
3 lines, 3 rooms, 3 portraits: How a digital arrest scam hub operates
In a separate room, designed to resemble a typical govt office in India, is Line 2. Here, a scammer dressed in police uniform sits for video calls, with framed portraits of Mahatma Gandhi, BR Ambedkar and Sardar Patel mounted on the wall behind.
Tired of too many ads? go ad free now
Line 3, a third room, hosts seasoned conmen. Posing as Enforcement Directorate or CBI officers, they know sections of laws such as UAPA, NDPS, FEMA, BNS and IPC with which they threaten their victims.
This was the architecture of a cybercrime call centre in Cambodia, where a woman from Surat landed up. Khushi Chaudhary (24) was arrested from IGI Airport in Delhi by Gurgaon police on June 29 after they got a tip-off that she was flying back to India.
Khushi was the 16th accused to be taken into custody after an 81-year-old woman in Gurgaon complained that she lost Rs 2.9 crore to an elaborate cyber scam that involved a 'digital arrest' for three days in Dec 2024.
Investigators told TOI on Wednesday that Khushi's arrest and interrogation had revealed an elaborate syndicate that is at play.
"She was a cog in a massive machinery. These cybercrime operations have roots across borders and work with clockwork precision.
The financial trail is long and circuitous and often ends in crypto wallets," a senior police officer said.
Khushi, police said, worked as a barista at a café in Surat. In Nov 2023, a friend's husband convinced her to move to Dubai for a better-paying job.
There, she briefly worked at a cybercrime call centre in Ajman before the friend's husband allegedly put her in touch with a Pakistani recruiter who took her to Cambodia in Aug 2024.
Tired of too many ads? go ad free now
The call centre she was employed at operated like a corporate office at a building called 'Mango Park' in Phnom Penh in the southeast Asian country.
"Every day, Line 1 operators were given a list of phone numbers to call. These callers posed as FedEx employees or law enforcement officials who told people that parcels addressed to them had illegal items or contraband. The other ruse was to say hawala transactions linked to their accounts were traced to terror outfits," the officer said.
Line 1 operators like Khushi would scare the receivers with these claims. If they took the bait, the call would be transferred to Line 2.
"On Line 2 is the video call setup. A man, often posing as a Colaba police station ACP, would appear in a dimly lit room with photos of Gandhi, Ambedkar and Patel in the backdrop to make the fraud look legitimate. He would talk in an aggressive tone to get the victims to do as he said," the police officer said.
The final step, Line 3, would be the appearance of an ED or CBI official -- who in this case went by the name of 'Rahul Gupta'. "This scamster would tell victims to transfer large sums of money into different bank accounts. By then, the victim had been isolated for some time, and was told not to disclose anything to anyone," the officer said.
Lines 2 and 3 would be the 'digital arrest' stage, with constant mental pressure put on the victim, who would be instructed not to switch off the phone or communicate with anyone with threats of harm to family members.
Such 'digital arrests', as we have seen, have happened for weeks and months, during which victims have transferred crores of money from their own accounts into the accounts of scamsters, their ability to think logically compromised by fear.
Sometimes, they gave the money hoping to "settle", sometimes it would be to ascertain -- as instructed by scamsters -- to ascertain the money was clean. The 'digital arrest' would suddenly end once the money was gone.
Rewards & parties
Khushi told investigators that she started out as a Line 1 operator but later assumed the role of a "merchant" -- one who would split the amount transferred to scammers by their targets into "mule accounts" in India. "Then the money was moved abroad and converted into cryptocurrency, all in 10-15 minutes," the police officer explained. Khushi's bosses were two Chinese citizens, known to her only as 'Lion' and 'Panda'.
She earned $700 (approximately Rs 60,000) as fixed monthly salary and made another $50 (nearly Rs 4,300) for every target who fell into the trap. "Her work hours were 9am to 8pm. As Line 1 caller, she made 30-40 calls an hour. And on average, 3-4 victims fell for the con," the police officer said.
Well-performing scamsters also got promotions.
"People were lured with promises of a better life. The more victims you trap, the more you could go up the ranks.
