Crackdown on illegal grey traffickers of VOIP setups in 2013 & 2014, whereby 111 successful raids were carried out, averting a loss of 2946 million Rs per month to Gov. Estimate cost of seized equipment in these cases exceed 5,000 million Rupees
Handled complaints related to online defamation, harassment, threats and blackmailing via social networking sites such as Facebook, Twitter
NR3C has successfully registered and investigated crimes related to internet frauds & scams, such as Lottery Fraud, Job Scams, Car Fraud, Click Fraud, Internet Marketing Scams
Rendered technical facilitation of audio and video forensic analysis in cyber terrorism cases
Responded to financial sectors grievances, relating to ATM skimmers, banking frauds, money exchange embezzlements, credit card frauds and e-banking frauds
Technical facilitation extended through digital forensic analysis, cyber tracking, digital crime investigation to local law enforcement agencies in cases such as murder, robbery, extortion and many more
Technical trainings on cyber crime, digital forensics, information security to law enforcement agencies like IB, ISI, NAB, ANF, Local Police
Conducted awareness workshops and seminars at various academic institutes and organizations
Trainings imparted on digital forensic comprehension for interpreting forensic reports, evidence extraction methods, laws application to judicial community
12, 458 individuals from all walks of life have been trainedby NR3C to serve the purpose of cyber crime mitigation
Developed LEAD "Live Evidence Acquisition Dongle" a forensic tool toextract live evidence
Developed a tool to help track and identify the location of e-mails originating from unknown source
Developed in-house software application for forensic request management
Developed in-house software application for complaints management andtracking
Contributed a 5 year counter cyber terrorism strategy with NACTA
Furnished a report on problem faced by law enforcement agencies to tracedown the sub-standard mobile phone with same IMEI number
Research paper published in Journal of American Science, 2010 on "DataMining Methodology in Perspective of Manufacturing Databases".



Trying to get into computer systems in order to steal, corrupt, or illegitimately view data. Hacking comes from the term “hacker”, who is an expert in computer programming languages and systems. Hacking, in this sense, means using unusually complex and clever methods to make computers do things. For some time, however, the popular press has used the word “hacker” and “hacking” in a negative way to refer to individuals who try to get into computer systems in order to steal, corrupt, or illegitimately view data. Hackers themselves maintain that the proper term for such individuals is “cracker”, and that their activities should be called cracking. However, in order to be consistent with the most common usage of the word, we use “hacking” here to refer to unauthorized access

Website Defacement

Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. This is typically the work of system crackers, who break into a web server and replace the hosted website with one of its own. The most common method of defacement is using SQL Injections to log on to administrator accounts. Defacements usually consist of an entire page. This page usually includes the defacer’s pseudonym or “Hacking Codename.” Sometimes, the Website Defacer makes fun of the system administrator for failing to maintain server security. Most times, the defacement is harmless, however, sometimes it can be used as a distraction to cover up more sinister actions such as uploading malware or deleting essential files from the server. NR3C has successfully investigated cases relating to website defacement.

Cyber Bullying

Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten or make unwanted advances towards someone else. This sort of harassment can cause physical, emotional, and psychological damage to the victim. Children are particularly vulnerable because of their trusting nature and give away their personal information. This information later is used against them for stalking purpose, therefore the NR3C officials advice that until the person is not a trusted individual, no information should shared over the internet.

Cyber Stalking

Using the Internet to threaten or make unwanted advances towards someone else Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten or make unwanted advances towards someone else. This sort of harassment can cause physical, emotional, and psychological damage to the victim. Children are particularly vulnerable because of their trusting nature

Child Pornography

The internet evolution has made children a viable victim to the cyber crime. As more homes have access to internet, children use the internet and chances have increased where they can fall victim to the aggression of pedophiles. The easy access to pornographic contents available over the internet lowers the inhibition of the children. Pedophiles lure the children by distributing pornographic material, and try to meet them for sexual activities which also include collection of their explicit photographs and videos. Mostly pedophiles try to contact children in chat rooms posing as teenagers, and start to befriend them to win their confidence.

Each year, countless children around the world fall prey to sexual predators. These young victims are left with permanent psychological, physical, and emotional scars. When a recording of that sexual abuse is made or released onto the Internet, it lives on forever. It haunts the children depicted in it, who live daily with the knowledge that countless strangers use an image of their worst experiences for their own gratification. NR3C, cyber crime unit has zero tolerance for pedophiles, and is driven to make cyber space a safe place for our children.

Social Engineering

Social engineering is a technique used by cyber criminals to get access to confidential information. With social engineering, attackers use manipulation and deceit to trick victims into giving out confidential information. Some of the social engineering methods used by attackers:

    • Sending messages that contain dangerous attachments (e.g. malware) with text that encourage people to open the attachments.
    • Pretending to be the main administrator of a local network and asking for the victim’s password in order to perform a maintenance check.
    • Telling a victim over the phone that he/she has won a prize, in return they ask for a credit card number to deliver it.
    • o Asking for a user’s password for a certain Internet service, such as a blog, and later use the same password to access user’s computer. This technique works because users often use the same passwords for many different portals.

Data Theft

Data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information. Data theft is increasingly a problem for individual computer users, as well as big corporate firms. The following categories are most common in data theft cases.

    • E-commerce: You should make sure that your data is safe from prying eyes when you sell or buy things on the Web. Carelessness can lead to leaking your private account information.
    • Password cracking: Intruders can access your machine and get valuable data if it is not password-protected or its password can be easily decoded (weak password).
    • Eavesdropping: Data sent on insecure lines can be wiretapped and recorded. If no encryption mechanism is used, there is a good chance of losing your password and other private information to the eavesdropper.
    • Laptop theft: Increasingly incidents of laptop theft from corporate firms occur with the valuable information stored in the laptop being sold to competitors. Carelessness and lack of laptop data encryption can lead to major losses for the firm.

Identity theft

Identity theft refers to a crime where an individual maliciously obtains and uses another individuals personal/sensitive information to commit frauds/scams by using the stolen identity. Mostly this crime is committed for economic gain. The cyber criminal gains access to an individuals information by stealing e-mail details, stored information on computer databases, they eavesdrop over the networks to get hold of transactions. Identity thefts includes but not limited to shoulder surfing, dumpster diving, spamming, spoofing, phishing, and skimming. NR3C has successfully investigated numerous cases of identity theft.

Financial fraud

Financial fraud is a criminal behavior in which a person uses wrong methods to trick a victim out of his money. The Internet fraud scheme is a common example of financial fraud, which includes emulated online sales, retail schemes, business opportunity schemes, identity theft, market manipulation schemes, and credit card schemes.

Computer viruses and worms

A virus is a malicious program that passes from one computer to another in the same way as a biological virus passes from one person to another. Most viruses are written with a malicious intent, so that they may cause damage to programs and data in addition to spreading themselves. Viruses infect existing programs to alter the behavior of programs, actively destroy data, and perform actions to storage devices that render their stored data inaccessible.

A worm is a software program that uses computer networks and security holes to replicate itself from one computer to another. It usually performs malicious actions, such as using the resources of computers as well as shutting down the computers

Intellectual property rights

Intellectual property rights is concerned with any act that allows access to patent, trade secrets, customer data, sales trends, and any confidential information.

Denial of Service attack

A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as a network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to the network