Raipur Becomes New Jamtara: Gujarat-Based Mastermind Behind Fake Call Centre Scam Targeting US Citizens — 42 Arrested
Digital Desk
Raipur Police bust 3 illegal call centres run by Gujarat masterminds duping US citizens. 42 arrested, ₹16.5L in devices seized. Here's how the 5-step scam worked.
Raipur has been quietly earning a dangerous reputation. Just as Jamtara in Jharkhand became synonymous with phone scams a decade ago, Chhattisgarh's capital is now at the centre of a sophisticated, international cyber fraud operation — masterminded from Ahmedabad, Gujarat, and executed floor by floor in two Raipur commercial complexes.
In a major overnight operation on March 26, the Anti Crime and Cyber Unit of Raipur Police raided three illegal call centres operating from Pithaliya Complex in Subhash Nagar and Anjani Tower in New Rajendra Nagar. A total of 42 accused were arrested. Seized from their possession were 67 mobile phones, 18 laptops, 28 computer sets, and 3 Wi-Fi routers — devices collectively valued at over ₹16.53 lakh.
The Mastermind Sits in Ahmedabad
This was no fly-by-night operation. According to police, the entire network was controlled by masterminds based in Ahmedabad, Gujarat, who recruited supervisors on a monthly salary of ₹30,000 plus a 2% commission on every successful fraud. These supervisors in turn hired agents at ₹15,000 per month to make calls to the United States of America.
Three supervisors — identified as Rohit Yadav (alias Anil Kumar Yadav), Gaurav Yadav, and Saurabh Singh — ran the day-to-day operations across the three call centres. The masterminds, police say, remain at large and a hunt is on.
How the 5-Step Scam Worked
What makes this case remarkable is the clinical, assembly-line precision of the fraud. Police laid out a five-stage process during interrogation:
Step 1 — Target Acquisition: Employees sourced data of Americans who had applied for bank loans via WhatsApp and Telegram groups. Using scripted English prompts displayed on screen, they contacted these targets via internet calling apps, posing as loan officers.
Step 2 — Trust Building: Once a target expressed interest in a loan, agents collected their full bank account details and passed them up the chain. A "deposit team" then told the victim their credit score (CIBIL equivalent) was poor but could be fixed — and asked them to wait for a callback.
Step 3 — Fake Cheque Deposit: A technical group, reportedly operating from China, used the victim's account details to prepare a cloned cheque and deposit it into the victim's account. Foreign banks, following standard short-term credit practices, immediately credited small amounts — typically $100 — pending a 48-hour verification. The scam exploited this window.
Step 4 — The Hook: The calling group rang the victim back: "Your credit score has been fixed. We deposited $100 into your account to prove it — please check." The victim verified the amount, delighted. The gang then said: "That money belongs to our company. Please return it via gift card."
Step 5 — Cash Out and Hawala: Victims willingly purchased Apple, Google, Amazon, Crafin, or other gift cards and shared the card codes with the gang. A dedicated "redemption group" — again reportedly linked to China — instantly converted these cards into cash. The money then travelled back to the Ahmedabad masterminds via hawala channels.
The China-based technical group reportedly took a 10% cut of every successful fraud for their cloning and cash-out services.
'Digital Arrest' Used to Terrorise Victims
Beyond the loan scam, police also found fake arrest warrants prepared on the computers at both locations. These were used to terrorise victims who hesitated or asked questions — a tactic known as "digital arrest," in which fraudsters impersonate law enforcement officers and threaten immediate legal action unless payments are made immediately.
Prime Minister Modi had publicly warned about digital arrest scams in a Mann Ki Baat address last year. That this tactic was being actively deployed from Raipur underlines how widespread the problem has become.
Who Are the Accused?
The 42 arrested span multiple states. While the supervisors and several key operatives hail from Ahmedabad and other parts of Gujarat, rank-and-file employees were recruited from Uttar Pradesh (Prayagraj, Itawa, Deoria), Bihar, Punjab, Haryana, Maharashtra, Meghalaya, and Chhattisgarh itself. Most are between 19 and 35 years old.
During interrogation, the accused admitted they were fully aware the activities were illegal but were drawn in by the combination of a fixed salary and performance-based incentives tied to fraud amounts.
Cases have been registered under multiple sections of the Bharatiya Nyaya Sanhita (BNS) — including sections 61(2), 112(2), 316(2), 318(4), 319(2), 336(3), 337, 338, and 340(2) — as well as Sections 66(C) and 66(D) of the Information Technology Act.
A Warning for Job Seekers
This case carries a message beyond crime reporting. Many of the accused were young people from modest backgrounds, recruited with the promise of a "call centre job" in Raipur — with no clear explanation of who they would be calling or why. Several were living in rented flats together, clearly housed and managed by their handlers.
At a time when youth unemployment remains high and call centre work is seen as respectable urban employment, organised crime networks are actively exploiting that desperation. If a job offers unusually high commissions for making calls to foreigners with scripted English dialogues — and asks no questions — it almost certainly is not legitimate.
The Ahmedabad-Raipur-China Triangle
What Raipur Police have uncovered is not just a local crime story. It is a transnational cyber fraud pipeline with tentacles stretching from Ahmedabad to Raipur to the United States — with China-based technical operators providing the cloning and cash-out infrastructure. The masterminds remain free. The investigation is ongoing.
Raipur has enough going for it — as a growing capital city in the heart of India — to not want this kind of notoriety. The question now is whether law enforcement can follow the money all the way back to Ahmedabad, and beyond.
