logo
Dark Web, VPNs: Delhi Cops Scramble To Probe Bomb Threats To Schools

Dark Web, VPNs: Delhi Cops Scramble To Probe Bomb Threats To Schools

NDTV16-07-2025
New Delhi:
A fresh wave of bomb threats targeting schools and colleges has kept Delhi Police on its toes as many education institutes panicked for three days straight, with senior officers saying the emails were sent using encrypted networks, making them hard to track.
Cyber experts of the Delhi Police and senior officers investigating the threats said the senders are using Virtual Private Networks (VPNs) and the dark web.
The dark web is a part of the internet that is not indexed by traditional search engines and is accessible only through special browsers, allowing illegal activities such as cybercrime, human trafficking and drugs and weapons trade to thrive. VPN adds a layer of anonymity by allowing users to create a secure connection to another network.
"Tracking someone on the dark web is like chasing a shadow in a room full of mirrors. The moment you think you have found a lead, it vanishes behind another layer of anonymity," a Delhi Police officer explained.
Ten bomb threat emails have been received by nine schools in the city in the past three days. Last February, a private school and a Delhi University college in the capital received bomb threat emails, which were later confirmed by authorities to be hoaxes.
In October last year, an explosion occurred outside the CRPF school in Prashant Vihar, but no one was injured. In January this year, police arrested a Class 12 student who had allegedly sent bomb threats to over 400 schools.
Amid growing concerns over such threats, the Directorate of Education (DoE) issued a comprehensive 115-point Standard Operating Procedure (SOP) in May to handle bomb threats in schools.
Sources said that each of the recent emails carried a similar pattern: vague but alarming language, timed before school hours and often routed through international servers. Police believe that the sender or the group involved is adept at using anonymising tools and cyber tactics to avoid detection.
"It is not easy to trace emails that are routed through multiple proxy servers. They are using VPN chains and tools on the dark web to bounce their location across several countries. In such cases, even service providers are often helpless," a source said.
A cyber expert of the Delhi Police said the investigating officers are no longer treating the threats as a mere prank.
"Multiple probe agencies are involved in investigating the matter. These threats are affecting children, parents and the school staff psychologically," the expert said on the condition of anonymity.
During a press conference, a senior Delhi Police officer said that the use of VPN by the sender of the emails significantly hampered efforts to track the threat.
"We were tracking the emails, but VPN makes it difficult to track their origin. We also had to check for any possible terror link," he had said.
The recurring threats have caused considerable anxiety among parents and teachers.
At St Thomas School in Dwarka, which received two threats in less than 24 hours, Rakesh Arora, the father of a 12-year-old student, said, "Schools receiving bomb threats is very worrying. It not only creates fear but also disrupts the children's studies.
"These may turn out to be hoaxes, but as parents, we can't help but be scared," he said.
On Tuesday, Varun Kumar, whose daughter is a kindergarten student, said, "This is not the first time. These kinds of threats are happening quite often. Police must take strict action against those responsible for sending such emails. It creates unnecessary panic and disturbs everyone." "Parents are genuinely scared to send their children to school now," Kumar added.
Following the DoE's SOP, schools have tightened their security protocols, increased bag checks, restricted outsider entry, and are coordinating with the local police stations on a daily basis.
Police said that they are not ruling out any angle in their probe into the threats.
"The January case had revealed a possible link to a civil society group and a political entity, which had drawn significant attention. The accused student's father was reportedly associated with an NGO that had previously supported terrorist Afzal Guru," a senior police officer said.
Police have urged people not to panic over such threats and to report any suspicious activity. They have issued advisories and hold interactive sessions in schools from time to time, informing stakeholders how to handle threat emails and maintain evidence that could help in tracking the perpetrators.
Police said that they are studying earlier cases where the teams have arrested the accused for sending bomb threats to learn how they solved the cases.
(Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Madras HC awaits SOP non-consensual images
Madras HC awaits SOP non-consensual images

