You are currently viewing The Con Call Chronicles: Unmasking the Global Scam Call Center Network

The Con Call Chronicles: Unmasking the Global Scam Call Center Network


In this article, we will try to understand what a scam call center is.

A company that hires workers to make phony phone calls to the general public is known as a scam call center. In order to deceive their victims into disclosing personal information or transferring their money, scammers frequently employ social engineering techniques.

Scam call centers can be found anywhere in the world, but they are most prevalent in nations like India, Pakistan, and the Philippines. This is so because there are many English speakers in these nations, and labor expenses are generally inexpensive.

Voice over Internet Protocol (VoIP) technology is frequently used by scam call centers. This enables them to utilize fictitious caller IDs and phone numbers, making it challenging for their victims to recognize them.

Scam call centers are engaged in various scams, include:

Scam call center

Tech support scam call center

Scammers call people claiming to be from a well-known tech company, such as Microsoft or Apple. They tell the victim that their computer is infected with a virus or that their software is out of date. They then offer to fix the problem for a fee. However, once the victim has paid the fee, the scammers either disappear or they install malware on the victim’s computer.

Tech Support Scam

IRS scam call center

Scammers call people claiming to be from the Internal Revenue Service (IRS). They tell the victim that they owe back taxes and that they will be arrested if they do not pay the taxes immediately. Scammers may also threaten to deport immigrants if they do not pay.

Grandparent scam call center

Scammers call people pretending to be their grandchildren. They tell the victim that they are in trouble and need money immediately. Scammers may also claim to be police officers or lawyers and tell the victim that their grandchild has been arrested and needs bail money.

Grandparent Scam

Lottery scam call center

Scammers call people, telling them that they have won a lottery but that they need to pay a processing fee to claim their prize. Once the victim has paid the fee, the scammers disappear.

The Kolkata Connection


The number of scam call centers in and around Kolkata is difficult to estimate because many of them operate illegally and are hard to find. However, it’s thought that the area is home to hundreds of fraud call centers.

The Kolkata Police raided more than 80 call centers engaged in fraud in 2022 and made more than 400 arrests. This shows that Kolkata has a major and pervasive call center scam problem.

Scam call centers are a big issue in Kolkata because they destroy their victims’ finances and feelings. They harm the city’s and its residents’ reputations as well.

The Kolkata Police are attempting to shut down fraudulent call centers, but it is a challenging undertaking. Scammers frequently alter their strategies and relocate to other areas.

The general public must be informed of the risks posed by scam calls and take precautions to stay safe. Hang up the phone and contact the firm back at a number you are confident is real if you receive a call claiming to be from a well-known company. Do not pay money to anyone you do not know and trust, and never give out personal information over the phone.

Unveiling the Tactics of a Fake Call Center

In the digital age, where communication is instantaneous, so are the deceptive practices of fraudsters. One such nefarious scheme recently uncovered by the Kolkata Police involves a fake call center, revealing a modus operandi that leaves victims in financial turmoil and law enforcement agencies on high alert.

Introduction to the Fraudulent Scheme

The intricate web of deceit spun by these fraudsters begins innocuously with an email. According to sources within the Kolkata Police, these malicious emails falsely flagged illegal transactions purportedly conducted from the victim’s account. Within the email, a contact number was provided, urging recipients to call if they had not authorized the transaction. Little did the victims know that this was the first step into a well-orchestrated scam.

The Role of Emails in Initiating the Scam

The email serves as the initial bait, setting the stage for a more elaborate deception. Craftily, the fraudsters recorded the account details of individuals who responded to their call for an inquiry. Unbeknownst to the victims, they were unwittingly handing over crucial information that would later be exploited.

Recording Details through Voice-over Calls

The next stage of the scam involved voice-over calls. Those who had previously engaged with the fraudulent emails were approached, and under the guise of providing support, they were coerced into investing in gift cards. The innocent victims, unaware of the trap closing in, fell prey to this cleverly disguised ploy.

Deceptive Investment in Gift Cards

Gift cards, seemingly harmless tokens of appreciation, became the currency of the scam. The fraudsters, operating in collusion with US-based counterparts, persuaded individuals to invest in these cards as a purported means of securing support. Little did the victims realize that their hard-earned money was now in the hands of criminals orchestrating an international fraud.

Collaboration with US-based fraudsters

The collaboration between the Kolkata-based and US-based fraudsters added a layer of complexity to their operation. This unholy alliance ensured that the ill-gotten gains flowed seamlessly across borders, making it challenging for law enforcement agencies to trace and intercept.

