The concept of a Zero First Information Report (FIR) was born out of one of India’s darkest chapters, the 2012 Nirbhaya case. The recommendations of the Justice Verma Committee (2013) highlighted a fatal flaw: victims were being turned away by police stations claiming a “lack of jurisdiction”, thereby losing the golden hour for evidence collection. A Zero FIR allows a victim to file a complaint at any police station, which is then assigned a serial number of “0” and transferred to the jurisdictional station after primary action is taken.
In 2026, the “borderless” nature of the internet has made Zero FIRs more relevant. A tool once used to protect against physical violence now serves as a significant weapon in the fight against digital crime. This article aims to tackle two matters: firstly, to examine how the Zero FIR has developed from a noble principle of law into a practical tool for the enforcement of the Bharatiya Nagarik Suraksha Sanhita (BNSS) and secondly, to highlight gaps in the implementation of this concept that restrict its effectiveness as a means of preventing cyber crime.
Zero FIR as a Legal Concept
The Supreme Court, in Lalita Kumari v. Government of U.P. (2014), held that if a police officer believes a complaint constitutes a cognisable offence, they must register an FIR and investigate the alleged offence. The rationale for this is clear. The police should focus primarily on crimes being committed rather than on the locations where they occurred. Before the enactment of the BNSS, Zero FIRs were established solely through judicial precedent and executive advisories issued by the Ministry of Home Affairs (MHA). The BNSS has now granted formal statutory acknowledgement to the Zero FIR concept. Section 173 of the BNSS states that the police must register an FIR regardless of jurisdiction. As such, geographical restrictions do not apply to the registration of an FIR.
The law is clear on this: a police officer has no discretion to refuse a Zero FIR. Failure to register an FIR for specific serious offences can lead to prosecution of the officer under Section 199 of the Bharatiya Nyaya Sanhita, 2023 (BNS). Section 199 provides for punishment for failing to treat victims or for refusing to record information.
Cyber Crime and the Jurisdiction Problem
Cybercrime perpetrators operate in a network of virtual space rather than a single physical place. Newspapers and online news platforms are full of stories about people losing money to various forms of fraud. In these cases, the victims transfer money to accounts situated in an altogether different jurisdiction. The limits of territorial jurisdiction constrain law enforcers, thus creating a procedural difficulty in establishing original jurisdiction. The “Zero FIR” provides a universal, accessible channel for any police station to register a case.
Digital evidence, such as dynamic IP addresses, is notoriously ephemeral. In such situations, registration of a Zero FIR can enable an agency to freeze funds or preserve relevant digital evidence, independent of territorial considerations, before the evidence trail goes cold.
States resort to a procedural shield by deflecting responsibility through jurisdictional and procedural formalities, thereby avoiding substantive action. There is a “procedural loop” in which police departments direct victims to the National Cyber Crime Reporting Portal (NCRP) or its “1930” helpline. The numbers reveal a massive shortfall, with only 2.43% to 2.63% of complaints processed into FIRs.
The Gap
The January 2026 “eZero FIR” project, aimed at automating high-value fraud cases, has significant bottlenecks. The cases of lower pecuniary value remain stuck in the “complaint status” for months. Moreover, the current police apparatus is also extremely overwhelmed by the volume of cyber crime incidents.
The MHA runs the Indian Cyber Crime Coordination Centre (I4C). This dedicated unit supports state law enforcement agencies through tools such as the Samanvaya platform for sharing data and analysing cross-state cyber crime patterns. It backs Joint Cyber Coordination Teams in key areas to tackle multistate cases and runs the NCRP to direct complaints to the right states. However, even these efforts face persistent procedural gaps, such as low FIR rates, jurisdictional delays, and skill shortages.
Consequences and Patterns of Non-Implementation
In cyber crime, time is extremely precious. Every hour lost to jurisdictional delays reduces the chances of recovering losses and catching the criminals. In the time it takes to register a regular FIR after weeks of detailed “verification”, the digital evidence trail can be overwritten or deleted. These bureaucratic and procedural delays harass victims. Furthermore, inefficiencies are exacerbated by officers who are unwilling to do their work. Consequently, only 2.43% to 2.63% of complaints reach the stage of an FIR, leaving the victim vulnerable to delayed justice.
From a practical standpoint, the efficiency of Zero FIR in cyber crime cases is constrained by a lack of technological awareness in local stations. It stalls due to a lack of interoperable infrastructure among state cadres. Presently, the transition from Zero FIR to regular FIRs involves transferring data to the jurisdictional station. For a first responder, the Zero FIR is currently a paper tiger (a symbolic procedure lacking practical enforcement) without a digital backbone, rendering the initiative sound on theory but impractical in practice.
Bridging the Gap: Practical Solutions
To emerge from this “paper tiger” conundrum, Indian authorities need to shift from a territorial mindset to a network mindset. One solution is to implement compulsory technical training for specialist “Cyber First Responders” at each local police station. These need to be done in the context of a “Unity of the Digital Front” framework that smoothens the “Zero FIR to Registration” process through real-time data exchange, including within states. Another solution is to automate the conversion of voluminous complaints into FIRs through the automated notification system under Section 175(3) of BNSS. This would allow the legal system to avoid the “procedural shields” that impede the process.
Conclusion
Zero FIR has undergone a drastic change from being a recommendation of the Verma committee to Section 173 of the BNSS, giving it statutory weight. The central issue in enforcing the zero FIR is the conversion rate of just 2.63%. Jurisdictional delays from the station play a significant role in virtual space, where multiple locations are involved. There is also a lack of digital skills in the current police workforce.
Lastly, there is a high probability of losing digital evidence. All these issues lead to frustration for victims and massive financial losses. The frustration even leads to erosion of trust in the justice system. To prevent erosion, zero fir must be accompanied by cyber first responder training, unifying the current distributed system into a single unified platform, AI analytics, and automation. These additions to the zero FIR are not mere recommendations but basic requirements to make it functional for swift justice in cyber crime cases.