It meant getting closer to the bosses and getting a raise at every step. Another attraction was the weekend parties, which were organised for the call centre staff at luxury villas," the police officer said.
In the case that led Gurgaon police to Khushi's arrest, 15 other suspects – most of them holders of mule bank accounts – were nabbed. They have been charged under sections 318(4) (cheating), 336(3) (forgery), 348 (making or possession of any instrument for counterfeiting a property mark) and 340 (forged document) of BNS.
Gurgaon: Line 1 is the entry-level job in the cybercon food chain – the one who makes the call.
In a separate room, designed to resemble a typical govt office in India, is Line 2. Here, a scammer dressed in police uniform sits for video calls, with framed portraits of Mahatma Gandhi, BR Ambedkar and Sardar Patel mounted on the wall behind.
Line 3, a third room, hosts seasoned conmen. Posing as Enforcement Directorate or CBI officers, they know sections of laws such as UAPA, NDPS, FEMA, BNS and IPC with which they threaten their victims.
This was the architecture of a cybercrime call centre in Cambodia, where a woman from Surat landed up. Khushi Chaudhary (24) was arrested from IGI Airport in Delhi by Gurgaon police on June 29 after they got a tip-off that she was flying back to India.
Khushi was the 16th accused to be taken into custody after an 81-year-old woman in Gurgaon complained that she lost Rs 2.9 crore to an elaborate cyber scam that involved a 'digital arrest' for three days in Dec 2024.
Investigators told TOI on Wednesday that Khushi's arrest and interrogation had revealed an elaborate syndicate that is at play.
"She was a cog in a massive machinery. These cybercrime operations have roots across borders and work with clockwork precision. The financial trail is long and circuitous and often ends in crypto wallets," a senior police officer said.
Khushi, police said, worked as a barista at a café in Surat.
In Nov 2023, a friend's husband convinced her to move to Dubai for a better-paying job.
There, she briefly worked at a cybercrime call centre in Ajman before the friend's husband allegedly put her in touch with a Pakistani recruiter who took her to Cambodia in Aug 2024. The call centre she was employed at operated like a corporate office at a building called 'Mango Park' in Phnom Penh in the southeast Asian country.
"Every day, Line 1 operators were given a list of phone numbers to call.
These callers posed as FedEx employees or law enforcement officials who told people that parcels addressed to them had illegal items or contraband. The other ruse was to say hawala transactions linked to their accounts were traced to terror outfits," the officer said.
Line 1 operators like Khushi would scare the receivers with these claims. If they took the bait, the call would be transferred to Line 2.
"On Line 2 is the video call setup.
A man, often posing as a Colaba police station ACP, would appear in a dimly lit room with photos of Gandhi, Ambedkar and Patel in the backdrop to make the fraud look legitimate. He would talk in an aggressive tone to get the victims to do as he said," the police officer said.
The final step, Line 3, would be the appearance of an ED or CBI official -- who in this case went by the name of 'Rahul Gupta'. "This scamster would tell victims to transfer large sums of money into different bank accounts.
By then, the victim had been isolated for some time, and was told not to disclose anything to anyone," the officer said.
Lines 2 and 3 would be the 'digital arrest' stage, with constant mental pressure put on the victim, who would be instructed not to switch off the phone or communicate with anyone with threats of harm to family members. Such 'digital arrests', as we have seen, have happened for weeks and months, during which victims have transferred crores of money from their own accounts into the accounts of scamsters, their ability to think logically compromised by fear.
Sometimes, they gave the money hoping to "settle", sometimes it would be to ascertain -- as instructed by scamsters -- to ascertain the money was clean. The 'digital arrest' would suddenly end once the money was gone.
Rewards & parties
Khushi told investigators that she started out as a Line 1 operator but later assumed the role of a "merchant" -- one who would split the amount transferred to scammers by their targets into "mule accounts" in India.
"Then the money was moved abroad and converted into cryptocurrency, all in 10-15 minutes," the police officer explained. Khushi's bosses were two Chinese citizens, known to her only as 'Lion' and 'Panda'.
