Published on: 29th October 2025
Authored by: Shravani Vishnu
Reva University
Introduction
As digital adoption in India accelerates, so do the opportunities for criminals to exploit information and communication technologies. The proliferation of smartphones, internet banking, online marketplaces and social media has expanded the attack surface for fraud, identity theft, phishing, ransomware, and other cyber-enabled offenses. Policymakers have responded by building a statutory and institutional framework, but enforcement faces persistent practical and legal obstacles. This article surveys the statutory architecture governing cyber offences in India, maps institutional mechanisms for response, and critically analyses key enforcement challenges — technical, legal and administrative — before suggesting measures to strengthen deterrence and redress.
The legal architecture: statutes and criminal law
India’s principal legislation addressing cyber matters is the Information Technology Act, 2000 (IT Act), enacted to create legal recognition for electronic records and to penalize a range of computer-related crimes.[1]The IT Act provided amendments to other laws (for example evidence rules) and introduced new offences specific to electronic systems. Subsequent amendments and judicial interpretation have shaped the contours of its application. In addition to the IT Act, the Indian Penal Code (IPC) contains provisions (theft, cheating, criminal intimidation, forgery and others) that are applied to online misconduct when the elements can be satisfied.[2]Together, these statutes form the backbone of India’s legal response to cyber wrongdoing.
More recently, India has sought to address data protection and privacy through separate legislation. The Digital Personal Data Protection Act (DPDP), 2023 — operationalized in 2024 — establishes obligations for entities processing personal data, creates rights for data subjects and sets out compliance mechanisms and penalties.[3]While primarily focused on data governance rather than criminalizing cyber conduct per se, data protection law complements criminal law by creating regulatory obligations that can reduce the incidence and impact of incidents such as data breaches and unauthorized processing.
A notable judicial milestone in India’s cyber jurisprudence is the Supreme Court’s 2015 decision striking down Section 66A of the IT Act (which criminalized sending “offensive” messages) as violative of free speech principles. [4]The ruling narrowed the scope for penalizing online speech and highlighted constitutional constraints on broadly worded cyber provisions. The judgment had the ancillary effect of requiring law enforcement to be more precise in invoking cybercrime provisions so as not to breach fundamental rights.
Institutional ecosystem for response
Operational response to cyber incidents in India relies on multiple institutions:
Indian Computer Emergency Response Team (CERT-In) functions as the national nodal agency for cyber incident reporting and technical response.[5]CERT-In issues advisories, coordinates incident responses, maintains incident databases, and provides technical assistance to government and critical infrastructure entities.
The National Cyber Crime Reporting Portal (cybercrime.gov.in) offers a citizen-facing mechanism to report cyber offences including financial frauds, harassment, and data theft; it routes complaints to the appropriate state police or investigative agency. [6]
Traditional police structures — state police cybercrime units, the Central Bureau of Investigation (CBI) (for specified classes of offences), and sectoral regulators (RBI, TRAI, etc.) — collaborate depending on subject-matter jurisdiction.[7]
Despite a growing institutional footprint, capacity and coordination gaps remain (addressed below).
Typologies and trends in cybercrime
Cybercrime in India is workably diverse: phishing and banking frauds, SIM-swap and social engineering scams, business email compromise (BEC), ransomware attacks on enterprises, child sexual abuse material (CSAM) distribution, online harassment and doxxing, identity theft, domain and intellectual property abuse, and attacks on critical infrastructure. In the financial sphere, frauds using digital payments and UPI/e-banking vectors have grown rapidly; government and media reporting show sharp increases in reported cyber fraud incidents and monetary losses in recent years.[8]These patterns reflect both the attractiveness of India’s large digital economy and the high returns low-risk profile for organized fraud networks.
Enforcement challenges
- Jurisdictional complexity and cross-border investigations
Cyber offences frequently traverse national borders: attackers may host infrastructure overseas, use foreign-issued SIMs or cloud services, or anonymize activity through multiple hops. Determining which state or country has jurisdiction, obtaining mutual legal assistance, and coordinating with foreign service providers complicates timely evidence collection. Extradition and mutual legal assistance treaties (MLATs) are often slow and bureaucratic, and differing definitions of offences across jurisdictions impede swift action.
