Cyber-crimes come in many forms, from identity theft to cyberbullying, and they can leave a lasting impact on those affected. Victims often feel helpless, vulnerable, and isolated as they struggle to recover from the emotional and psychological damage inflicted by these crimes. It’s crucial that we understand the different types of cyber-crimes and how to protect ourselves from them to ensure a safe and positive online experience.
The use of the internet or mobile technology to intentionally harass or bully someone through mean, hurtful messages, comments, and images/videos.
(a) Blackmailing / Sextortion: Coercing or manipulating individuals into providing sexual images or videos of themselves, threatening to release the materials publicly or send them to the victim's contacts unless demands are met.
(b) Harassment / Trolling: Using the internet to scare, bully, or embarrass someone through mean messages, spreading lies, sharing private information, or impersonating them online. Trolling involves posting content to cause trouble or be funny without direct attacks on specific individuals.
(c) Defamation / Rumors: Spreading false statements or misleading information about someone online to harm their reputation.
(d) Impersonation / Fake Profile: Creating false profiles in one's own name for malicious purposes, potentially leading to identity theft, fraud, or harassment.
(e) Catfishing: Creating a fictitious online persona to deceive others, often for romantic relationships, sexual purposes, or to manipulate and mislead.
(f) Exclusion: Deliberately leaving someone out or ignoring them online, such as not including them in group chats or activities.
Befriending a child online to build an emotional connection with future intentions of sexual abuse, exploitation, or trafficking.
Cyber grooming is when someone (often an adult) befriends a child online and builds an emotional connection with future intentions of sexual abuse, sexual exploitation or trafficking. The main goals of cyber grooming are: to gain trust from the child, to obtain intimate and personal data from the child (often sexual — such as sexual conversations, pictures, or videos) to threaten and blackmail for further inappropriate material.
(a) Pornography: Coercing children into creating and sharing sexually explicit images or videos of themselves, which the groomer then uses for their own gratification or distributes to others.
(b) Trafficking: Exploiting the trust established with children online to coerce them into meeting in person, leading to abduction or forced exploitation.
Relentlessly following, observing, or harassing someone else online through constant messages or comments, monitoring their online activities, and evoking fear, discomfort, or distress.
Cyberstalking occurs when an individual relentlessly follows, observes, or harasses someone else online. This often involves constantly sending messages or leaving comments, regardless of the recipient's wishes. Additionally, cyber stalkers may attempt to monitor the victim's online activities, such as their movements or conversations, without their consent. This intrusive behavior can evoke feelings of fear, discomfort, or distress in the victim.
Catfishing is when someone uses images and information (often taken from other people’s social media accounts) to create a new identity online – sometimes using an individual’s entire identity as their own.
Newly created social media accounts can then be used to damage the reputation of the true owner of the identity, or alternatively any fictional identities that are created using other people’s images and information can be used to form dishonest relationships online. Although catfishing used to be seen more among adults using online dating platforms, it has now become a more widespread problem among adults and teenagers. Some people who catfish go to extreme lengths to create fake identities – having multiple social media accounts with the purpose of building up and validating their catfishing profiles.
Doxing is the practice of gathering and publishing personal or private information about someone on the internet.
It comes from the word ‘document’/’dox’ and emerged as a revenge tactic in the 1990s hacking culture. Methods for obtaining information about the person being doxed ranges from using publicly searchable databases, social media platforms such as Facebook and the hacking of personal accounts.
Sextortion involves blackmail or coercion with the purpose of extorting sexually explicit images, messages, money or sexual favours from another person online.
In order to blackmail effectively, the perpetrator uses personal information or compromising images that the victim has previously sent to them or that they have found themselves, through hacking or the victim previously sharing content online. The perpetrator then threatens to send these images or messages to the friends, family, school or workplace of the victim unless they share further sexual content or transfer money to them.
➢ If you have not selected the right settings on your social media accounts, then photos and videos posted can be viewed, downloaded, and used by others without your knowledge.
➢ Select the right privacy settings and content-sharing filters on social media so that you are sharing your information, photos, and videos only with your trusted ones.
➢ Be selective about accepting friend requests of strangers on social media.
➢ Learn how to block someone who is making you uncomfortable.
➢ Learn how to remove someone from your friend's list.
➢ Remember to log out from social media websites after use.
