Contact Ustraining@craw.in
Admissions Open For Year 2025For Business →
9513805401
For Business →
CRAW Academy Logo
For Individual
Training & Certifications
Placements
Company
Products
Blogs
Contact us
Enquire Now
  • Home
  • /Report Cyber Crime In Delhi
Craw Security Academy

Craw Cyber Security Pvt Ltd

1st Floor, Plot no. 4, Lane no. 2,

Kehar Singh Estate, Westend Marg,

Behind Saket Metro Station, Saidulajab,

New Delhi - 110030

Contact us: 951 380 5401

Email Id: training@craw.in

HR Email Id: HR@craw.in

Support Email Id: Support@craw.in

Top Cyber Security Courses

  • 1 Year Diploma in Cyber Security
  • Ethical Hacking Course
  • Basic Networking Course
  • Penetration Testing Course
  • CompTia Security Plus Course
  • Red Hat RHCSA Course
  • Python Programming Course
  • Cyber Forensics With FTK Course
  • Web Application Security Course

Quick Links

  • About us
  • News and Blog
  • Franchise Program
  • Testimonials
  • Recruitment
  • Privacy Policy
  • Contact us
  • Refund Policy
  • Gallery
  • Grievance redressal
  • Webinars

Our Latest Courses

  • 1 Year Diploma in Cyber Security
  • Winter Training Internship
  • OSCP / PEN-200
  • Malware Analysis
  • Reverse Engineering
  • Red Hat Service Automation
  • Red Hat Rapid Track
  • Red Hat Openstack
  • AWS Security Training

Social Media

Join our Community

Download Application

Get it on

Google Play

Available on the

App Store

Popular Cyber Security Courses

Ethical Hacking Training with AIBasic Networking Training with AILinux Essentials TrainingPenetration Testing Training with AICyber Forensics Investigation TrainingMobile Penetration Testing TrainingWeb Penetration Testing TrainingPython Programming TrainingIoT Penetration Testing TrainingEndpoint Security TrainingAWS Associate TrainingAWS Security Training

Top Certifications

CEH v13 AICertified Network DefenderCertified Secure Computer UserEccouncil CPENTEccouncil CTIAEccouncil CHFI v11Eccouncil ECIHEccouncil WAHSOSCP PEN-200OSWP PEN-210CompTIA A+CompTIA Security+CompTIA PenTest+CompTIA CySA+CompTIA CASP+CompTIA Network+CISSPCISMCISACCNA 200-301CCNP 350-401CCNP Security 350-701Redhat OpenstackRedhat OpenShiftRedhat RH358Redhat Rapid TrackRedhat RHCSARedhat RHCEAzure AZ-104Azure AZ-900Azure AZ-500Malware Analysis TrainingReverse Engineering TrainingThreat HuntingCRTP

Copyright © Craw Cyber Security Pvt Ltd. All Rights Reserved.

Craw Security Academy

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate,

Westend Marg, Behind Saket Metro Station, Saidulajab,

New Delhi - 110030

Email: training@craw.in

Support: Support@craw.in

Phone: +91-9513-805401

Join our Community

Download Application

Get it on

Google Play

Available on the

App Store

Copyright © Craw Cyber Security Pvt Ltd. All Rights Reserved.

Copyright © Craw Cyber Security Pvt Ltd. All Rights Reserved.

HomeCoursesPlacementFree DemoWhatsApp
Delhi Police District Cyber Cell Contact Details (Cyber Crime Complaint Office)

Report Cyber Crime in Delhi

What is Cybercrime and its Impact on Society?

Cybercrime is the term used to describe illegal activity involving computers and digital networks. These crimes range from widespread attacks on vital infrastructure to illegal access to personal accounts. Identity theft, phishing scams, ransomware attacks, cyberstalking, and the distribution of illicit content are common forms of cybercrime.

The effects of cybercrime on society are significant and complex:

CategoryDescription
Economic LossesGovernments, corporations, and individuals all suffer significant financial losses as a result of cybercrime. It could result in asset theft, disrupt operations, and necessitate costly upgrades and repairs.
Privacy BreachesIdentity theft and financial fraud can arise from the theft and misuse of sensitive and private information.
Trust ErosionRegular cyberattacks have the potential to erode public trust in digital systems and hinder the adoption of new technologies.
National Security ThreatsBecause cybercrime compromises vital infrastructure and government systems, it poses a serious threat to national security.
Emotional and Psychological EffectsCyberbullying, cyberstalking, and other personal cybercrimes can cause stress, anxiety, and other mental health issues in victims.