- Attribution and technical complexity
Cyber attribution — connecting an attack to a person or group beyond reasonable doubt — is technically demanding. Attackers leverage encryption, anonymizing networks, proxy services, rented botnets and rapidly rotating infrastructure. Investigators need advanced forensic tools and specialist skills to tie artifacts to actors, and chain-of-custody standards must be met to preserve admissibility in court. Where attribution is contested, prosecutions can collapse.
- Resource and capacity gaps in policing and prosecution
State police forces shoulder most front-line investigation responsibilities, but many units lack trained cyber forensic personnel, modern lab facilities, and sustained upskilling. Recruiting and retaining specialists is difficult because private sector salaries and working conditions often exceed public sector offerings. Prosecutors and judges also require continuous training to understand technical evidence and digital investigative techniques; without such capacity, trials can become bogged down or result in acquittals for procedural or technical reasons. Academic and NGO studies note that enforcement resources lag behind the scale of reported incidents.
- Reporting, detection and victim behaviour
Under-reporting remains an obstacle. Victims of cyber fraud — particularly individuals and small businesses — may not report incidents due to perceived low recovery chances, reputational concerns, or effort required to navigate reporting systems. This reduces law enforcement’s visibility into crime patterns and constrains prevention strategies. Although the National Cyber Crime Reporting Portal aggregates complaints, differing reporting standards and the funneling of complaints to multiple agencies can slow response.
- Legal gaps and outdated provisions
While the IT Act laid an early foundation, critics argue it is unevenly calibrated for contemporary threats. Broadly-worded provisions raise constitutional concerns (as in the Section 66A controversy) while other domains — such as sophisticated ransomware regulation, liability of intermediaries, or harmonized rules for cloud and cross-border data flows — are only recently being addressed through regulatory and statutory initiatives. [9]The pace of new lawmaking often lags technological change, creating regulatory gray zones exploited by criminals.
- Evidence preservation and chain of custody
Digital evidence is ephemeral: logs are overwritten, ephemeral messaging platforms delete data, servers are taken down, and cloud providers may purge backups on regional schedules. Preserving evidence requires rapid legal orders (e.g., preservation notices) and cooperation from service providers, both domestic and foreign. Gaps in standard operating procedures for evidence handling, or delays in obtaining preservation assistance, can render crucial data unavailable at trial.
- Organized crime and professionalization of fraud
The economic incentives for scaled fraud have led to organized syndicates with division of labor — call centers executing social engineering, money mules laundering funds, technical teams deploying malware — often operating transnationally. Law enforcement capabilities designed around isolated offenders are ill-suited to dismantling such ecosystems, requiring intelligence fusion, financial investigations and sustained multi-jurisdictional operations.
- Balancing privacy, surveillance and civil liberties
Enforcement tools — interception, data retention orders, and expansive preservation powers — present tradeoffs between effective investigation and civil liberties. Judicial oversight, statutory safeguards and transparent processes are necessary to prevent overreach. The Supreme Court’s Section 66A ruling reminds policymakers that broadly framed criminal provisions can be constitutionally untenable and counterproductive.[10]
Illustrative example: the Section 66A episode
Section 66A (inserted in a 2008 amendment) criminalized the sending of “offensive” or “menacing” electronic messages. Its vague wording led to concerns about suppression of legitimate speech and arbitrary arrests; the Supreme Court in Shreya Singhal v. Union of India (2015) struck the provision down for violating free speech protections.[11] The decision forced law enforcement to rely on more specific statutes for online wrongdoing and highlighted the need for precise drafting when criminalizing online conduct. The ruling also underscored that robust enforcement must operate within constitutional boundaries.
Recent scale and trends (concrete numbers)
Government-sourced and press reports in recent years indicate rapid growth in reported cyber frauds and monetary losses. For instance, official reporting channels recorded millions of fraud complaints and substantial financial losses in the most recent reporting periods; citizens lost over ₹22,845.73 crore in 2024 alone across 36.37 lakh incidents.[12] Cyber fraud cases involving losses over ₹1 lakh jumped more than four-fold in FY 2024, with reported damages of ₹175 crore.[13] These trends underscore urgency for investment in both prevention and investigative capability.
