BOOM

Trending Searches

    SUPPORT
    BOOM

    Trending News

      • Fact Check 
        • Fast Check
        • Politics
        • Business
        • Entertainment
        • Social
        • Sports
        • World
      • Law
      • Explainers
      • News 
        • All News
      • Decode 
        • Impact
        • Scamcheck
        • Life
        • Voices
      • Media Buddhi 
        • Digital Buddhi
        • Senior Citizens
        • Videos
      • Web Stories
      • BOOM Research
      • BOOM Labs
      • Deepfake Tracker
      • Videos 
        • Facts Neeti
      • Home-icon
        Home
      • About Us-icon
        About Us
      • Authors-icon
        Authors
      • Team-icon
        Team
      • Careers-icon
        Careers
      • Internship-icon
        Internship
      • Contact Us-icon
        Contact Us
      • Methodology-icon
        Methodology
      • Correction Policy-icon
        Correction Policy
      • Non-Partnership Policy-icon
        Non-Partnership Policy
      • Cookie Policy-icon
        Cookie Policy
      • Grievance Redressal-icon
        Grievance Redressal
      • Republishing Guidelines-icon
        Republishing Guidelines
      • Fact Check-icon
        Fact Check
        Fast Check
        Politics
        Business
        Entertainment
        Social
        Sports
        World
      • Law-icon
        Law
      • Explainers-icon
        Explainers
      • News-icon
        News
        All News
      • Decode-icon
        Decode
        Impact
        Scamcheck
        Life
        Voices
      • Media Buddhi-icon
        Media Buddhi
        Digital Buddhi
        Senior Citizens
        Videos
      • Web Stories-icon
        Web Stories
      • BOOM Research-icon
        BOOM Research
      • BOOM Labs-icon
        BOOM Labs
      • Deepfake Tracker-icon
        Deepfake Tracker
      • Videos-icon
        Videos
        Facts Neeti
      Trending Tags
      TRENDING
      • #Operation Sindoor
      • #Pahalgam Terror Attack
      • #Narendra Modi
      • #Rahul Gandhi
      • #Waqf Amendment Bill
      • #Arvind Kejriwal
      • #Deepfake
      • #Artificial Intelligence
      • Home
      • Decode
      • Interview: How SIMs Issued In Your...
      Decode

      Interview: How SIMs Issued In Your Name End Up In A Scammer’s Pocket

      Decode spoke to DSP Ankush Mishra to explain how ghost SIMs are created, misused, and how to protect yourself.

      By -  Hera Rizwan |
      22 May 2025 4:26 PM IST
    • Boomlive
      Listen to this Article
      Interview: How SIMs Issued In Your Name End Up In A Scammer’s Pocket

      Interview: How Ghost SIMs And Rogue Agents Fuel India’s Cybercrime Surge

      • Fraudsters are using SIM cards obtained through forged documents or complicit agents to run scams and disappear without a trace.
      • Some people knowingly sell SIMs issued in their own name; others become victims when SIMs are issued in their name without their knowledge.
      • Despite biometric checks, agents fake network errors to collect fingerprints twice and misuse them.
      • The government’s TAFCOP portal on the Sanchar Saathi helps people check how many SIMs are issued in their name.

      At the heart of a cybercrime, there’s often something deceptively small—a SIM card.

      Tucked into every phone, this tiny chip can unlock the internet, link bank accounts, and connect you to the world. But in the hands of cybercriminals, it becomes something far more dangerous —a tool to defraud, impersonate, and vanish without a trace.

      An individual can legally obtain up to nine SIM cards in India. Some take advantage of this limit —buying multiple SIMs in their own name, only to sell them to cybercriminals who use them to run scams, impersonate officials, or open fake bank accounts.

      Others, meanwhile, become victims themselves, with SIM cards issued in their name without their knowledge, thanks to forged documents and complicit Point of Sale (PoS) agents. These are known as ghost SIMs—mobile numbers that exist on paper, but are used in the shadows.

