Skip to playerSkip to main contentSkip to footer
  • yesterday

Category

🗞
News
Transcript
00:00This is the Narcotic Control Bureau of Narcotic Control Bureau.
00:07This is the Dark Web Cartel.
00:16This is the Edison's Addison.
00:19This is the Narcotic Control Bureau of Narcotic Control Bureau.
00:25This is the Dark Web operation.
00:26This is the Dark Web operation.
00:32The Dark Web is working with certain search engines.
00:36This is the Dark Web, which is intended to do a different search engine.
00:46In terms of using the Dark Web,
00:53The facts are not the same.
00:55Only the facts are not the same.
00:57The facts are not the same.
00:59They are not the same.
01:01They are the same.
01:03COVID-19,
01:05we are not the same.
01:07But,
01:09there are some level four vendors
01:11in the Malayalayla.
01:13The Narcotic Control Bureau
01:15is at the level 4.
01:17This is the NARCOTIC CONTROL BUREO.
01:29This is the NARCOTIC CONTROL BUREO.
01:43This is the NARCOTIC CONTROL BUREO.
02:13Sheetal, we have been living in the 21st century, in the information age.
02:19Now, we have been working with cartels, underground operations on the internet.
02:26For example, we have been working with drug peddlers and drug peddlers.
02:33Eventually, there is a rating of drug sellers from the level 4 and level 5.
02:40Even in Havala, Kairingal, we have been working with the Telegram, we have been working with the Lighting of the Telegram.
02:48We are working with the Telegram platform.
02:51There is an honor to be arrested for the Telegram.
02:53There is an honor to be arrested for the France police, Interpol, and they are arrested for custody.
03:00There is an honor to be arrested for criminal platforms, law enforcement agencies, and corporate.
03:05Then, in the cases of dark open, individuals are hosted, voluntarily run the network.
03:10That is not an honor to be charged.
03:12Not an honor to be charged with companies, hosting providers, no set-up.
03:18It is not a cease to be a operation security.
03:22We have to identify the case of a drug or a postal network or a courier network.
03:30We have to identify the case of a reverse investigation.
03:35In this case, there is a parcel of the foreign post office.
03:41It is not the case of the Unvishna agency.
03:45What are the reasons for the Unvishna agency?
03:51In Europe, they are exploiting these vulnerabilities and platforms like Tor Networks.
04:01It is called Tor Networks. It is called Tor Networks.
04:06It is important to fund funding for the state police.
04:14This is a crucial point.
04:16We can't expect that this is a drug pedally or level 4 right.
04:23We are operating in this country and in Nigeria,
04:29or in Europe.
04:31This is a change.
04:34We also need to get into a high tech crime.
04:39It is totally scattered.
04:41That is a huge challenge.
04:42We need to invest in a future.
04:47What we have in the country is a huge challenge.
04:54In India, the situation is not a big issue.
04:56The situation is in the same place.
04:58The situation is in the same place.
05:00The situation is in the same place.
05:01The situation is in the same place.
05:02Do you think there are a lot of problems in India?
05:06No, I don't think we can identify it.
05:09It's not.
05:10We can identify it.
05:12We can't identify it.
05:14We can identify it as well.
05:16We can identify it as well as keywords.
05:19That's what we do.
05:20Globally, we have a network.
05:22We have a network.
05:24We have a network like CBA or Interpol.
05:27That's a different level.
05:28We have a lot of contribution.
05:30We have a lot of data that we can develop and implement.
05:39That's something we can't have a cyber attack.
05:44We don't care about global contribution.
05:46It's a great factor.
05:48Even in European countries, we have a regular corporation.
05:51We are gradually at that level.
05:53Nothing is stopping us to go there.
05:55Public and private partnerships.
05:57We have some talents. We have to step up a little bit. We have to innovate a little bit.
06:02Cybercrime, as I said, is cyber security innovation.
06:09We have to innovate a regular right.
06:12We have to identify these activities.
06:17How can we identify these digital footprints?
06:20How can we identify these activities?
06:37Yes, thank you very much.
06:40How can we identify these things?
06:47That's why we have to identify these things.
06:49We have to do this.
06:51We have to do this.

Recommended