app-store-logo
play-store-logo
February 17, 2026

International Telecom Syndicate Smashed: Illegal ‘SIM Box’ Racket Uncovered

The CSR Journal Magazine

In a breakthrough operation against digital cross-border crime, the Bidhannagar Commissionerate has dismantled a sophisticated international telecom fraud network. The syndicate, reportedly spearheaded by a Bangladeshi national, utilized high-tech “SIM Box” technology to facilitate massive extortion schemes, including a recent ₹3 crore heist involving fake federal agents.

The Anatomy of the ₹3 Crore Scam

The investigation was ignited by a high-value fraud case where a victim was duped out of ₹3 crore. The scammers employed a chillingly common tactic: posing as Central Bureau of Investigation (CBI) officers.

The fraudsters convinced the victim they were implicated in a criminal parcel trafficking case. Using forged documents and the looming threat of immediate arrest, the gang coerced the victim into transferring the massive sum. However, the digital breadcrumbs left behind by these “official” calls led police to a much deeper conspiracy than a simple phishing scam.

Inside the ‘Rogue’ Exchange: How SIM Boxes Work

On February 15, detectives raided a residence in Patwari Bagan Lane, Amherst Street, uncovering what they described as a “full-scale rogue telecommunications system.” At the heart of this operation was the SIM Box—a device capable of holding hundreds of SIM cards simultaneously.

Technical Gateway: This infrastructure acts as an illegal bridge, converting international VoIP (Voice over IP) calls into local cellular signals.

By routing calls this way, the syndicate achieved two goals:

1. Masking: International calls appeared on victims’ screens as local Indian numbers, increasing the likelihood of the phone being answered.

2. Evasion: The setup bypassed government gateways and regulatory monitoring, allowing the criminals to operate “under the radar” of national security agencies.

A Multi-National Web: Bangladesh, Malaysia, and India

The crackdown began with the arrest of Abir Sheikh, a Bangladeshi national, in Baguiati on February 14. Sheikh’s interrogation revealed a sprawling network that spanned several Kolkata neighborhoods, including Rajabazar and Esplanade. To evade detection, the group utilized Bangladeshi VPNs and virtual numbers.

The investigation has since uncovered a complex international hierarchy:

The Kingpin: Authorities have identified Biplab Hossain, a resident of Tripura, as the suspected mastermind.

The Malaysian Connection: Police are hunting for Chung Wei Kiat, a Malaysian national who allegedly provided technical support and frequently entered India on a medical visa.

The Local Supplier: An associate, Mohammad Amjad (38), was apprehended during the Amherst Street raid for his role in managing the physical infrastructure.

Seizures and Next Steps

The scale of the operation was underscored by the sheer volume of equipment seized during the raids. The inventory includes:
2,250 SIM cards used for call routing.

Active SIM Box machines, 9 routers, and 17 mobile phones.

A cache of Malaysian currency and surveillance equipment.

While the primary “gateway” has been shut down, the Bidhannagar Commissionerate continues to map the full extent of the syndicate. Efforts are currently underway to track the flow of the extorted ₹3 crore and apprehend the remaining fugitives involved in this cross-border racket.

Long or Short, get news the way you like. No ads. No redirections. Download Newspin and Stay Alert, The CSR Journal Mobile app, for fast, crisp, clean updates!

Latest News

Popular Videos