Cyber Crime Enquiry Cell , Idukki


Cyber Crime Enquiry Cell, Idukki started functioning in 2008 vide PHQ order No. c1-105879/06 dated 08.08.2008.

Situated at

This unit is functioning in the 2nd floor of Civil Station Building, Kuyilimala.

Cyber Crime Enquiry Cell, Idukki is ought to give technical support and advice over every cyber related matters and crimes, that being reported in the district. Major Cyber Crimes reported in the district are as follows.

  • Email account Hacking/abuse
  • Online Cheating/ Frauds
  • Abuse over other social networking sites
  • Web site hacking/defacing/Content theft
  • Disseminating obscenity over social networking sites/ applications
  • Face Book account Hacking/fake account/abuse
  • Mobile Phone abusing
  • ATM frauds


In view of public interest, Cyber Cell is permitted by the District Police Chief to impart classes and awareness programs on Cyber Crimes under the aegis of Janamaithri Police, various other organizations, School/ College Managements. As of now, more than 500 Classes were imparted to various schools and organizations by Cyber Cell.

Cyber Cell is authorized to

As of now, Cyber Cell is not receiving any petitions directly, instead, it is received in the District Police office and later it is endorsed to cyber cell. General public, those who belongs to the distant places from the DPO can lodge their cyber related complaints in any of the Police stations/ offices with in the district.

Normally, Police stations in the District, on receipt of any petition in which cyber aspects pertains to, contacts cyber cell for assistance. As per the instruction from the then District Police Chief, no petitions are being received in the Cyber Cell directly since June 2013

  • Cyber Cell is authorized by the District Police Chief, to obtain Call Details Records and IP (Internet Protocol) address details, from various Service Providers to cater the needs of crime investigation by various Police Stations in the District.
  • IT certificates that to be submitted to various courts are also being handled by the Cyber Cell.
  • Cyber Cell is authorized to look after all the Cyber security matters of the entire district.
  • Cyber Cell personnel used to render supports to all the Police Stations, while seizing and acquiring any computer or its peripherals, as part of investigation.
  • Idukki Cyber cell strength comprises of one SI, Two SCPO(G) and two CPOs.

Cyber Security Tips

Following security tips helps an individual to use his Computer and related accessories securely and efficiently.Remember these tips while you are working with a computer , or using a mobile phone , or while accessing Internet.

Use anti-virus software.

A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!

Be a responsible cyber citizen.

If you use the Internet, you're a citizen of a global community&mdasha cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws.

Do not open email from unknown sources.

Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension&mdasheven if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe.

Back-up your computer regularly.

Help your family back up all household computers onto external media such as CD&rsquos or diskettes.

Regularly download security protection update &ldquopatches&rdquo.

Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own.

Use passwords for protection

You wouldn't leave sensitive documents laying out for prying eyes likewise, you need to put away the information stored on your computer in a safe place: locked behind a password in your own user account.

Even if you are a true Luddite and never intend to go online, you'll still want to password protect your computer. That's because if you have a snoopy houseguest or if a thief picks up your laptop, they could get at your information as you sleep if it's not password protected. Set up a separate user account for others to surf on so you keep your sensitive information private.

HOW TO: For Windows-based machines, go into the control panel, choose user accounts and follow the instructions. Mac users must create a password upon using the computer for the first time and they can change their password settings by going into system preferences. There they can disable automatic login. (If you get stuck, ask a trusted techie for assistance. That goes for all these tips.)

Get your guard up

Before merging with the information superhighway, you're going to want to make sure that all the existing security settings your computer comes with are turned on. If you want to go out and buy added protection later, that's great. Just make sure you have basic protection enabled before going online.

First, fire up the firewall. Your computer should come with a firewall, or perhaps a software package came bundled with your purchase that includes a firewall. It's basically a set of programs that work together to enforce the safety rules you outline when you choose a security level. The firewall is the gatekeeper for Internet activity. The default setting is usually on, but you'll want to verify that it's on if you don't see the firewall icon when you turn on the computer.

Go into the control panel to find the security settings, says Jennifer Leach, a consumer education specialist with the Federal Trade Commission. The higher you set your security, the more you are going to screen out, dangerous and harmless. According to Leach, medium to medium-high is fine for most people.

"If you're extremely cautious and you want to set it high, your friends might start telling you you're not getting their e-mails or you might see Web pages aren't loading. I think if you set them pretty low, a lot of stuff's going to creep through," she says.

Avoid going public

Public cafes are great for surfing, but you really need to recognize the risk of inputting confidential information. There's not much you can do to improve information safety at a public computer. You're at greater risk because you're dependent upon on a third party for security.

"Someone else who came in before me might have put in a flash stick that is gathering information," says Miner.

"I would seriously consider if you want to use a shared computer that remotely relates to confidential or identity information," Marcus says, "simply because you don't know if it's got a keyword logger or if all the tracking is turned on on that machine.

"It's a large risk that people really need to weigh. If there's no other access available and there's no other way of getting it done, you take the risk. But if it can wait until you can get home, it might behoove you to wait."

Watch your phones and PDAs

Remember, smart phones and PDAs are computers too, which raises two real risks: software security breaches and physical security breaches, such as when you lose the phone. Luckily, consumers can proactively find solutions to keep cell phones safe, just as on home computers.

You should always password lock your phone in case it goes MIA. That will make it harder for a thief to get at your information. Then, call your operator to have the phone locked, if possible, or your subscription canceled.

Threats to mobile software are growing, so it's important to protect yourself by downloading security software to your smart phone or PDA. Traditionally, crackers, the nickname for criminal hackers, haven't been much of a threat to cell phones because older models were essentially dumb boxes, but now the devices are getting smart -- and so are thieves.

"Nowadays, we are carrying around what is essentially a mini-PC that also happens to be a phone," says Sunner. "Because it is that much smarter, it of course is that much more open to abuse. I think, from that perspective, all the same paranoia I would use with my PC, I would apply to my phone as well."

If you're going to engage in mobile banking, even though banks are trying to protect their customers on their end, you should have some sort of mobile security just as you have on your home computer, says Miner.

"The average consumer trusts their device. But as soon as you start putting confidential information -- passwords, identifiers -- that you're then going to send to the bank, that now becomes information either on your cell phone, at risk, or over the air, at risk," he says.

"People should know that what's sent over to them can be pulled out of the air," says Leach. "PDAs should never be used to send Social Security numbers or financial information. Same with cell phones, actually. I hear people all the time in public giving things, that first of all, anyone could overhear, but also that anyone with that kind of scanner could pull out of the air."

Be aware of the kinds of information you send over a PDA because it might not have the kinds of protections that you think it does. When in doubt, get to a landline or a secure computer.

Clean up by yourself

Before selling or recycling your old computers, mobile phones , or storage devices such as pen drives etc wipe the system with some softwares which delete the data permanently. Simply deleting files and emptying the trash bin doesn't mean they can't be recovered by anyone motivated to uncover them.

Last updated on Monday 23rd of May 2022 AM