What digital arrest scams are really doing
Digital arrest is not a legal process. It is a coercive scam script where criminals impersonate police, CBI, customs, telecom, courier, or financial-crime officials and convince the victim that they are under investigation.
The scam usually begins with a frightening claim: a SIM card is linked to crime, an Aadhaar number is misused, a courier contains narcotics, or a bank account appears in a money-laundering case. From there, the victim is moved to a video call and told not to contact family, lawyers, or local police.
The goal is isolation. Once the victim is emotionally cut off from normal support, the fraudsters create a fake verification process and pressure them to move money into so-called safe, RBI, court, or investigation accounts.
“The phrase 'digital arrest' is itself a warning sign. Real agencies do not keep citizens under video-call custody to verify bank balances.”
Related context
Continue with the wider Cresnex research library
This article is part of a broader Cresnex library on cybersecurity, AI risk, online fraud, and India-specific digital trust. Use the links below to continue reading related explainers and research briefs.
Recent case files show how high the losses can become
In Pune, an 87-year-old retired corporate executive was reportedly duped of Rs 3.46 crore after fraudsters posed as telecom and senior CBI officials. Reporting by The Indian Express and India Today described how the victim was told a fake CBI Director would handle the inquiry through video call, and money was routed through mule accounts presented as RBI verification accounts.
In Delhi's Greater Kailash, police chargesheet reporting described a Rs 14.85 crore digital arrest case involving an elderly couple. The investigation pointed to multiple accounts, including NGO-linked fronts and company accounts, allegedly used to route the stolen funds.
Another Delhi case involving an elderly NRI couple was reported as a 16-day digital arrest in which about Rs 14 crore was lost. The pattern matters more than the headline number: long-duration isolation, fake institutional authority, and repeated payments under fear.
Rs 14.85 crore
Single reported Delhi digital-arrest loss
Recent police chargesheet reporting shows how mule accounts and entity fronts can turn one victim journey into a large laundering chain.
The infrastructure behind the call: mule accounts, entity fronts, and remote access
The person on the video call is only the visible layer. Behind the call may sit domestic account suppliers, mule handlers, remote-access operators, and overseas coordinators who distribute funds quickly after each transfer.
Investigations reported in major Indian newspapers show that bank accounts linked to NGOs, private firms, travel entities, and other fronts can be misused to receive and move stolen money. This makes the scam look less like a random call-center trick and more like a laundering workflow.
Some cases also involve malicious APKs or remote-access tools. Victims may be told to install an app for verification, complaint filing, or official monitoring. That can expose messages, email, banking screens, and authentication prompts.
The 1930 response blueprint: what to do in the first hour
If a call claims you are under digital arrest, disconnect immediately. Do not argue, prove innocence, send documents, or continue the video call. A real investigation will not require secrecy from family or an instant transfer to a verification account.
Preserve evidence quickly: screenshots, phone numbers, profile photos, bank details, transaction IDs, chat messages, video-call handles, and any documents sent by the scammers.
Call the national cybercrime helpline 1930 as soon as possible, especially if money has already moved. Then file a detailed complaint at cybercrime.gov.in. Fast reporting improves the chance that banks and law enforcement can trace or freeze money before it moves through more layers.
