Digital Arrest Investigation Procedures - CCITR
Digital Arrest Investigation Procedures - CCITR
DIGITAL ARREST
Investigation Procedures
WHAT IS DIGITAL ARREST?
Scammers often contact and scare potential victims over phone, claiming that the
victim has either sent or is supposed to receive a package containing illegal items
such as drugs, counterfeit passports, or other contraband items.
HIGHLIGHTS
Fraudsters typically call potential victims Fraudsters threatens the victim, that he is
over the phone call, informing that parcel is involved in sending/receiving a parcel containing
detained. illegal drugs, fake passports, etc.
Victims are forced to stay visible on Skype or Fraudsters will be posing as police, CBI, and
other video apps, undergoing "digital arrest." NCB, wearing uniform to appear authentic.
1ST lAYER MULE BANK MULE BANK MULE BANK MULE BANK
ACCOUNT ACCOUNT ACCOUNT ACCOUNT
TRANSFER FUND TO
2ND lAYER
SECONDARY SECONDARY SECONDARY
ABROAD MULE
MULE ACCOUNT MULE ACCOUNT MULE ACCOUNT
BANK ACCOUNT
NOTE: First and second layer mule account holders follow instructions from the kingpin, and all
conversations typically occur on Telegram.
In the first layer of the transaction, the initial beneficiary is often a mule account
operated by someone who is usually unaware of the criminal activities.
In the second layer, most transactions are transferred to different mule accounts,
where the account holders are partially aware of the fraudulent activities. These
accounts may be located in India or abroad, such as in Dubai.
In the third layer, funds from various bank accounts are transferred to the kingpin's
foreign bank account, who typically resides outside the country. In some cases, the
funds are converted into cryptocurrency on exchanges like Binance using P2P
transactions, where the fraudster pays high fees to exchange currency with a crypto
vendor. In some cases, a burner credit card is purchased using cryptocurrency or
foreign currency.
In the final stage, common activities include withdrawing cash, storing funds in non-
custodial crypto wallets, converting Indian Rupees into foreign currencies like
dollars, purchasing goods, or in some cases, converting cryptocurrency back into
fiat currency through foreign P2P vendors, such as those in Dubai.
1 2 3 4 5
IO has to collect
Written complaint information from
IO has to collect all Best practices for Seeking expert
with relevant intermediaries such
the required search & seizure of opinion from FSL/
sections of law for as banks, payment
documents/ electronic device CFSL and final
FIR registration. gateway, wallets,
evidence from the should be followed report of the case.
cryptocurrency
victim.
exchanges,
messengers.
REGISTRATION OF COMPLAINT
□
Duly attested screenshot/printout of text/videochat, supporting
documents related to fraudulent financial transactions.
□ Beneficiary bank account number with IFSC code & other details
BANK
Notice u/s 91 CrPC (section of SKYPE/VIDEO UPI/PAYMENT GATEWAY TELECOM SERVICE INTERNET SERVICE
94 BNSS 2023) to bank to PLATFORMS PROVIDER PROVIDER
furnish details and freeze the
account
In the second layer, most funds are transferred to foreign bank accounts.
Investigate the flow of these funds, which are often transferred via wise
with lower fees or through SWIFT transfers with other banks. Request the
After freezing the 2nd Beneficiary's account, please extract the KYC information from the
KYC details and transaction logs of these foreign bank accounts,
fraudulent account and send it to all intermediaries to check if any accounts exist with the
correlate
same the KYC information, and if necessary, try to freeze any
KYC details.
associated
Use OSINT ToolsIndian assets.
from the QR code below to extract more details of the accused.
In the third layer most of the funds are converted into cryptocurrency such
as USDT, BTC, or ETH using P2P transaction platforms. If the amount is
transferred to any crypto traders, request the following details:
Crypto Exchange
wallet
P2P vendors transfer the
cryptocurrency converted
amount to the kingpin's bank
back into fiat currency
account, and the cash is
through foreign vendors.
withdrawn abroad.
Kingpin Account
After retrieving the user ID of the crypto buyer from P2P Vendor, request
the user details from the exchange. If you obtain the wallet address, use
"Arkham Intelligence" or any other free crypto tracing tool to identify the
endpoint exchange of the transaction.
In many cases, funds are transferred to services like Zeroforex cards such as
Niyo Global, or the fraudster will purchase disposable credit cards. In such
instances, request details from these services.
Ultimately, tracing the banking money trail or cryptocurrency trail with the
help of KYC and other transaction details will assist in arresting the
kingpin.
CCITR | PAGE NO 5
In most of the cases the IP logs received from Microsoft Skype belongs to
Cambodia region this indicate that the video call was made from
Cambodia. Attempt to gather IP addresses that belong to Indian
jurisdiction.
First and second layer mule account holders follow instructions from the
kingpin, and all conversations typically occur on Telegram. Request
details from th0e Telegram app under Section 91 of the CrPC (section of
94 BNSS 2023) for registration and access details.
If a fake police notice is sent via email by the fraudster to the victim, use
OSINT tools to gather information about the email. Then, retrieve details
from the email service provider under 91CrPC (section of 94 BNSS 2023).
CDR/IPDR Analysis
Request Call Detail Records (CDR) and Internet Protocol Detail Records
(IPDR) to understand the suspect's browsing history.
Based on the IPDR, use Netinfo tool to analyze their browsing patterns.
For example, if the individual uses Domino's server, it may indicate they
have an account with Domino's and are placing orders.
CCITR | PAGE NO 5
Installed
Password programs
manager
(credentials) Photoshop/
editing apps/crypto
wallets
Applications DISK
FORENSICS Files and
documents
Skype/telegram ARTIFACTS
/whatsapp apps
Virtual Browsing
machine/ history
emulators
Applications: Review installed apps like Skype, Telegram, and WhatsApp for
incriminating conversations or files, and search for evidence of
communication or transactions related to the fraud.
Password Installed
manager applications
(credentials)
Wallets/banking apps/
Net banking
crypto wallets
credentials
Photos/ MOBILE
videos FORENSICS Files and
documents
ARTIFACTS
Messengers Browsing
converstions history
Skype/telegram
/whatsapp
Installed Apps: Search for installed apps on Android or iOS devices that
could be related to fraudulent activities, such as payment apps like PhonePe,
Google Pay, PayPal, and various cryptocurrency wallets.
After freezing the 2nd Beneficiary's account, please extract the KYC information from the
fraudulent account and send it to all intermediaries to check if any accounts exist with the
Files and
same KYCDocuments:
details. Examine the phone's file manager for any incriminating
evidence that
Use OSINT might
Tools be QR
from the stored in files
code below and documents
to extract onthe
more details of the device.
accused.
Photos and Videos: Search the device for photos and videos that may
contain incriminating evidence related to the case.
CCITR | PAGE NO 5
Author
Manjesh P Shetty,
Consultant, Data Security Council of India
MONTHLY NEWSLETTER