➢ If you notice your fake account has been created, you can immediately inform your social media service provider so that the account can be blocked.
➢ Your video chats on social media sites can be recorded by the person on the other side.
➢ There have been instances where video chats which were supposed to be private have been recorded and shared on social media groups and websites.
➢ Be careful while accepting chat requests from strangers.
➢ Do not use a Smartphone for taking sensitive personal photographs and videos. Most of the smartphones are connected to the internet and cloud storage. If a picture or video has been clicked/ recorded by using a smartphone connected to the cloud, it may get saved automatically into the cloud. Even if users delete their photos or videos from their phones, the same photo or video can be recovered from the cloud account or any other device/ PC connected to the cloud using the same account.
➢ If someone has taken such a photograph using a Smartphone, then take it seriously and make sure to get it deleted from their smartphone, the cloud, and any other device connected using the same account.
➢ Cyber stalkers show advances on a person repeatedly despite clear indications of disinterest by such a person. They use the internet, email, social media, or any other form of electronic communication for stalking.
➢ Disable location services for social media sites, mobile devices, etc.
➢ Refrain from sharing your personal information like Phone number, e-mail address, and photographs with unknown persons.
➢ Not all the accounts are real and not all information provided on accounts is true.
➢ One should browse shopping or banking websites or apps only on a device that belongs to him/ her or on a trusted network. Avoid using a friend's phone, public computer, cyber cafe, or free Wi-Fi for sensitive browsing as data can be stolen or copied.
➢ Be careful while you give your mobile devices, and PCs for servicing/repairing/selling: Personal commuters and mobile devices consist of private information that needs to be erased before sending it for repairing, servicing, or selling.
➢ Prevent others from accessing your devices by providing passwords, PINs, Patterns, or biometric information. Always install applications to your mobile phones, computers, etc. from a trusted source only e.g. Play Store, App Store, or from official company websites.
❖ Increase in Unknown Followers: If you notice a sudden increase in unknown followers or friends on your social media accounts.
❖ Excessive Generosity: When someone is excessively nice or generous to you online, it might be a tactic to gain your trust before potentially engaging in harmful behavior.
❖ Over-Sharing Personal Information: If someone shares an excessive amount of personal information with you early on in your online interactions, it could be a red flag indicating manipulative behavior.
❖ Asking Objectionable or Sensitive Questions: If someone asks you inappropriate or sensitive questions, especially if you barely know them, it could be a precursor to cyberbullying or harassment.
❖ Requesting Private Pictures: If someone you barely know asks you for private pictures, it's a clear boundary violation.
❖ Requesting Personal Information: Similarly, if someone you're not close to starts asking for your personal information such as your address, phone number, or financial details, it could be a sign of malicious intent.
❖ Excessive Messaging or Tagging: If someone bombards you with excessive messages, tags you in irrelevant posts, or constantly seeks your attention online, it could lead to cyberbullying.
❖ Break off contact
➢ Do not respond to or forward any cyberbullying posts or messages. Responding won't solve the problem and it might make it worse.
➢ Block the cyberbully on social media and from your contacts for text and phone. Move email messages to your 'Junk' folder. If you don't know how to block a sender from your phone, call or ask someone to call your cell phone service provider.
❖ Get help
➢ Remember you are not alone. Tell someone you trust what happened, whether that's a parent, a teacher, or a friend.
➢ If you have no one to talk to, you don't have to go through it alone. Talk, text, or chat with someone at Kids Help Phone.
❖ Report the cyberbully
➢ If you feel physically threatened or if a crime was committed, call the police immediately.
➢ Keep any cyberbullying texts or emails, or screenshot any social media posts. You may want to have a record of the incident in case you ever need to prove what happened.
➢ Report the incident to the social media site it happened on. They have policies against abuse, and whoever violates those policies will likely get notified and prevented from using that site.
❖ Emotional upset during or after using digital devices.
❖ Being secretive or protective of online activities.
❖ Increased isolation, spending more time alone, and withdrawal from family, friends, and activities.
❖ Avoidance of school or group gatherings, with a decline in academic performance and displays of anger at home.
❖ Changes in mood, behavior, sleep, or appetite.
❖ A sudden desire to stop using digital devices and nervousness or jumpiness when receiving messages.
❖ Physical symptoms such as stomach aches, headaches, trouble sleeping, and unexplained weight fluctuations.