Delhi Police District Cyber Cell Contact Details (Cyber Crime Complaint Office)

You can use the following table to look for the "Cyber Crime Cell Delhi Police Address":

DistrictOffice AddressContactE-Mail ID
EastRoom No. 11, DCP Office, IP Extension Mandawali, Fazalpur, New Delhi – 110092011-22232116acp-diu-east-dl@delhipolice.gov.in
North EastIIIrd Floor, DCP Office, Seelampur, New Delhi- 110053011-22829503, 22829504cybercell.ned@delhipolice.gov.in
SouthRoom No. – 107, Ist Floor, PS Saket, New Delhi – 110017011-29561004cybercell.south@delhipolice.gov.in
South EastRoom No. 114 & 124, Ist Floor, PS C.R Park Complex, New Delhi – 110087011-26270304cybercell.sed@delhipolice.gov.in
South WestDCP Office Complex, Sec. – 19, Dwarka, New Delhi – 110075011-28084059acpdiu-swd-dl@delhipolice.gov.in
WestIInd Floor, PS Hari Nagar, New Delhi – 110064011-25123432acpdiu-west-dl@delhipolice.gov.in
OuterCyber Cell, Kanjhawala Road, Near Marble Market, Mangolpuri, New Delhi – 110083011-27911006acp-ops-outer-dl@delhipolice.gov.in
CentralOld Building, PS Kamla Market, New Delhi – 110002011-232100885cybercell-central@delhipolice.gov.in
NorthBehind Daulat Ram College, Delhi University North Campus, Maurice Nagar, New Delhi – 110007011-27662875acp-ops-north-dl@delhipolice.gov.in
ShahdaraOld DCP Office, GTB Enclave, IInd Floor, Room No. 307, Near Jhilmil Metro Station, Dilshad Garden, New Delhi-110095011-22304001cybercell-shahdara@delhipolice.gov.in
RohiniRoom No. 303, Rohini District line, Begampur, New Delhi – 110086011-27061702dcp-rohini-dl@delhipolice.gov.in
New DelhiRoom No. 206, PS Mandir Marg, New Delhi – 110001011-23746694dcp-newdelhi-dl@nic.in

Structure and Responsibilities of the Cyber Crime Cell

The Cyber Crime Cell is a specialized unit within law enforcement agencies focused on addressing cyber- related offenses. The structure generally comprises the following components:

Investigation UnitIn charge of gathering evidence, conducting forensic analysis, and evaluating cybercrime allegations.
Technical Expertise TeamComprised of cyber forensics experts and IT specialists who can retrieve digital evidence and have a thorough understanding of the technical aspects of cyber attacks.
Legal AdvisorsProvide guidance on cyber laws and regulations to ensure the legal validity of investigations and prosecutions.
Awareness and Training DivisionFocuses on educating the public and law enforcement personnel about cyber threats and defenses.

Moreover, the prime Responsibilities of the Cyber Crime Cell include the following:

  • Investigating Cyber Offenses,
  • Digital Evidence Collection,
  • Enforcement of Cyber Laws,
  • Collaboration,
  • Public Awareness, etc.

The Process to Complaint Against Cyber Crime (Required to Make a Complaint)

1. In Email-Related Complaints

  1. A written Complaint explaining the complete incident.
  2. Copy of the alleged Email.
  3. The email should be taken from the original receiver. A copy of the forwarded email should be avoided.
  4. Full Header of the alleged Email.
  5. A copy of the email and header should be in both hard & soft forms.
  6. Soft copy should be given on a CD-R only.
  7. How to view the Full Header of an Email.

2. In Social Media Related Complaints

  1. Copy/screenshot of alleged contents/profile
  2. Screenshot copy of the URL of the alleged contents
  3. Contents should be in both hard & soft forms
  4. Soft copy should be given on CD-R only
  5. How to view URL

3. In Mobile Apps Related Complaints

  1. screenshots of the malicious app and the location from where it was downloaded.
  2. Bank statement from the victim's account, if any transactions are made.
  3. soft copy of all documents mentioned above in soft form.

4. In Business Email Compromise Complaints

Brief description of the incident, and consider providing the following financial information:

  1. Originating Name
  2. Originating Location
  3. Originating Bank Name
  4. Originating Bank Account Number
  5. Recipient Name
  6. Recipient Bank Name
  7. Recipient Bank Account Number
  8. Recipient Bank Location (if available)
  9. Intermediary Bank Name (if available)
  10. SWIFT Number
  11. Date
  12. Amount of Transaction
  13. Additional Information (if available) – including "FFC"- For Further Credit; "FAV" – In Favor Of

5. In Data Theft Complaints

  1. Copy of data that has been stolen
  2. Copyright certificate for the data in question.
  3. Details of suspected employees who took the data from the company.

The following documents are related to the suspected employee:

  1. Appointment letter
  2. Non-disclosure agreement, if any
  3. List of duties assigned.
  4. List of gadgets assigned to the suspect.
  5. List of clients with whom the suspect is in touch.
  6. Proof of selling off your copyright data to any client.
  7. Devices used by the suspect while working with the company, if any.

