Kanpur Police Uncover Major Cybercrime Network in Reuna Village
In a significant crackdown, Kanpur police have exposed a major cybercrime network operating on the notorious Jamtara-style model in Reuna village, located in the Ghatampur area. The operation led to the arrest of 20 members of a gang accused of systematically duping applicants of the Pradhan Mantri Awas Yojana (PMAY). However, 17 accomplices managed to flee the scene, and a comprehensive hunt is currently underway to trace and apprehend them.
Operation Triggered by Cyber Crime Complaints
Police Commissioner Raghubir Lal revealed that the operation was initiated following multiple complaints filed through the National Cyber Crime Reporting Portal. Acting on a crucial tip-off from an informant, a police team swiftly moved to Reuna village, where reports indicated that several individuals were actively engaging in cybercrimes. Senior officers were promptly alerted, and a joint police team surrounded the area, resulting in the on-the-spot arrest of 20 suspects.
During the raid, mobile phones and several digital pieces of evidence were seized from the location. Police stated that the gang deceived people by offering fake government schemes, exploiting the trust of vulnerable citizens.
Sophisticated Scamming Techniques Unveiled
According to Commissioner Lal, the arrested and absconding suspects operated in small groups of 3-4 members. They utilized fake SIM cards and frequently called numbers outside their local area while constantly switching between numbers to avoid detection. "They leverage apps like Truecaller, PhonePe, Google Pay, and Paytm to gather input on a person's mobile number and fetch their correct name," he explained.
After collecting the necessary information, the group would call victims, posing as officials from the UP Awas Vikas office. They would claim, "We're calling about your Pradhan Mantri Awas Yojana application. Please share your Aadhaar details to check if your housing is approved." Once the victim complied, the caller would falsely inform them that their PMAY house application had been approved and direct them to speak with a senior officer for further details.
Elaborate Fraud and Intimidation Tactics
A second person would then take over the call, stating, "Your application is processed. To withdraw the Pradhan Mantri Awas funds, you'll need to pay Rs 1100 for registration, which you can send to our government account." Victims were tricked into transferring money via digital payment platforms such as Google Pay and PhonePe.
In a more alarming twist, some members of the group posed as police personnel to intimidate victims. They would assert, "I am a police officer. You watch obscene videos on your mobile at home, and I have a record of it. Police is coming to your place soon." Another accomplice would play the sound of a police siren from a mobile phone and threaten, "I have already left with my force to arrest you. If you want to save yourself from arrest and a case, then immediately send Rs 11,000 to my account."
Fearing arrest, many victims transferred money to the accused. Police confirmed that the illicit funds obtained through these fraudulent acts were spent on personal luxuries and entertainment by the gang members.
Identities of the Arrested Accused
The arrested individuals have been identified as Rahul Kumar, Neeraj Kumar, Pradeep Singh, Satendra, Neeraj, Pranshu, Jagroop, Rohit, Pushpendra, Ajit, Kuldeep, Naresh, Gyan, Romi, Neeraj, Shailendra, Dheeraj, Malkhan, Shivakant, and Paras Kumar. Authorities are intensifying efforts to locate the 17 fugitives and bring them to justice, emphasizing the ongoing threat of such cybercrimes in the region.



