Cybersecurity
From Gujarat to Myanmar: ‘The Ghost’ Unmasked — Inside an International Cyber Slavery Racket
Ahmedabad / Gandhinagar: Gujarat Police have exposed one of the most organized international cyber-trafficking networks in South and Southeast Asia, centered on 29-year-old Nilesh Purohit, also known as Neel or “The Ghost.” Purohit is accused of orchestrating a transnational pipeline that lured job seekers and forced them into cyber-fraud camps abroad.
The operation reportedly affected over 500 victims in under two years, spanning India, Pakistan, China, Myanmar, Cambodia, Vietnam, and Thailand.
Airport Arrest Prevents Escape
On November 16, 2025, Gujarat Police intercepted Purohit at Sardar Vallabhbhai Patel International Airport in Ahmedabad as he attempted to flee to Malaysia. Officials say that even a few minutes’ delay could have allowed him to evade capture, earning him the moniker “The Ghost.”
Purohit faces five FIRs across Gujarat, Maharashtra, and West Bengal, with charges including human trafficking, cheating, and cybercrime. He has been remanded to Sabarmati Central Jail, and the CBI has opened investigations into his role in multiple international cyber-slavery cases.
Building a Transnational Cyber Empire
Investigators say Purohit’s criminal network expanded rapidly after moving to Dubai in early 2024, where he gained exposure to cyber-crime operations and forged links with Pakistani and Chinese agents. He later traveled to Thailand and Myanmar, operating in hubs like KK Park in Myawaddy Township, known for coercing trafficked workers into online scams.
The Recruitment Model: Recruit, Funnel, Coerce
Purohit reportedly ran a sub-agent network of 126 operatives across India, with connections to over 30 Pakistani agents and 100+ foreign companies. Victims were recruited with promises of legitimate jobs abroad and transported via a route: Bangkok → Tak (Thailand) → jungle trek → Moei/Thaungyin River → Myawaddy, Myanmar.
Victims were primarily sourced through WhatsApp, Telegram, Facebook, and Instagram, often reinforced by word-of-mouth in smaller towns.
Financial Mechanics: High Earnings and Crypto Transfers
For each victim trafficked, Purohit allegedly earned ₹1.76 lakh to ₹3.96 lakh, using mule bank accounts and multiple cryptocurrency wallets (including Binance) to obscure the financial trail. These transfers corresponded with increased recruitment activity from October 2024 onward.
Inside KK Park: Contracts, Coercion, and Cyber-Fraud Operations
At the camps, victims were forced to sign two-year contracts with early-exit penalties of ₹3.5–₹5 lakh. Those resisting faced physical and psychological abuse. Tasks included phishing, crypto scams, Ponzi schemes, investment fraud, and romance scams, targeting individuals worldwide.
Several victims remain too traumatized to report incidents, prompting authorities to file FIRs on behalf of the State in some cases.
Breaking the Chain: Sub-Agents Lead to Purohit
Intelligence gathered in November led to arrests of sub-agents Hitesh Arjan Somaiya (Porbandar) and Sonal Faldu (Junagadh), both of whom identified Purohit as their handler. At least 22 youths from Gujarat have been linked directly to his trafficking operations, with investigations ongoing in other states.
Repatriations and Regional Efforts
Coordinated operations between India, Thailand, and Myanmar have facilitated the repatriation of over 4,000 Indian citizens from scam camps. Myanmar authorities, under international pressure, have conducted repeated crackdowns, though many trafficked individuals fled during raids.
Policy and Enforcement Challenges Ahead
The case highlights the growing complexity of borderless cybercrime, social-media-based recruitment, and crypto-monetized human trafficking. Authorities emphasize the need for cross-border cooperation to dismantle both the supply and demand sides of these networks.
A senior officer remarked:
“This isn’t just cybercrime; it is the most predatory face of modern human trafficking, powered by the internet and monetized through crypto.”