Money Movement via Hawala Transactions

The movement of funds in this fraudulent operation was conducted through hawala transactions. US citizens’ investments in gift cards reached the perpetrators through channels that obscured the financial trail. This illicit practice, combined with cross-border collaboration, made it increasingly difficult for authorities to intervene.

Ingenious Method of Confirming Transactions

The fraudsters, exhibiting a level of ingenuity that belies their criminal intent, used a unique method to confirm transactions. After sending the purchased gift cards to the victims, the US-based accomplices would transmit an image of a portion of a US dollar note to the Kolkata-based fraudsters. Using the number on this dollar note, hawala operators would then credit the corresponding amount.

Kolkata Police’s Intervention and Raid

The culmination of this elaborate scam led to a decisive intervention by the Kolkata Police. In a well-executed raid, they managed to recover Rs 2.1 lakh in addition to seizing mobile phones, laptops, hard disks, and router databases. The arrest of twenty individuals, including the directors of the fake call center, marked a significant victory against cybercrime.

Arrest of Culprits and Recovery of Assets

Among those apprehended were individuals identified as Mohammad Fiyaz Alam, Mohammad Shahzada, and Aliam Alam. The recovery of assets during the raid sheds light on the extent of the operation and the potential devastation it could have caused countless victims.

Previous Instances of Fake Call Centers

This is not an isolated incident. In May, the police arrested twelve people involved in another fake call center operation. Seizing nearly Rs 45,000 along with smartphones, PAN cards, Aadhaar cards, routers, and documents containing victim names, the authorities highlighted the pervasive nature of such scams.

Cyber Crime Department’s Ongoing Investigation

In the wake of the raid, the Kolkata Police’s cybercrime department initiated an investigation into the money trail facilitated by hawala transactions. This ongoing effort underscores the importance of a comprehensive approach to tackling cybercrime, not only in its detection but also in understanding the intricate networks that support such activities.

Broader Implications of the Scam

The revelation of this fake call center’s operations has broader implications for cybersecurity and financial safety. It underscores the need for individuals to be vigilant about unsolicited communications, especially those that request personal or financial information.

Combating the Menace of Fake Call centers

Law enforcement agencies and cybersecurity experts face a daunting task in combating the ever-evolving tactics of fraudsters. Collaboration at an international level becomes imperative to dismantle the global networks that enable such scams.

Lessons Learned and Future Precautions

As individuals, there are lessons to be learned from these incidents. It is crucial to verify the authenticity of communications, especially when they involve financial transactions. Governments and businesses must also invest in advanced cybersecurity measures to stay one step ahead of cybercriminals.


The saga of the fake call center serves as a stark reminder of the vulnerabilities present in our interconnected world. As technology advances, so do the tactics of those seeking to exploit it for malicious purposes. The timely intervention by the Kolkata Police is a testament to the importance of proactive law enforcement and ongoing efforts to educate the public about cybersecurity.


1. How can I protect myself from falling victim to fake call center scams?

Be cautious of unsolicited emails and calls, especially those claiming unauthorized transactions.

2. What role did hawala transactions play in this scam?

Hawala transactions were used to obscure the movement of funds across borders, making it challenging for authorities to trace.

3. Are fake call centers a prevalent issue globally?

Yes, fake call centers operate globally, exploiting unsuspecting individuals through various deceptive schemes.

4. What steps are law enforcement agencies taking to combat cybercrime?

Law enforcement agencies are collaborating internationally and employing advanced technologies to track and dismantle cybercriminal networks.

5. How can I contribute to the fight against cybercrime?

Stay informed, report suspicious activities, and follow recommended cybersecurity practices to protect yourself and others.


This Post Has 5 Comments

  1. zoritoler imol

    Hello, you used to write great, but the last several posts have been kinda boring… I miss your tremendous writings. Past few posts are just a little out of track! come on!

  2. tlovertonet

    I’m truly enjoying the design and layout of your site. It’s a very easy on the eyes which makes it much more enjoyable for me to come here and visit more often. Did you hire out a designer to create your theme? Outstanding work!

  3. Java Burn

    You actually make it seem so easy with your presentation but I find this topic to be really something which I think I would never understand. It seems too complex and extremely broad for me. I’m looking forward for your next post, I’ll try to get the hang of it!

  4. nagad88 review

    The very core of your writing while sounding reasonable initially, did not really work properly with me after some time. Someplace within the sentences you managed to make me a believer unfortunately just for a short while. I however have got a problem with your leaps in logic and you would do nicely to fill in all those gaps. In the event that you actually can accomplish that, I will certainly end up being fascinated.

Leave a Reply