News

Giving details about the manner in which such crimes are conducted, the agency in its FIR said that cyber criminals use ghost SIM cards to impersonate and conceal their identity, and then target ...