Hindustan Times

time28 minutes ago

  • Hindustan Times

Madras HC awaits SOP non-consensual images

The Madras high court is awaiting a standard operating procedure (SOP) from the Centre for victims to follow if videos and photos get uploaded online without their consent, to be taken down. Justice Anand Venkatesh said that he would pass a judicial order, after the SOP is submitted. The court was hearing the plea filed by a woman advocate stating that her former partner had released videos and photos of their intimate moments, filmed without her consent, on social media and pornographic sites (ANI) The court was hearing the plea filed by a woman advocate stating that her former partner had released videos and photos of their intimate moments, filmed without her consent, on social media and pornographic sites. The HC on Tuesday issued a direction to the Union minister of electronics and information technology to ensure that six video links where the videos and photos continue to resurface, is effectively blocked and 'it shall also be ensured that it does not resurface again…This Court wants to await for the Standard Operating Procedure to be evolved by the concerned department and once the same is filed before this Court, the same can be acted upon and a judicial order can be passed'. According to the court, the case 'is a pathetic story of a young girl who was misled' during her college days by a person who in the guise of loving her, made false promises to marry her but 'subjected her to repeated sexual exploitation which was filmed without her knowledge and was transmitted across the internet.' The petitioner, who now practices in the high court, is reportedly struggling to remove this content. She came to know about her videos and photos online through a friend, and filed a police complaint in April that it was shared across 70 websites and downloaded on Telegram, Google drive and more. She was questioned by peers and clients over it and felt publicly shamed. Under the Information Technology Act, 2000 and Rules, the Union minister of Ministry of Electronics and Information Technology is the only authority to issue directions for blocking and removal of such material, the court said, adding that since her petition to them was not acted upon, she moved the high court. She has sought take down notices to be issued to all intermediaries, websites, pornographic platforms, telecommunication service providers to detect, remove, and block all content of her Non-Consensual Intimate Imagery (NCII) by using technological solutions that detect exploitative images of children such as Hash Matching Technology, Artificial Intelligence-based content recognition tools including Photo DNA, Google content safety Hash checkers. These photos and videos are being downloaded, uploaded,shared, transmitted and distributed all over the internet, she said. In the hearing on July 15, the court had directed the Union ministry to ensure that the videos and photos do not resurface and the technology that has been discussed in the order passed by high courts in Delhi and Karnataka in related cases should be adopted. If the ministry is able to completely block the intimate images and videos and also prevent the same from resurfacing, it will be a test case which can be applied in future to handle the situation more effectively, the court had said in the last hearing. When the case was heard on Monday, the petitioner's senior counsel submitted to the court the videos and images continue to exist in at least six video links. Senior panel counsel A Kumaraguru, appearing for the Electronics and Information Technology Ministry, informed the court that the Home Ministry and Women and Child Welfare Department are in the process of finalising an SOP as was suggested by the judge in the previous hearing and required more time. He added that the home ministry has released a press note calling for every city to appoint a Chief Information Security Officer (CISO) to safeguard data and systems against cyber threats. The ministry has also urged states and city administrations to conduct regular security audits and to ensure protection from cyber threats. The court also decided to seriously consider Tamil Nadu's public prosecutor Hasan Mohamed Jinnah's suggestion that the ban on publishing any material that could reveal the identity of a victim in Protection of Children from Sexual Offences (Pocso) cases should be extended to all sexual crimes against women. The public prosecutor also confirmed that the name of the petitioner has been removed from the FIR and all other documents as directed by the court to protect her identity. Magistrates must insist for FIR to be produced in a sealed cover in such cases, he added. 'The submissions made by the learned State Public Prosecutor require serious consideration,' the court said. During the previous hearing, the court came down heavily on the Tamil Nadu police since the petitioner's name was mentioned in the FIR and 'shockingly the victim girl informed that the video was witnessed by the male police officers and they were asking for the identity of the person to the victim girl.' The court posted the case to August 5.

Special cell nabs Babbar Khalsa man from MP
Special cell nabs Babbar Khalsa man from MP

