world life. As I said, if you click on the malicious URLs or the links, they get access to the, to your device. If you are installing an app in your mobile, apps that you hardly use Facebook, Instagram, how many of you have apps that you rarely use, move those apps. And why giving permission to those apps that you don't trust? You are giving access to your photos, to your chats, to your contacts, access to the photographs or the videos. We require your access to the photographs, taking those admin terms and conditions and licenses. And please read carefully your device and they expect the photographs or the chats or the contacts from your device. A very important crime that is happening, it is, you know, a headache for all of us actually. This is the dark world crimes. You name it, you get everything there. Jobs to keep the trafficking on the dark net. Something that is not searched through Google or beach. This is not usually searched by this regular search engines. It is on the browser. It is called on it because there are layers. This is like the orientation in the browser itself. Once you are into the dark net, you are, you get access to everything from assets, from drugs to human trafficking. To arms, to child sexual abuse, especially. So, trafficking, which is different from physical sex trafficking in that physically engaged with the perpetrator, cyber sex trafficking is when the leader broadcasts their calls or their speeches on the victim engaging in sexual sexual orientation activities from a sexual location and then says that under online sexual predates and crimes, the criminals have force manipulated and blackmailed women into participating in cyber sex trafficking, which constitutes sexual abuse of women. Demand for this conduct makes children more vulnerable for sexual predates as children spend more time online during the lockdown unsupervised. How many of you have, or the device to your kids, have checked the parental control in the device? How many of you have checked the YouTube while giving to your kids? There are some parental settings in there. Do you? Yes, that's very good. The device to kids, be and ensure that it is under your supervision. Because these contents are, that means they are through chat rooms, through social media profiles, through Snapchat or Insta, mostly, these are into the violent game. So, through this, they different lot of unknown person in the virtual world and eventually what happens, they are the predators are looking for someone who is feeling very lonely or they are looking for a, what happens, their child is being brought and is being used later on for blackmailing. It is independently that India Child Protection Fund in 2020 revealed disturbing facts related to cyber online trafficking and a heavy image of child sexual abuse material. They have examined data from Pornhub once, let us follow the website, that revealed trafficking from India, which is by 19-5% in March 2020, right after the imposition of national lockdown, as compared to pre-pandemic adverse trafficking on the other side. This increase was filled by Pornhub after it paid its premium content free of charge during the lockdown. A significant segment of this fight was attributed to the demand for child pornography content. The ICPF found that the demand for child pornography content only under public domain was average of 5 billion per month in hundreds of days. This study found the demand for a specific content where the person was interested in specific actions, space groups, locations, etc. and he was surprised to know that one of the places from where it leads as an access is Bihari. Assam is one of the hubs from where, particularly Bihari is one of the places from where these kinds of contents are viewed. These are uploaded. This is very shocking and alarming. In that case, it is to conduct an assistive investigation where information and communication technology devices, various IPN addresses, blockchain history websites and mobias are the vehicle or target for the commission of criminal acts. Creating awareness among the netizens along with other stakeholders reaching out to the larger populations to modern communication systems such as social media, messaging apps and every response mechanism to help by numbers and counseling. There will be a lot of time because I would like to discuss a case where a particular site, if you permit me, this is some more time. This is a screenshot that I am putting here. This is a conversation that our help line. We have an Assam Police Social Media Centre. We have a remastered system. You can contact our guide who is working for the Assam Police Centre. He can send us your queries or request. There was a befriended boy and she was going to find love with this guy. He is a doctor from London and he came here to marry her. She came to know that this guy is coming to Bahagi and he was from the airport and says that I have been adopted by a policeman and they are asking for some money to release him. She came to Bahagi airport and she was very polite to me. Then suddenly when she got the message, when she got the call that the police had asked for money to release him, then she contacted us. She threw her handle and threw phone line. Then she said, please help me. I need help from you and your people have. She has already posted her picture with that guy as a husband and wife and then she started posting all these. They are jealous of me. I need help. These are the communities that are happy with us actually. This is the Assam Police Centre and this is the media centre that are happy with us. She was literally dating us. Then we found out that there is no such person in the airport. We checked all the numbers and she is there to check the phone numbers. We found it in some different parts of the country and then we called her to the police station and we tried to come to her. But she was totally denied. No, no, no, I think this can't be true. He is my husband. We are married culturally. So he has come to pick me up from here. So if you feel like it, feel like it, this cannot be true. It took us two days to come to the scary and to take out of that emotional trauma that she was going through. So finally she agreed that the person has already decided to give up a lot of money from her but she refused to disclose the amount of money actually. But we could make out that it will be around less than a rupees that she has already delivered to that person. So while we fairly somewhat are known in their Facebook, coming to the last part, information technology rules have been implemented through which the intermediaries are made accountable like Facebook and Instagram that they were made accountable through these rules. But a lot needs to be done. Then we have I4C in their cyber coordination center under the issue of home affairs where you can report who is working for this cyber friendly in a cyber crime. Then we have, let's say, a cyber crime reporting portal. You please note on this portal and there is a toll-free number on this number. This is the grant we have before the cyber number which is helpful if you are a victim of financial fraud or any kind of cyber fraud, you can report immediately at this number which your details, whatever has been due. So you can report, instead of going to some fan or meeting for someone knowing the police department, please dial on this number and you can get a better chance of recovering the money. Then we have cyber police station, the CID itself to deal with the cyber crimes. Again, cyber forensic training labs in the Austin State of Seattle and under this scheme we have provided first responder key for extracting this data and getting it from the scene of crime. So that's it for today. Actually, I wanted to discuss few case studies but due to the talk of time, I won't be able to do that. But I would like to show you, we have been working on dealing with this cyber crime scenario and this is on the process actually and we are waiting for approval. This is an app that we are blogging. Thank you, Madam Papur Chedya. For a very, very particular, impactful and enriching lecture, your deliberation has brought forward the magnitude of crimes against women including those in the cyberspace. Most significantly, you have focused on how virtual world can be a threat to us and how we need to be cautious while operating in the cyberspace. Thank you once again, Madam, for being amidst us today and for your stimulating deliberation.