Raipur Becomes New Jamtara: Gujarat-Based Mastermind Behind Fake Call Centre Scam Targeting US Citizens — 42 Arrested
Digital Desk
Raipur has been quietly earning a dangerous reputation. Just as Jamtara in Jharkhand became synonymous with phone scams a decade ago, Chhattisgarh's capital is now at the centre of a sophisticated, international cyber fraud operation — masterminded from Ahmedabad, Gujarat, and executed floor by floor in two Raipur commercial complexes.
In a major overnight operation on March 26, the Anti Crime and Cyber Unit of Raipur Police raided three illegal call centres operating from Pithaliya Complex in Subhash Nagar and Anjani Tower in New Rajendra Nagar. A total of 42 accused were arrested. Seized from their possession were 67 mobile phones, 18 laptops, 28 computer sets, and 3 Wi-Fi routers — devices collectively valued at over ₹16.53 lakh.
The Mastermind Sits in Ahmedabad
This was no fly-by-night operation. According to police, the entire network was controlled by masterminds based in Ahmedabad, Gujarat, who recruited supervisors on a monthly salary of ₹30,000 plus a 2% commission on every successful fraud. These supervisors in turn hired agents at ₹15,000 per month to make calls to the United States of America.
Three supervisors — identified as Rohit Yadav (alias Anil Kumar Yadav), Gaurav Yadav, and Saurabh Singh — ran the day-to-day operations across the three call centres. The masterminds, police say, remain at large and a hunt is on.
How the 5-Step Scam Worked
What makes this case remarkable is the clinical, assembly-line precision of the fraud. Police laid out a five-stage process during interrogation:
Step 1 — Target Acquisition: Employees sourced data of Americans who had applied for bank loans via WhatsApp and Telegram groups. Using scripted English prompts displayed on screen, they contacted these targets via internet calling apps, posing as loan officers.
Step 2 — Trust Building: Once a target expressed interest in a loan, agents collected their full bank account details and passed them up the chain. A "deposit team" then told the victim their credit score (CIBIL equivalent) was poor but could be fixed — and asked them to wait for a callback.
Step 3 — Fake Cheque Deposit: A technical group, reportedly operating from China, used the victim's account details to prepare a cloned cheque and deposit it into the victim's account. Foreign banks, following standard short-term credit practices, immediately credited small amounts — typically $100 — pending a 48-hour verification. The scam exploited this window.
Step 4 — The Hook: The calling group rang the victim back: "Your credit score has been fixed. We deposited $100 into your account to prove it — please check." The victim verified the amount, delighted. The gang then said: "That money belongs to our company. Please return it via gift card."
Step 5 — Cash Out and Hawala: Victims willingly purchased Apple, Google, Amazon, Crafin, or other gift cards and shared the card codes with the gang. A dedicated "redemption group" — again reportedly linked to China — instantly converted these cards into cash. The money then travelled back to the Ahmedabad masterminds via hawala channels.
The China-based technical group reportedly took a 10% cut of every successful fraud for their cloning and cash-out services.
'Digital Arrest' Used to Terrorise Victims
Beyond the loan scam, police also found fake arrest warrants prepared on the computers at both locations. These were used to terrorise victims who hesitated or asked questions — a tactic known as "digital arrest," in which fraudsters impersonate law enforcement officers and threaten immediate legal action unless payments are made immediately.
Prime Minister Modi had publicly warned about digital arrest scams in a Mann Ki Baat address last year. That this tactic was being actively deployed from Raipur underlines how widespread the problem has become.
Who Are the Accused?
The 42 arrested span multiple states. While the supervisors and several key operatives hail from Ahmedabad and other parts of Gujarat, rank-and-file employees were recruited from Uttar Pradesh (Prayagraj, Itawa, Deoria), Bihar, Punjab, Haryana, Maharashtra, Meghalaya, and Chhattisgarh itself. Most are between 19 and 35 years old.
During interrogation, the accused admitted they were fully aware the activities were illegal but were drawn in by the combination of a fixed salary and performance-based incentives tied to fraud amounts.
Cases have been registered under multiple sections of the Bharatiya Nyaya Sanhita (BNS) — including sections 61(2), 112(2), 316(2), 318(4), 319(2), 336(3), 337, 338, and 340(2) — as well as Sections 66(C) and 66(D) of the Information Technology Act.
A Warning for Job Seekers
This case carries a message beyond crime reporting. Many of the accused were young people from modest backgrounds, recruited with the promise of a "call centre job" in Raipur — with no clear explanation of who they would be calling or why. Several were living in rented flats together, clearly housed and managed by their handlers.
At a time when youth unemployment remains high and call centre work is seen as respectable urban employment, organised crime networks are actively exploiting that desperation. If a job offers unusually high commissions for making calls to foreigners with scripted English dialogues — and asks no questions — it almost certainly is not legitimate.
The Ahmedabad-Raipur-China Triangle
What Raipur Police have uncovered is not just a local crime story. It is a transnational cyber fraud pipeline with tentacles stretching from Ahmedabad to Raipur to the United States — with China-based technical operators providing the cloning and cash-out infrastructure. The masterminds remain free. The investigation is ongoing.
Raipur has enough going for it — as a growing capital city in the heart of India — to not want this kind of notoriety. The question now is whether law enforcement can follow the money all the way back to Ahmedabad, and beyond.