Hindustan Times

timean hour ago

  • Hindustan Times

Special cell nabs Babbar Khalsa man from MP

The special cell of Delhi Police on Tuesday arrested from Madhya Pradesh a 22-year-old suspect allegedly linked to the pro-Khalistani terror outfit, Babbar Khalsa International (BKI), in connection with an April 7 grenade attack at Qila Lal Singh police station in Batala, Punjab, officials said on Wednesday. Officials said he was deliberately avoiding contact with known associates and relatives. (AFP) The accused, identified as Akashdeep alias Baj, a resident of Batala, was apprehended from Indore following an intelligence-led operation, the officials added. Deputy commissioner of police (special cell) Amit Kaushik said that Akashdeep played a facilitating role in the grenade attack. 'Following the incident, BKI had released threatening messages on social media, which included references to Delhi. The special cell, which has been proactively working against terrorist and gangster networks, initiated a targeted operation to trace and apprehend those behind the attack,' he said. Eluded capture by shifting locations Initially, intelligence inputs suggested that Akashdeep had fled to Gujarat. He was tracked briefly there, but he kept changing locations to evade arrest. Eventually, he surfaced in Indore, where he had taken up work as a crane driver at a construction site. Officials said he was deliberately avoiding contact with known associates and relatives. 'He was maintaining a low profile, making it challenging to trace him. However, based on continuous surveillance and technical inputs, he was finally located and arrested from Indore,' Kaushik said. Links to BKI handlers abroad Police said that during interrogation, it was revealed that Akashdeep was allegedly in direct contact with BKI handlers based abroad and played a role in facilitating the logistics of the grenade attack. 'He was a key facilitator in all BKI-led attacks. We are still verifying the extent of his role. While he is not named in any previous criminal cases and appears to be a first-time offender, his links to terror operatives are being thoroughly probed,' the DCP added. The National Investigation Agency (NIA), which is also investigating the larger BKI module operating in North India, has been informed. The Delhi Police has recently set up a dedicated operational cell within the Special Cell to focus on Khalistani and terror-related threats. Officials said this cell is actively monitoring pro-Khalistani networks, particularly those operating in or targeting Delhi and its neighbouring states. 'The post-attack threats issued on social media by BKI operatives had specifically named Delhi as a target. Since then, our teams have been on alert. This arrest is a part of our broader counter-terror operations to prevent any untoward incident in the Capital,' another senior officer of the special cell said, asking not to be named. Pan-India conspiracy under scanner When asked whether the accused had any role in planned activities in Delhi, officials said that while the threat perception remains high, it would be premature to disclose operational intelligence. 'The accused is being questioned about his links to other operatives and any possible plans targeting Delhi or other states. Further revelations will depend on the ongoing investigation,' the officer said. Officials, however, did not rule out links with other terror suspects arrested in Punjab earlier this month, including individuals allegedly associated with ISI-backed networks. 'BKI, in coordination with ISI, continues to carry out subversive activities, particularly in Punjab and surrounding states. We are closely examining any common linkages between the arrested individuals,' added Kaushik. While financial transactions and digital footprints are being scrutinised, the police maintained that they will share detailed findings once corroborated evidence is available. After the powerful explosion near the Qila Lal Singh police station, BKI had claimed responsibility for the attack via a social media post. The group stated that a rocket launcher was used in the assault, which targeted the vicinity of the police station. The group stated that the attack was carried out in retaliation for the deaths of Sikhs in past encounters in Pilibhit (Uttar Pradesh) and Batala.

A wad of ‘cash', a plea for help: 3 of family held for duping women of their gold jewellery in Outer Delhi
A wad of ‘cash', a plea for help: 3 of family held for duping women of their gold jewellery in Outer Delhi

Indian Express

time3 hours ago

  • Indian Express

A wad of ‘cash', a plea for help: 3 of family held for duping women of their gold jewellery in Outer Delhi

A crowded market, a bundle of fake notes, and a cry for help- this is how three family members allegedly duped several women of their gold jewellery in the Outer Delhi markets. The trio identified as Laxman, his wife, and their daughter-in-law, was arrested by the Delhi Police on Monday. Upon questioning, the police found out the family duped women using a carefully orchestrated modus operandi of defrauding. The trio, as police terms, were gaddibaz (bundle users) fraudsters. In this type of fraud, a couple of Indian currency notes is placed on top of a bundle of paper, making it look like huge wads of cash, and offered to the customers in exchange of something. According to the police, the case came to light on Monday, when a team of the Special Staff of the Outer District received a tip-off about individuals trying to dupe women in the Ranhola market. 'While patrolling near Sai Baba Mandir, Vikas Nagar, the team received a tip-off about the presence of suspicious individuals who were reportedly cheating people….,' DCP (Outer) Sachin Sharma said. When the police reached the spot, a man and two women were seen interacting with another woman who was a passerby. The man had his hands folded, while the women were dangling a bundle of notes in front of the passerby, the police said. 'Upon noticing the police presence, the trio attempted to flee, but the alert staff acted swiftly and apprehended all of them,' DCP Sharma said. On how the family went about duping women, a police officer said, 'The trio targeted women in markets, who came from low-income localities, and wore modest gold jewellery. They would tell the victims that they have to go to their village as their son is on his deathbed. Then, the trio would show the women currency notes and tell them that they are scared to carry the cash in the train. They would then offer to exchange the currency notes for the jewellery the women are wearing.' When the women would tell the accused that the money offered is more than the value of their jewellery, the family would start sobbing, the officer added. 'They would say their son's life is more important,' the officer added. According to the police, the crying coupled with the prospect of getting huge amounts of money in exchange for the cheap jewellery made them feel less suspicious of the family's intentions. Upon questioning the trio, the police found out that the family had targeted a woman also on July 17. 'The accused admitted to having duped a woman in the jurisdiction of Ranhola. It was found that a case had already been registered in this regard under sections 303(2), 318(4), 3(5) of the Bharatiya Nyaya Sanhita (BNS),' DCP Sharma said. According to police officers, gaddibaz fraudsters are becoming more prominent in the outer district of the Capital. In July alone, over 15 such fraudsters have been arrested. 'It's difficult to control them. They come out of jail easily and keep repeating the offence. They are in touch with each other and help other groups in targeting unsuspecting women,' an officer said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store