6. In Ransomware Complaints

  1. Email ID/phone number or any other means of communication through which ransom has been demanded.
  2. If malware was sent in the attachment of the mail. Screenshots of the mail with a full header of the first receiver should be provided.

7. In Net Banking/ ATM Complaints

  1. Bank statement from the concerned bank for the last six months.
  2. Copy of SMSs received related to the alleged transactions.
  3. Copy of your ID proof and address proof as shown in the bank records.

8. In Fake Calls Frauds

  1. Bank statement from the concerned bank for the last six months.
  2. Make a copy of SMSs received related to the alleged transactions.
  3. Copy of your ID proof and address proof as shown in the bank records.

9. In Lottery Scams Complaints

  1. Bank statement from the concerned bank for the last six months.
  2. Make a copy of SMSs received related to the alleged transactions.
  3. Copy of your ID proof and address proof as shown in the bank records.

10. In Bitcoin-Related Complaints

  1. Complete facts about the incident in brief.
  2. Address of Bitcoin.
  3. Amount of Bitcoin involved.
  4. Address from/to whom the purchase/sale of Bitcoins is done.

11. In Cheating Related Complaints

  1. Print out the alleged email along with the full header of the email
  2. Email should be taken from the original receiver. A copy of the forwarded email should be avoided
  3. Bank statement from the victim's account.
  4. Details of the alleged transaction made.
  5. Soft copy of all the above-mentioned documents.

12. In Online Transactions Related Complaints

  1. Bank statement from the concerned bank for the last six months.
  2. Make a copy of SMSs received related to the alleged transactions.
  3. Copy of your ID proof and address proof as shown in the bank records.

Notable Cybercrime Cases Handled by the Cybercrime Cell

The Cyber Crime Cell has played a crucial role in tackling numerous significant cybercrimes, showcasing its expertise and commitment. Significant initiatives encompass:

  • Disrupting Fraudulent Schemes,
  • Combating Cyberstalking and Harassment,
  • Mitigating Data Breaches,
  • Tackling Ransomware Attacks, etc.

Techniques Used by Cybercriminals and How the Cell Tackles Them?

Techniques Used by Cybercriminals:

  • Phishing,
  • Malware,
  • Ransomware,
  • Social Engineering,
  • Distributed Denial of Service (DDoS) Attacks,
  • Exploiting Vulnerabilities, etc.

How does the Cyber Crime Cell Tackle Them?

  • Cyber Forensics,
  • Real-Time Monitoring,
  • Collaboration with ISPs and Tech Companies,
  • Public Reporting Systems,
  • Continuous Training,
  • Policy Enforcement, etc.

Collaboration with Other Agencies and International Organizations

Cybercrime frequently crosses international boundaries, necessitating cooperation. The Cyber Crime Cell collaborates closely with:

  • National Agencies: Working together to share resources and information with national intelligence and law enforcement agencies.
  • International Organizations: Addressing international cyberthreats by working with agencies like Europol, Interpol, and other cybersecurity partnerships.
  • CERTs (Computer Emergency Response Teams): Promoting cooperation between national and international CERTs to guarantee prompt reaction to cyber incidents.
  • Private Sector Partnerships: Collaborating with financial institutions, technological companies, and cybersecurity organizations to improve defensive tactics and share threat intelligence.
  • Legal Frameworks: Utilizing international conventions and agreements to facilitate extraditions and cross-border investigations as necessary.

Initiatives and Campaigns to Raise Awareness about Cybercrime

The Cyber Crime Cell recognizes the value of prevention and carries out a number of public education programs, including:

  • Awareness Campaigns,
  • Workshops and Seminars,
  • Online Resources,
  • Collaboration with Educational Institutions,
  • National Cybersecurity Month, etc.

Training and Skill Development Programs for the Cell Members

To maintain an edge over cybercriminals, members of the Cyber Crime Cell engage in ongoing development activities:

Specialized Training CoursesTaking part in courses on network security, malware analysis, ethical hacking, and cyber forensics.
CertificationsObtaining prestigious credentials such as Certified Ethical Hacker (CEH) or Certified Information Systems Security Professional (CISSP).
Workshops and ConferencesTaking part in national and international events to learn about the newest tactics, technologies, and dangers.
Simulated ExercisesPracticing responses to a variety of cyber situations through drills and simulations.
Interdisciplinary LearningCombining legal and investigative skills with technological know-how to increase overall productivity.

Challenges faced by the Cyber Crime Cell in tackling cybercrime

The Cyber Crime Cell encounters a number of significant challenges, despite its essential function.

  • Rapid Technological Advancements,
  • Resource Limitations,
  • Jurisdictional Issues,
  • Encryption and Anonymity Tools,
  • Underreporting,
  • Skill Gaps, etc