The Great Data Robbery in India..64 crore data sets..weaponized for the next election..

Following was a press note issued by Cyberbad police on a recent data theft investigation which is considered the largest data theft in the world.

Copy of the Press note

We shall discuss this in greater details in the follow up article.

What is important to note is that the seizure of the data indicates collection from different sources in a systematic manner and organization of the data according to location in different states, practice of different professions, holders of different credit/debit cards, Defence personnel, etc.

The systematic organization indicates that the data could be used for different purposes.

The statewide classification indicates that this was structured could be used for the election campaign purpose also.

This is a classic indication of how information can be weaponized for nefarious purposes.

Hence this is a bigger scandal than the Cambridge Analytica. It involves multiple states and perhaps an attempt to destabilize the country.

We donot know if this investigation leads to George Soros funding or PFI activities. The ramifications would be beyond Telengana and hence this needs a very serious consideration and investigation at the national level.

We congratulate the Cyberbad Police for their excellent work. However in view of the multiple state’s involvement and the potential use of the data for Cyber Crimes and also for manipulation of public opinion for political purpose, I request NIA to consider this as “Cyber Terrorism” under Section 66F of ITA 2000 and take over the investigation.

Naavi

About Vijayashankar Na

Naavi is a veteran Cyber Law specialist in India and is presently working from Bangalore as an Information Assurance Consultant. Pioneered concepts such as ITA 2008 compliance, Naavi is also the founder of Cyber Law College, a virtual Cyber Law Education institution. He now has been focusing on the projects such as Secure Digital India and Cyber Insurance
This entry was posted in Cyber Law. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.