Cyber criminal arrested through digital footprint- An excellent job by Special Cell, Delhi Police

There is lack of security culture amongst the user of computer, computer system, and computer networks. The same is evident from the recent report of Anoushka Shankar (daughter of the legendary music maestro Pandit Ravi Shankar) email hacked into by an offender who took control of some very private photographs stored in the inbox of the email.

Pandit Ravi Shankar has made a complaint to Union Home Ministry that his daughter is blackmailed and threatened via email by some unknown person. Later the complaint was referred to the Delhi Police and the investigation of the case was taken up by Inspector Pawan Kumar under the supervision of ACP Sanjeev Yadav elite Special Cell of Delhi Police. The unknown accused person was allegedly blackmailed and threatened Anoushka via emails that he would make some of her photographs public found in her email inbox, if his demand of $ 100,000 is not paid by her. The unknown accused person apparently hacked the email account of Anoushka and took control of some of private photographs stored in the inbox.

The aforesaid officers of Elite Wing of the Delhi Police, the Special Cell, did a commendable job. Apparently, the accused person took control of the password of the email account of Anoushka by hacking into it. He found some very private photographs of her and thought to make some easy bucks out of it, by blackmailing Anoushka as it would cause great embarrassments to the father daughter duo who are internationally recognized musicians.

The special cell cops traced the internet protocol address (IP address) from which the Emails were sent. An IP address or “Internet Protocol” address is the unique number assigned to every device such as a computer on an internet network so that data can be routed to and from that device and no other. It is much similar to a postal mailing address that identifies the physical location of your post office and allows the mail carrier to know where to deliver the mail, a device’s IP address is what allows the internet to know where to send the data destined for the particular computer. It’s not an easy task to trace the physical location of the computer to which an internet IP address has been assigned and thereby identify the computer’s user as we are made to believe through some Hollywood movies. It’s not that just you located the IP address, you located a criminal. It’s nowhere that easy.

The IP address are assigned to a netuser not based on his location but from the Internet service provider (ISP) from where he gets the net connectivity, which may be different from user to user, if they avail the services of different ISPs. Even, if the user avails the services of the same ISPs there are no hard & fast rules that the IP addresses necessarily appear “close” to one another in any sense, other than the convenience of the ISP.

The IP address can be tracked from the header of the Email IDs. There are various IP address locator available like from where one can get information about the ISP address to which the particular IP address belongs. Some additional information may be available that indicates the general area that an IP address might reside, i.e. the location of the country or city, if ever, but nothing more specific than that. Here the help of the ISP is required to pinpoint the location and identity of the user. The ISP that allots the IP address to particular computer knows where the user lives. But the ISP’s would not provide the information to the general public due to the strict privacy policy which they adhere to. Here the role of law enforcement machinery comes into picture. The Law Enforcement Agencies can direct the ISP that the requisite information with respect to the IP addresses be provided. The Section 91 of Code of Criminal Procedure, 1973 and Section 69 of the Information Technology Act, 2000 makes provision to this effect.

The extortive emails sent by the offender were found to be sent mostly from Gmail Account. However, the Gmail blocks the IP address of the sender and it is not visible to the recipient of the email. However, one email was found to be from other email service provider and it was found that it had been sent from India; rest of the emails were found to be from Dubai, elsewhere in the UAE, and the USA. The police tracked down one of the IP address to a residential address located at MUMBAI and nabbed the accused person, whose name came to be known as Junaid Jameel Ahmed Khan who confessed to his crime. The cops seized the hard disk of the computer from which the alleged emails were sent, prepared the mirror image of the same and the hard disk was sent to the Forensic Science Laboratory, Hyderabad for further analysis. The cops also seized the passport of the offender through which it was found that the offender was at Dubai on the same date when the extortive emails from Dubai were received by Anoushka, which clearly corroborates the offence committed by the offender.