❖ Suicidal thoughts or attempts.
❖ Listen and offer support: Let the person know that you are there for them and that you are willing to listen without judgment. Reassure them that what they are experiencing is not their fault.
❖ Encourage them to talk about it: Encourage the victim to open up about their experiences. Sometimes, simply talking about what they are going through can provide some relief.
❖ Encourage them to block the bully: Suggest that the victim block the individual(s) who are cyberbullying them. Blocking the bully can help reduce further harassment.
❖ Report the cyberbullying: Depending on the severity of the cyberbullying, it may be appropriate to report it to the relevant authorities or the platform where it's occurring. Most social media platforms have mechanisms in place for reporting cyberbullying.
❖ Seek professional help if necessary: If the cyberbullying is causing significant distress or if the victim is struggling to cope, encourage them to seek support from a trusted adult, counselor, or mental health professional.
❖ Promote positive self-esteem: Help the victim focus on their strengths and positive qualities. Encourage them to engage in activities that boost their self-esteem and self-confidence.
❖ Be patient and supportive: Dealing with cyberbullying can be a challenging and emotionally draining experience. Be patient with the victim and offer ongoing support as they navigate through the situation.
❖ Be an advocate: Speak out against cyberbullying and promote kindness and respect online. Encourage others to stand up against cyberbullying and create a supportive online community.
❖ Parents, family members, and close friends can provide emotional support and guidance. They can offer a safe space to discuss the situation and offer advice on how to handle it. They may also help in documenting evidence of cyberbullying and provide additional resources for seeking help.
❖ If cyberbullying is happening within a school or workplace context, teachers and colleagues can be valuable allies. They can offer support, intervene if necessary, and guide reporting procedures within the institution. They may also help in creating a supportive environment for the victim.
❖ In cases of severe cyberbullying involving threats, harassment, or illegal activities, law enforcement agencies should be contacted. They have the authority to investigate and take legal action against cyberbullies. It's important to provide them with evidence such as screenshots, messages, or any other relevant information.
❖ Cyberbullying can have significant emotional and psychological effects on the victim, including anxiety, depression, and even suicidal thoughts. Mental health professionals such as therapists, counselors, or psychologists can provide support, counseling, and strategies for coping with the effects of cyberbullying.
❖ There are numerous non-governmental organizations (NGOs) and initiatives dedicated to combating cyberbullying and supporting victims. These organizations often provide resources, helplines, online support groups, and advocacy services. Contacting such organizations can offer additional support and guidance tailored to the specific needs of the victim.
Reporting cyberbullying is essential for ensuring the safety and well-being of victims, providing them with immediate protection and support. By alerting authorities and platforms, reporting helps in holding perpetrators accountable, thus preventing further harm to both current and potential targets. Each report contributes to fostering a culture of empathy and respect online, reinforcing the message that such behavior is unacceptable. This collective effort creates a safer digital environment for all users, addressing individual incidents while working towards a more inclusive online community.
In addition, it's essential to underscore that being a victim of cyberbullying is never the fault of the person targeted. Regardless of the circumstances, nobody deserves to be harassed or mistreated online. It's essential for individuals to recognize that experiencing cyberbullying does not reflect any shortcomings on their part. By understanding that they are not to blame, victims can feel empowered to report the abuse and seek support without fear of judgment or retribution. It's okay to acknowledge the pain and impact of cyberbullying, but it's equally important to remember that seeking help is a sign of strength, not weakness. Together, we can create a culture where victims are supported, perpetrators are held accountable, and online spaces are safer for everyone.
Furthermore, it's crucial to emphasize that there's no expiration date for reporting cyberbullying. Whether someone is currently experiencing harassment or has been a victim in the past, speaking up remains vital. Cyberbullying can have lasting effects, and reporting it helps prevent future incidents while holding perpetrators accountable for their actions. By encouraging individuals to report whenever they feel comfortable, we empower them to take action towards creating a safer online space for everyone. Remember, every report matters, and each one contributes to building a more supportive and respectful online community.
We’re here for you. If you need support, reach out to the Brush of Hope helpline at
Reach out to Cybercrime at
Cybercrime Official Website:
Reach out to the 24*7 available helpline: 1930
(Though it’s a financial fraud number - in case of dire emergencies, get early help ASAP)