Crime & Law Enforcement
Uttarakhand STF Cracks Major Mule Account Fraud, Three Arrested in Landmark BNS Cybercrime Case
The Uttarakhand Special Task Force (STF) has successfully dismantled a sophisticated cybercrime network involved in financial fraud through “mule accounts,” arresting three individuals in the state’s first-ever Bharatiya Nyaya Sanhita (BNS) cybercrime case.
The operation, conducted in Haridwar following detailed intelligence and technical analysis, led to the seizure of multiple bank passbooks, chequebooks, debit cards, PAN cards, Aadhaar cards, and forged bank seals used to perpetrate large-scale financial fraud.
Exploitation of Vulnerable Individuals
Authorities revealed that the gang targeted unsuspecting individuals, persuading them to open bank accounts under false pretences. These “mule accounts” were subsequently handed over to organized cybercriminal syndicates to facilitate the transfer of illicit funds across multiple states.
“These accounts enabled the siphoning of lakhs of rupees from victims nationwide,” said a senior STF officer. “The network relied on carefully forged documents and official-looking seals to make the transactions appear legitimate.”
Legal Action Under BNS and IT Act
The three arrested suspects have been charged under Sections 111, 318(4), and 61(2) of the BNS, as well as Section 66D of the Information Technology Act, at Dehradun Cyber Police Station.
“This marks the first instance in Uttarakhand of applying Section 111 of the BNS law in a cybercrime context. The provision targets organized criminal networks and carries penalties of up to 10 years imprisonment,” an STF official explained.
Authorities highlighted that the new legal framework significantly strengthens the state’s ability to prosecute organized digital crime, ensuring that perpetrators face stringent consequences.
Ongoing Investigation and Manhunt
The STF confirmed a continuing investigation to identify additional members of the network. Officers are analyzing digital devices and tracing fund flows to uncover the full extent of the criminal operation.
“This was a well-coordinated interstate network. Our focus is to ensure all responsible parties are held accountable,” a police spokesperson stated. Investigators are also reviewing recruitment tactics used to manipulate innocent individuals into assisting the syndicate.
Expert Advisory for Citizens and Investors
Cybersecurity experts warn that social engineering tactics, such as mule accounts, pose serious financial risks. Prof. Triveni Singh, former IPS officer and cybercrime specialist, emphasized, “Investors and citizens must verify the legitimacy of any request to open accounts. Immediate reporting of suspicious activity can prevent significant losses.”
Authorities urge the public to remain vigilant and cooperate with law enforcement to curb digital fraud. Timely action can protect both personal finances and broader economic security.
STF’s Commitment to Combating Cybercrime
The STF reaffirmed its commitment to combating organized cybercrime through proactive operations, technical intelligence, and inter-state coordination. Officials stressed that legal reforms like the BNS and specialized cyber units are critical in safeguarding citizens’ financial transactions.
“Exploiting innocent people for financial gain will not be tolerated,” said an STF spokesperson. “With public cooperation and continued vigilance, we aim to dismantle such criminal networks entirely.”
Cybersecurity
India Pulls The Plug On Chinese CCTV Makers Amid New Security Certification Rules
India will prohibit several Chinese surveillance equipment manufacturers from selling internet-connected CCTV cameras in the country starting April 1, 2026, following the rollout of new certification and cybersecurity compliance rules. The decision aims to strengthen digital security and reduce reliance on foreign technology for critical surveillance infrastructure.
New Certification Rules to Take Effect
Under the updated regulatory framework, all internet-connected CCTV cameras and surveillance equipment must meet strict certification standards before being sold in India. Companies that fail to comply will be barred from selling these devices.
Chinese manufacturers such as Hikvision, Dahua, and TP-Link are directly impacted by this regulation, which prevents them from selling internet-enabled CCTV products unless they meet the new compliance requirements.
The rules are part of a broader government initiative to tighten oversight over surveillance technologies and ensure that equipment meets national security standards.
Security Concerns Driving the Decision
Authorities have raised concerns over vulnerabilities in imported surveillance systems, which could pose risks of unauthorized access, espionage, and exploitation. The certification rules include requirements for hardware origin disclosure and rigorous vulnerability testing to secure surveillance networks, particularly in public infrastructure and government installations.