She earned $700 (approximately Rs 60,000) as fixed monthly salary and made another $50 (nearly Rs 4,300) for every target who fell into the trap. "Her work hours were 9am to 8pm. As Line 1 caller, she made 30-40 calls an hour.
And on average, 3-4 victims fell for the con," the police officer said.
Well-performing scamsters also got promotions.
"People were lured with promises of a better life. The more victims you trap, the more you could go up the ranks. It meant getting closer to the bosses and getting a raise at every step. Another attraction was the weekend parties, which were organised for the call centre staff at luxury villas," the police officer said.
In the case that led Gurgaon police to Khushi's arrest, 15 other suspects – most of them holders of mule bank accounts – were nabbed. They have been charged under sections 318(4) (cheating), 336(3) (forgery), 348 (making or possession of any instrument for counterfeiting a property mark) and 340 (forged document) of BNS.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Mint
38 minutes ago
- Mint
ED arrests two people in money-laundering probe against Sahara Group — Details here
India's financial intelligence agency, the Enforcement Directorate (ED), arrested two people who allegedly played a 'key role' in siphoning money, disposing of properties, and assisting the promoters of the Sahara Group in the money laundering case, reported the news agency PTI on Sunday, 13 July 2025. The news report highlighted that the two individuals taken into custody have been identified as Vailaparampil Abraham and Jitendra Prasad Verma. One of the arrested served as an executive director at the Sahara Group Chairman's core management team, while another was a long-time associate of the group cum property broker. The two arrested were presented before a local Kolkata court on Saturday, 12 July 2025, and the judicial body sent them back into custody till Monday, 14 July 2025, according to the agency report, citing the ED statement. The ED alleged that Vailaparampil Abraham played a 'key role' in coordinating and facilitating the sale of Sahara Group properties, many of which involved "substantial unaccounted" cash components that were allegedly siphoned off, according to the agency report citing the ED statement. The investigation agency's statement also claimed that Jitendra Prasad Verma was 'actively involved' in executing several of these property transactions and knowingly assisted in routing the large cash proceeds which were generated from these sale transactions. This resulted in a contribution to the concealment and dissipation of the crime. ED reportedly encountered 'incriminating' evidence during its searches, which suggested that the Sahara Group's properties were being disposed of one by one in a 'clandestine' (secretly and often illegally) manner. The promoters of the Sahara Group were found to be involved in such malpractices while remaining outside India, reported the news agency citing ED. The Enforcement Directorate (ED) alleged that the Sahara Group was running a 'Ponzi' scheme through various entities. HICCSL, Sahara Credit Cooperative Society Limited (SCCSL), Saharayn Universal Multipurpose Cooperative Society (SUMCS), Stars Multipurpose Cooperative Society Limited (SMCSL), Sahara India Commercial Corporation Ltd (SICCL), Sahara India Real Estate Corporation Ltd (SIRECL), Sahara Housing Investment Corporation Ltd (SHICL) and other group entities were involved in the case, according to the agency report. More than 500 FIRS have been filed by different state police departments, such as the Odisha, Bihar, and Rajasthan police, in the money-laundering case against the Sahara Group. The ED is analysing all the complaints filed against Sahara Group entities and related persons before filing the case under India's Prevention of Money Laundering Act (PMLA). 'These funds were managed in an unregulated manner without depositor oversight and maturity proceeds were not repaid instead reinvested under coercion or misrepresentation, and books were manipulated to camouflage such non-repayments,' said ED in its statement, cited the news agency. The financial agency also alleged that despite the financial incapacity, the group continued to collect fresh deposits, part of which were siphoned off for unnamed assets and personal expenses. 'Assets of the group were also sold for partial cash payments, further denying rightful claims of depositors,' the ED said, according to the report. Earlier this year, ED attached 707 acres of land worth ₹ 1,460 crore in the Aamby Valley in Maharashtra and 1,023 acres of land worth ₹ 1,538 crore in Sahara Prime City Ltd to the investigations, as per the agency report.