Policy and operational recommendations
To strengthen enforcement efficacy, a combination of legal reform, capacity building, technological investment and international cooperation is required:
- Modernize statutes with precision. Laws should be narrowly drafted to target clearly defined harmful conduct, avoid constitutional pitfalls, and include provisions for emergent threats (e.g., ransomware facilitation, targeted supply-chain attacks). Consultation with technologists, civil society and legal experts can improve clarity and effectiveness.
- Scale technical capacity and labs. State police need well-equipped digital forensics labs, standardized procedures for evidence handling and continuous training. Incentive structures (career tracks, competitive compensation) can help retain cyber specialists.
- Strengthen public–private cooperation. Rapid takedowns and preservation orders often require cooperation from telecom firms, ISPs, cloud platforms and payment providers. Formal liaison mechanisms, mutual aid agreements, and “trusted reporter” channels will speed response.
- Harmonize cross-border cooperation. Improving MLAT processes, entering bilateral arrangements for urgent preservation, and leveraging regional multilateral platforms will reduce delays in cross-border evidence collection.
- Improve victim reporting and redress. Simplifying reporting procedures, offering victim assistance (financial recourse pathways, “freezing” mechanisms), and public awareness campaigns will increase reporting and support prevention.
- Use financial intelligence to follow the money. Tighter monitoring of money-mule networks, enhanced KYC for SIM and payment onboarding, and automated tooling to detect suspicious fund flows will make fraud less profitable.
- Invest in prevention: digital literacy and default security. Public education campaigns, phishing-resistant authentication norms, and secure defaults in consumer platforms reduce successful exploitation. Regulators can incentivize secure design through standards and audits.
- Preserve civil liberties with oversight. Any expansion of surveillance or retention powers should be accompanied by judicial oversight, transparency reporting and redress mechanisms.
Conclusion
India has assembled an array of laws and institutions to address cybercrime, and recent legislative steps (such as the DPDP Act) reflect growing regulatory maturity. Yet enforcement remains hampered by jurisdictional complexity, attribution challenges, resource shortfalls, and legal drafting issues that complicate prosecutions. Tackling this gap requires simultaneous legal refinement, investment in human and technical capacity, stronger public–private partnerships, and international cooperation that keeps pace with the inherently transnational nature of cybercrime. Only a balanced strategy — one that protects individual rights while empowering investigators with lawful, transparent tools — can sustainably reduce harm in India’s rapidly digitalizing society
[1] Information Technology Act 2000 (No 21 of 2000).
[2] Indian Penal Code 1860 (No 45 of 1860).
[3] Digital Personal Data Protection Act 2023.
[4] Shreya Singhal v Union of India (2015) 5 SCC 1.
[5] Indian Computer Emergency Response Team (CERT-In), ‘Functions and Roles’ (Government of India).
[6] National Cyber Crime Reporting Portal https://cybercrime.gov.in.
[7] See RBI, ‘Cyber Security Framework in Banks’ (2016 Circulars); TRAI, ‘Regulations on Data Security and Consumer Protection’; CBI, ‘Charter of Functions’.
[8] Ministry of Home Affairs, Citizens lost over Rs 22,845.73 crore to cyber criminals in 2024; 36.37 lakh incidents reported, Lok Sabha Reply (22 July 2025) https://ai.economictimes.com/news/india/citizens-lost-over-rs-22845-crore-to-cyber-criminals-in-2024-govt/articleshow/122834896.cms.
[9] Ibid.
[10] Shreya Singhal v Union of India (2015) 5 SCC 1.
[11] Ibid.
[12] Ministry of Home Affairs (n 8).
[13] Ministry of Home Affairs, Cyber fraud cases jumped over four-fold in FY 2024, caused ₹175 crore losses (cases ≥₹1 lakh), Parliamentary Reply (12 March 2025) https://government.economictimes.indiatimes.com/news/secure-india/cyber-fraud-cases-jumped-over-four-fold-in-fy2024-caused-20-million-losses-govt-data/118912710.