By mandating certified and trusted equipment, the government aims to safeguard critical digital infrastructure while minimizing cybersecurity risks associated with foreign devices.
Domestic Manufacturers Gain Market Share
With Chinese brands restricted, Indian companies are expected to capture a larger portion of the market. Local manufacturers such as CP Plus and Qubo are poised to benefit from this regulatory shift, accelerating the transition toward domestically compliant surveillance solutions.
Industry estimates indicate that Indian brands have already increased market share following previous certification requirements, and the new rules are expected to reinforce this trend.
Market and Pricing Implications
The exit of major Chinese suppliers from the internet-connected CCTV segment is likely to affect supply chains and lead to price increases due to reduced competition and higher compliance costs.
At the same time, the move is expected to promote domestic manufacturing, strengthen local supply chains, and encourage secure production of surveillance technology. The regulatory shift reflects India’s growing emphasis on cybersecurity, data protection, and trusted technology infrastructure.
Cybersecurity
Centre Likely To Extend SIM-Binding Deadline For Messaging Platforms Amid Technical Challenges
The Indian government is expected to extend the implementation deadline for the SIM-binding rule for messaging platforms after technology companies cited technical challenges in compliance. The regulation, part of the country’s broader telecom cybersecurity measures, mandates linking user accounts to active SIM cards to enhance traceability and curb cyber fraud.
What the SIM-Binding Rule Mandates
Under the rule, messaging apps such as WhatsApp, Signal, and Telegram must ensure that accounts are tied to the mobile SIM card used during registration. If a SIM card is removed, replaced, or deactivated, the associated messaging account should cease to function on the device.
Authorities introduced the regulation to improve user identification and prevent misuse of digital communication platforms for cybercrime, impersonation, and financial scams.
Possible Extension of Compliance Timeline
Messaging companies have raised concerns that implementing SIM-binding requires significant technical changes, including:
- Real-time SIM authentication
- Device-level verification mechanisms
- Integration with telecom operator databases
Due to these challenges, officials are reportedly considering extending the deadline to give companies additional time to implement the necessary systems without disrupting services. Telecom authorities and tech platforms are continuing discussions on the timeline and compliance requirements.
Cybersecurity and Traceability Objectives
The SIM-binding rule is part of efforts by the Department of Telecommunications (DoT) to strengthen digital security and traceability. Linking messaging accounts to SIM cards will help law enforcement trace individuals involved in online scams, cyber fraud, and other illegal activities.
India has seen a rise in cybercrime cases through messaging apps, including financial fraud and impersonation scams. SIM-binding is designed to reduce anonymity and improve accountability in the digital communications ecosystem.
Industry Concerns
Technology companies have raised privacy and feasibility concerns, citing the infrastructure and continuous verification required for large-scale implementation. Despite these challenges, government officials emphasize that the rule is intended to protect users and prevent misuse of messaging platforms.
If the extension is granted, companies will have additional time to align their systems with regulatory requirements while maintaining service continuity for users.
This development underscores India’s ongoing efforts to bolster cybersecurity and reduce digital fraud risks in a rapidly expanding communication landscape.
-
Business3 years agoPot Odor Does Not Justify Probable Cause for Vehicle Searches, Minnesota Court Affirms
-
Business2 years agoNew Mexico cannabis operator fined, loses license for alleged BioTrack fraud
-
Business2 years agoAlabama to make another attempt Dec. 1 to award medical cannabis licenses
-
Business3 years agoWashington State Pays Out $9.4 Million in Refunds Relating to Drug Convictions
-
Business2 years agoMarijuana companies suing US attorney general in federal prohibition challenge
-
Business3 years agoLegal Marijuana Handed A Nothing Burger From NY State
-
Business3 years agoCan Cannabis Help Seasonal Depression
-
Blogs3 years agoCannabis Art Is Flourishing On Etsy