The Special Cops did a commendable job in nabbing the accused person who was blackmailing Anoushka and giving her sleepless nights. The police have seized and preserved the crucial digital evidences and other documentary evidences which would prove the guilt of the accused person. Cyber technology is an extremely complicated field and the internet is being increasingly used as a place to commit crimes using personal computers, as well as network-based computers. It clearly shows that the Special Cell Cops know their job; they not only understand the criminal mindset but also Computers and networks, how they work, and how to track down information on them and know the basics of gathering evidence and bringing offenders to justice.

The Special Cell cops registered the case under Section 386 Indian Penal Code which deals with offence of extortion. The maximum punishment for such a crime, if proven guilty, is 10 years’ imprisonment. The offence is cognizable and non bailable. The accused hacked into the email of the Anoushka, however the police at the preliminary investigation stage did not invoked Section 66 IT Act, because the modus operandi of the offender was not known as how he took control of the private photographs of Anoushka, which during investigation and seizure of the computer become apparent that the same has been copied into his computer by hacking the email id of Anoushka. Now Section 66 IT Act has been added as the same is attracted to the offence. The material evidence seized by the cops proves the involvement of the offender as the IP address has been traced to his residence. Further, the examination and analysis of the seized hard disk of the computer of offender at the forensic laboratory would prove that the emails have been hacked into and photographed copied by the offender from the inbox of the email. If it is further revealed by the analysis of the hard disk that the photographs (read obscene or nude) found in the possession of the offender, have been transmitted by him electronically, say some of his friends, the same would amount to publication in electronic form which would be squarely covered and punishable under Section 67 of the IT Act, 2000 as well.

Thus, the excellent investigation done by Inspector Pawan Kumar under the supervision of ACP Sanjeev Yadav of the Special Cell, Delhi Police should be applauded which gives a warning to the prospective criminals that they are not anonymous in the virtual world. Their activity on the internet leaves a footprint through which they can be traced and brought to justice. However, at the same time the netizens need to be educated about the best security practices they should adopt and keep in mind while they use computers, computer systems, computer networks and should not fell into the trap of cyber criminals, like Anoushka. After all, prevention is better than cure.


  • I discovered your homepage by coincidence.
    Very interesting posts and well written.
    I will put your site on my blogroll.

  • Great News, Neeraj!!!!!!!

  • Hi Neeraja,

    You gather awsome articles and especially share them with your friends. I really appreciate the good work.

  • Col A K Sachdeva /

    Thanks Sir,it is most wonderful reading the cyber cases.We also appreciate your efforts to let the Indians know as the future of CRIME in our country.We need to be aware.Wishing you all the success

  • Rajesh Srivastava /

    Under which provision of the IT Amendment Act, 2008, which has been notified on 27/10/2009, the impugned act of the offender would be covered.

  • Pretty nice post. I just stumbled upon your blog and wanted to say that I have really enjoyed browsing your blog posts. In any case I’ll be subscribing to your feed and I hope you write again soon!

  • Dear Neeraj,

    I have read your other articles on this issue and I appreciate your efforts for informing the common public and other Cyber Law Experts/Advocates/Students on the cases committed under IT Act. Could you please let me know the legal implication of an example case:

    1. If an employee of a firm using firm’s computer hacks somebody’s email (within official hours)….is firm also responsible for the act of the employee, if yes which are sections of IT Act, can be imposed against the person & firm?

    2. What should firm do immediately, once it get to know about its culprit employee?

    3. Can police/cyber cell seek/collect data & information from the firm about the said employee without any court’s order?



    • Dear Mr. Kumar,
      The replies to your quaries are as follows:-
      1. The firm as no criminal libility except the fact that the firm is supposed to provide the relevent information to the police or any other officer appointed by the adjudicating officer under the IT Act to investigate the offence.
      2. the firm should immediately preserve the log, electronic trail of the act of the employee and can inform the police because if later on police investigate the same, the culprit employee may shift his burden on the other employee or the firm. In the absence of log detail and electronic trail, the firm may not be in a position to defend itself and may be charged for criminal offence/ conspiracy.
      3. The police/ cyber cell can seek/ collect the data, log detail and other information during the investigation and no court approval for order is required at all.

