New Delhi | In a major breakthrough, the Delhi Police Crime Branch has exposed a large interstate vehicle theft and fraudulent registration syndicate that allegedly manipulated the government’s vehicle registration portal to legitimize more than 1,000 stolen luxury cars. The gang is accused of converting stolen and loan-default vehicles into “legally registered” assets using forged documents and unauthorized digital access, allowing them to be sold across multiple states.
According to investigators, the network operated across Delhi, Punjab, Haryana, and Himachal Pradesh, functioning in a highly organized and technology-driven manner. So far, 10 individuals have been arrested, while 31 high-end vehicles including Toyota Fortuner, Innova, Mahindra Thar, Scorpio, and Hyundai Creta have been recovered during the operation.
FCRF Academy Launches Premier Anti-Money Laundering Certification Program
Officials revealed that the alleged mastermind of the racket is a government employee posted in Himachal Pradesh, who is suspected of misusing his access to government digital infrastructure. He is believed to have enabled unauthorized entry into the vehicle registration system, allowing fake records to be inserted and stolen vehicles to appear legitimate in official databases.
The investigation shows that the syndicate initially procured vehicles either through theft or by purchasing loan-defaulted cars at heavily discounted prices. Once acquired, technical specialists within the gang altered chassis numbers and other identifying details to erase the original identity of the vehicles.
After this, a set of forged documents was prepared, including fake Form-21 certificates, counterfeit bank NOCs, and fabricated ownership records. These documents were then used to push the vehicles through official-looking registration processes, making them appear fully compliant and legally transferable in the system.
One of the most alarming findings is the exploitation of the government vehicle portal itself. The gang allegedly used stolen login credentials and OTP-based unauthorized access to register vehicles directly into the system. Once entered, these vehicles appeared completely legitimate in official records, making it extremely difficult for enforcement agencies to detect discrepancies at the time of resale.
Authorities further stated that the scam was not limited to vehicle resale alone. Several of these fraudulently registered vehicles were reportedly used in other criminal activities, including drug trafficking and organized transport of illegal goods. The authenticity of registration documents allowed them to pass routine police checks without raising suspicion.
The arrested individuals include Damandeep Singh (alleged mastermind), Subhash Chand (government employee), Pradeep Singh (chassis alteration expert), Kamaljeet alias Jolly, Arvind Sharma, Amandeep, Manbir Singh, Brij Mohan Kapoor, Pradeep Singh alias Heera, and Hemraj Singh. All accused are currently under interrogation, and investigators are working to map the full extent of the network.
Cyber crime experts have highlighted the evolving nature of such offences. Renowned cyber crime expert and former IPS officer Prof. Triveni Singh stated that, “Such cases now represent a hybrid model of crime where physical theft is combined with deep digital infiltration of government systems”. He emphasized that “Without multi-layer authentication, strict access control, and continuous auditing of digital portals, such networks are extremely difficult to prevent”.
Police have advised citizens to exercise extreme caution while purchasing second-hand vehicles. Buyers have been urged to verify registration certificates, chassis and engine numbers, bank hypothecation status, and NOC documents directly with authorities. Timely ownership transfer and complete verification of vehicle history have also been strongly recommended.
Investigators believe this racket may only be one part of a much larger network connected to similar vehicle theft syndicates operating across multiple states. Digital forensic analysis of server logs, transaction trails, and communication records is currently underway. Officials expect further revelations as the probe deepens into the financial and operational structure of the syndicate.