NDTV
an hour ago
- NDTV
"A Sorry Model Government": TVK Chief Slams DMK Over 'Custodial' Deaths
Chennai: Actor-politician and Tamilaga Vettri Kazhagam (TVK) chief Vijay on Sunday led a massive protest in Chennai, seeking justice for Ajith Kumar, a private security guard who died in police custody due to alleged torture. The protest turned into a significant show of strength, drawing an estimated 12,000 supporters, with many traveling from various districts. Vijay demanded a court-monitored Special Investigation Team (SIT) probe into the alleged custodial death and criticised the ruling Dravida Munnetra Kazhagam (DMK) government for transferring the case to the Central Bureau of Investigation (CBI). Addressing the gathering, the TVK chief accused the state government of hiding behind central agencies. "When in opposition, MK Stalin had slammed the CBI probe in the Sathankulam case. What is this now? Why hide behind the CBI, which is a puppet of the BJP and RSS?" he asked. The CBI officially took over the investigation on Saturday. The Madurai bench of the Madras High Court also transferred the original jewellery theft complaint by a woman named Nikita - which had allegedly led to Ajith Kumar's illegal detention - to the CBI and directed the central agency to submit a final report by August 20. Vijay said the Chief Minister should apologise to over 20 families who lost their lives during the DMK's four-year-rule just like he apologised to Ajith Kumar's family. "You apologised to Ajith's family. Apologise to others too and offer the same compensation," he said. The protest was also attended by families of other victims of alleged custodial deaths, whom Vijay had met earlier. His remarks were sharply critical of the DMK regime, calling it a "Publicity Model-turned-Sorry Ma Model" government and accusing it of eroding law and order and leaving courts to intervene in every crisis - referring to cases ranging from the Anna University sexual assault matter to custodial deaths. TVK functionaries noted that many more cadres would have joined had it not been for more traffic diversions. TVK worker Gobinath from Theni said: "The massive turnout shows that TVK is poised to win the 2026 elections and form the next government." Vijay, the Chief Ministerial face of TVK, reiterated that he would not ally - directly or indirectly - with the Bharatiya Janata Party, rejecting overtures from the All India Anna Dravida Munnetra Kazhagam (AIADMK)-BJP alliance. In response, the ruling DMK said swift action was taken in the Ajith Kumar case. Five police personnel have been arrested, the Deputy Superintendent of Police was suspended, and the Sivaganga Superintendent of Police was placed under "compulsory wait".


India Today
2 hours ago
- India Today
Retired scientist duped of Rs 1.29 crore in 'digital arrest' scam; 2 arrested
A retired scientist from Uttar Pradesh's Bareilly was kept under 'digital arrest' for three days and defrauded of Rs 1.29 crore by cybercriminals posing as CBI officers, police said on Sunday. Two members of the gang were arrested in connection with the victim, Dr Shukdev Nandi, a former scientist with the Indian Veterinary Research Institute, was targeted through WhatsApp calls by imposters who threatened him and forced him to transfer large sums of money to multiple accounts over a span of three Uttar Pradesh Special Task Force (STF) arrested Pradeep Kumar Singh (50) and Mahfooz (21) from Lucknow. Authorities recovered two mobile phones, PAN and Aadhaar cards, and documents related to cryptocurrency wallets from their possession. According to police, Singh is the director of a private firm and had opened a corporate bank account in the company's name at ICICI Bank. This account was used to receive the Rs 1.29 crore extorted from Dr questioning, Singh admitted to distributing the money within the gang and receiving commissions in USDT (cryptocurrency) through the Binance app, police said. He claimed to have earned 871 USDT so confessed he had opened a bank account on the instructions of an associate in exchange for commission and handed over the ATM card and SIM card to the gang. Around Rs 9 lakh linked to the fraud was deposited into his account.A case of cheating and extortion has been lodged at the Cyber Crime Police Station in Bareilly under relevant sections of the Bharatiya Nyaya Sanhita (BNS) and Section 66D of the IT arrests follow an earlier crackdown on July 5, when four members of the same gang were caught. Authorities are now investigating other bank accounts, crypto wallets, and additional gang members.- EndsTrending Reel