  • We were doing some browsing and came across this site. Must say that this info is on point! Keep writing more. Will be reading your sites

  • Fine and delightful post!!! Thanks!!! Kind to you of day… Happiness… Pleasure and good luck!!!

  • Valuable information and excellent website you got here! I would like to thank you for sharing your ideas and time into the stuff you post!! Thumbs up

  • Strange this post is totaly unrelated to what I was searching google for, but it was listed on the first page. I guess your doing something right if Google likes you enough to put you on the first page of a non related search. 🙂

  • This is such a great resource that you are providing and you give it away for free. I love seeing websites that understand the value of providing a quality resource for free.

  • This is such a fantastic reference that you’re giving and you give it away for totally free. I really like seeing web-sites that recognize the significance of providing a superior resource for free of charge.

  • Simply wished to say I genuinely appreciate your work on this blog site and the high quality articles you make. These type of blog post are what keeps me personally going through the day time. I found this post after a excellent companion of my own mentioned it to me. I do some blogging and site-building personally and I am always thankful to observe others giving good quality data towards community. I am going to absolutely be following and also have added your web site to my personal myspace account for others to check out.

  • I really like your post. Excellent work!

  • I truly appreciate your article. Fantastic work!

  • This site has got some very helpful information on it! Thank you for informing me!

  • It was very interesting to read this piece of writing! Thank you so much!

  • Pretty nice post. I just stumbled upon your blog and wanted to say that I have really enjoyed browsing your blog posts. In any case I’ll be subscribing to your feed and I hope you write again soon!

  • Your website is great! This post really caught my eye when I was searching around. Thanks for sharing it.

  • Your website is great! This post really caught my eye when I was searching around. Thanks for sharing it.

  • I wanted to thank you for this great read!! I definitely enjoying every little bit of it.I have you bookmarked to check out new stuff you post.

  • This fantatic post was very nicely written, and it also contains many good facts. I appreciated your professional way of writing the post. You have made it easy for me to understand. Good and precise info.

  • Good morning, I was flipping through some sites and I found your homepage from yahoo. I read a couple of your posts and thought they are pretty good. Thank you, I will try to come back to your blog soon.

  • I believe this site contains very excellent written subject matter content .

  • Hi, was just browsing through the internet looking for some information and came across your blog. I am impressed by the information that you have on this blog. It shows how well you understand this subject. Bookmarked this page, will come back for more. You, my friend, ROCK!!!

  • Pretty impressive post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I’ll be coming back and I hope you post again soon.

  • Hey thanks for the info.

  • Hey! This post couldn’t be written any better! Reading through this post reminds me of my previous room mate! He always kept chatting about this. I will forward this article to him. Fairly certain he will have a good read. Thanks for sharing!

  • Wonderful post on Cyber criminal arrested through digital footprint- An excellent job by Special Cell, Delhi Police – and nifty domain by the way. I am learning about SEO and this site has helped!

  • Very nice post. I have really enjoyed visiting your site posts. Whatever the case I’ll be subscribing to your feed and I hope you write again soon! Thanks, I’ll try and visit often. Happy new year!

  • I recently came across your web site and have been reading along. I thought I would leave my very first comment. Nice blog. I will keep visiting this website very frequently.

  • Definitely, what a magnificent website and instructive posts, I will bookmark your blog.Have an awsome day!

  • I’m still learning from you, while I’m improving myself. I absolutely liked reading all that is posted on your blog.Keep the posts coming. I enjoyed it!

  • I will really love to express to you that that website is brilliant. I did bookmarked it and check forward to dropping by once again shortly. Continue with the good work!

