Search

Advanced Search

Inauguration of the eFIR Integration System for Cybercrime Complaints in New Delhi

Informatics News Desk, NIC-HQ newsdesk[dot]info[at]nic[dot]in
  |   May 17, 2025
The first e-FIR was generated and handed over to Union Home Secretary Shri Govind Mohan
The first e-FIR was generated and handed over to Union Home Secretary Shri Govind Mohan

The Hon’ble Union Home Secretary, Shri Govind Mohan, inaugurated the eFIR Integration System for Cybercrime Complaints at a ceremony held at Vigyan Bhawan, New Delhi. This advanced system has been developed by the Indian Cyber Crime Coordination Centre (I4C) under the Ministry of Home Affairs, with the goal of streamlining and accelerating the FIR registration process in high-value cybercrime cases.

The launch event was attended by several dignitaries, including the Special Secretary (Internal Security), Commissioner of Delhi Police, and senior officials from the Reserve Bank of India (RBI), Department of Telecommunications (DoT), Ministry of Electronics and Information Technology (MeitY), as well as representatives from the NIA, CBI, and Financial Intermediary Units.

The first official eFIR was generated and ceremoniously handed over to Shri Govind Mohan by the Commissioner of Delhi Police, Shri Sanjay Arora.

A detailed presentation on the system’s functionality and strategic value was delivered by Smt. Rashmi Sharma Yadav, DCP, who highlighted the collaborative efforts of I4C and multiple stakeholders in developing this robust and efficient platform.

Key Features of the eFIR Integration System

  1. Complaint Registration via Helpline 1930
    Citizens can report cybercrime complaints via the 1930 helpline. The complaint data is stored on the NCRP server.

  2. Auto-Trigger of eFIR for High-Value Cases
    If the reported loss is INR 10 lakh or more, the system’s API triggers an eFIR request to the Delhi Police server. The eFIR is then generated and sent back to the NCRP portal.

  3. eFIR Visibility
    The eFIR is immediately visible both on the NCRP portal and to the concerned Cyber Police Station.

  4. Integration with CCTNS
    The Delhi Police server pushes the generated eFIR to the Crime and Criminal Tracking Network & Systems (CCTNS) platform, ensuring nationwide visibility and tracking.

  5. Complainant Verification
    The complainant must visit the designated Cyber Police Station within 3 days to sign and verify the FIR.

The eFIR Integration System represents a major milestone in the modernization of cybercrime complaint handling in India. By automating the registration process for high-value cases, it significantly reduces response time and improves coordination between law enforcement and regulatory bodies.

This initiative is part of the government’s broader mission to make policing more efficient, transparent, and citizen-friendly. It empowers victims of cyber fraud—particularly those involving significant financial losses—with a faster, more reliable route to justice. At the same time, it enhances inter-agency data sharing and case tracking for officials.

As cyber threats continue to evolve in scale and sophistication, innovations like the eFIR system signal the government’s resolve to stay ahead of the curve. It is more than a technological upgrade—it is a meaningful stride towards a safer digital ecosystem for every citizen.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...