RUDRAPUR: Police in Uttarakhand say a web of online gaming fraud, stretching from Rudrapur to Dubai, ensnared thousands of victims and generated several crores in illegal earnings. The operation, officials believe, relied on deceptive gaming apps, cloned call centers, and remotely controlled mobile devices to siphon money from users across India.
A Fraud Built Behind the Façade of Online Gaming
When officers raided a building in Rudrapur last week, they expected to find a small-scale phone scam. Instead, they uncovered what investigators now describe as a link in an international fraud chain that used online gaming apps as a lure. According to the police, the scheme drew in unsuspecting users with the promise of small winnings ₹500 to ₹600 per attempt before coaxing them to invest larger amounts, which were then diverted through bank transfers and mule accounts.
At the center of the operation, officers say, was Manjeet Singh, known locally as Sonu, who had allegedly returned from Dubai after working at a call center there. Investigators believe he brought back technical know-how and a familiarity with cyber-fraud operations that enabled him to set up a similar network in India. Early questioning suggests the group may have defrauded as many as 50,000 people in the past three months alone, amounting to roughly ₹5.54 crore.
A Network Extending Beyond District Borders
Police records indicate that Manjeet and his associates had established a fabricated call center in Rudrapur, using rented rooms as the operational hub. The group reportedly deployed customised software, auto-dialing systems, and spoofed mobile numbers to initiate conversations with potential victims. Users who showed interest in promotional gaming offers were guided into depositing progressively higher sums into accounts controlled by the gang.
Inspector Jayashankar Singh said the first breakthrough came when police detained Amritpal, a local resident who had been accused of online cheating in three separate cases. During questioning, Amritpal allegedly identified Manjeet as the principal operator and described how the Dubai stint had equipped him to replicate the fraud model on Indian soil.
By the time authorities conducted coordinated raids, the network had already expanded into multiple states. Among those arrested were individuals from Gujarat, Madhya Pradesh, and Nepal, all of whom, police say, had converged in Rudrapur to join the operation.
Technology as the Engine of Deception
Investigators say the gang relied heavily on a combination of fraudulent software and remote-access tools. Some users were asked to share their mobile banking details or unknowingly install apps allowing the operators to seize control of their phones. Once granted access, the gang allegedly transferred money directly from victims’ accounts.
To maintain the illusion of legitimacy, the operators staged repeated “wins” for first-time users on gaming apps rigged with manipulated algorithms. Police believe this psychological hook small initial successes encouraged individuals to trust the platform and commit larger amounts.
In the raids, authorities recovered 13 mobile phones, 13 laptops, two computer systems, and multiple SIM cards registered under fabricated identities. Officers say the seized equipment contains data that may reveal additional layers of the operation, including communication records with counterparts in Dubai.
Tracing the Links Abroad as Arrests Mount
The connection to Dubai has become a central thread in the investigation. According to Superintendent of Police Abhishek Yadav, several suspects maintained regular contact with handlers based in the Gulf, who were allegedly responsible for directing operations and sharing updated fraud scripts. Police say Manjeet himself had begun remitting a portion of the criminal proceeds back to Dubai, though the routing mechanisms remain under scrutiny.
As the probe expands, six members of the network have been arrested and charged under sections pertaining to cybercrime, cheating, and fraud. Authorities expect additional arrests once forensic analysis of devices is complete and banking trails are fully reconstructed.