  • I just needed to say that I found your site via Goolge and I am glad I did. Keep up the good work and I will make sure to bookmark you for when I have more free time away from the books. Thanks again!

  • This is a really very good read for me, Must admit that you are one of the greatest bloggers I ever saw.Thank you for posting this informative blog post. Best wishes, Nina.

  • I have examine your post and i was impressed of the very good information that you have shared in your article! Thanks a bunch for that educational article!

  • I’m typically to blogging and i really respect your content. The article has really peaks my interest. I am going to bookmark your website and maintain checking for brand spanking new information.

  • Im impressed, I must say. really rarely do I discovered a blog thats each educative and entertaining, and let me tell you, youve hit the nail on the pinnacle. Your opinion is outstanding; the matter is something that not a lot of people are speaking intelligently about. Im really happy that I stumbled across this in my hunt for something concerning it.

  • Just desire to say your article is as surprising. The clarity in your post is just cool and i could assume you are an expert on this subject. Well with your permission let me to grab your feed to keep updated with forthcoming post. Thanks a million and please carry on the enjoyable work.

  • Simply to follow up on the up-date of this subject on your web page and want to let you know just how much I appreciated the time you took to write this handy post. Inside the post, you spoke on how to actually handle this concern with all convenience. It would be my own pleasure to get some more strategies from your blog and come up to offer some others what I discovered from you. Many thanks for your usual terrific effort.

  • I like the helpful info you supply for your articles. I will bookmark your blog and take a look at again right here frequently. I am quite sure I’ll be informed lots of new stuff right right here! Best of luck for the next!

  • Excellent website! I must say i love how it’s simple on my small eye balls and the data are very well created. I’m asking yourself generate an income might be notified every time a fresh post has been manufactured. I have subscribed to the RSS feed which usually must do the trick! Use a nice day time!

  • Thank you for sharing excellent informations. Your web site is very cool. I’m impressed by the details that you’ve on this blog. It reveals how nicely you understand this subject. Bookmarked this web page, will come back for more articles. You, my friend, ROCK! I found simply the information I already searched all over the place and just could not come across. What an ideal web site.

  • Hello There. I found your blog using msn. This is a really well written article. I will make sure to bookmark it and return to read more of your useful info. Thanks for the post. I will certainly return.

  • Nice and informative post sir , I’m very much interested in joining cyber crime cell but due to shackles of Delhi Police and no defined process , I’m clueless as to how to go about it …. And ur lecture at PS kirti nagar was inspirational !!! Regards SI Sunil Kumar , PS UTTAM Nagar 9718047314

  • Harsh Vardhan Maini /

    Respected Sir,

    I wish to join your prestigious institute as an Law Associate.

    I’m a Law Graduate (LL.B.) and having done:
    Post-Graduation in Masters in Business Laws (MBL) from NLSIU, Bangalore &
    Diploma in Cyber Laws from Government Law College, Bombay.

    Presently, am doing internship with Cyber Appellate Tribunal (CAT), New Delhi.

    Please provide me your e-mail id so that i could provide you my detailed resume.

    Thanks & Regards,
    Harsh Vardhan Maini.

  • Raghvendra /

    Hi Mr. Neeraj, I need some information related to your post.
    Earlier I was getting stupid and vulgar messages from one Facebook Id. I dont think it as a real id rather a Fake profile.
    Even that person messaged and sent friend requests to the buddies of my friend list, please let me know, if there is any way to make such situations over.?


    • File a complaint under u/s 66 A of information technology Act 2000 with the local police as it is a cognizable offence and police can register a case and arrest the accused.

  • Why users still use to read news papers when in this technological
    globe the whole thing is presented on net?

  • Wow, marvelous weblog structure! How long have you been running a blog for?
    you make blogging glance easy. The overall look of your website is magnificent, as
    well as the content material!

  • What’s up, I want to subscribe for this website to obtain hottest updates, thus where can i do it please help out.

Leave a Reply

Your email address will not be published.