      A PoS agent is a person or small business representative who is authorised by telecom companies to sell and activate SIM cards.

      A ghost SIM, hence, becomes the perfect digital disguise: activated using stolen documents, routed through shady Point of Sale agents, and passed along to scammers running rackets across borders. By the time the fraud is traced, the trail leads back to an innocent person—not the criminal.

      These aren’t just isolated incidents. In May, the Central Bureau of Investigation unearthed a massive network of such ghost SIMs, linking 39 PoS agents to 1,100 fake numbers, with more than 64,000 forged SIMs flagged in the larger investigation.

      To understand the inner workings of this growing threat, Decode spoke with DSP Ankush Mishra of the Special Task Force, Uttarakhand Police, who has been closely tracking the changing landscape of cybercrime across India.

      Speaking to Decode, Mishra breaks down how PoS agents exploit the eKYC process, reveals who benefits from this illicit trade, and—most crucially—shares what ordinary citizens must do to stay safe in a world where your identity can be sold for a few hundred rupees.

      Here are the edited excerpts from the interview.

      What are the common ways in which SIM cards are misused in cybercrimes today?

      We typically see two kinds of cases. First, where a person gets multiple SIM cards—up to nine—issued in their own name and then sells them to bad actors for malicious activities. The second type is less common and elaborate to execute, which makes it more alarming.

      Here the person doesn’t even know that SIMs have been issued in their name. This usually happens when PoS agents are operating in collusion with cybercriminals.

      These agents often sit roadside under umbrellas and offer SIM cards. They’ll take your biometric for eKYC and then claim there’s been a network failure. They will ask you to give your thumbprint again, but in reality, they’re using both sets of biometrics to issue two SIM cards under your name. One is handed to you, and the other—a ‘ghost SIM’—is sold to fraudsters.

      Also Read:It Wasn’t Just A WhatsApp Image That Stole Rs 2 Lakhs- There’s More To It

      How has the SIM verification process evolved in India, and where do vulnerabilities still exist?

      India has gone through three phases of KYC (Know Your Customer) for issuing SIM cards. About 15 years ago, we had a paper-based KYC, where a photo and signature were submitted, and the PoS agent filled in the form manually. But as cybercrime grew, we moved to digital KYC—this required the person to be physically present and submit an Aadhaar copy. The agent had to ensure the real-time photo matched the one on the Aadhaar.

      However, fraudsters found a loophole. They would morph Aadhaar images—replacing the original photo with their own—making identity verification nearly impossible. This is compounded by the fact that UIDAI, the central agency issuing Aadhaar numbers, does not share its data with anyone, including law enforcement.

      Finally, the Department of Technology adopted eKYC, which uses biometrics. Here, the person gives a thumbprint which is instantly verified against Aadhaar data in real time. eKYC has definitely made it harder to misuse someone’s identity. However, even this process is being gamed by rogue agents who fake technical errors to collect double biometric scans.

      Also Read:AI Is Lowering the Bar for Cybercrime in India’s Financial Sector: Report

      Could you share an example from your own investigations to show how these networks operate on the ground?

      Yes, there was a similar case in Haridwar where certain agents were going from village to village, targeting women. They would offer gifts like tea sets or crockery in exchange for their biometric data and photographs. Many women were lured into this scheme without fully understanding what they were giving away.

      These SIM cards were then used in scams targeting people overseas. After some R&D and fieldwork, we discovered that the same local shopkeeper was behind issuing all these SIMs. The women became key witnesses, and eventually, the shopkeeper confessed. He admitted he was working under pressure—he had a target to meet for SIM issuance.

      What policy reforms do you think are needed?

      I believe law enforcement agencies should be granted limited access to unmasked biometric data during investigations. Currently, when we request information from telecom providers, the biometric data is masked, which limits our ability to accurately trace how many SIM cards are linked to a single identity. This level of access was available until 2019 but has since been withdrawn, making investigations more challenging.

      Beyond that, raising public awareness is crucial. Areas known for such fraudulent activities need constant monitoring and regular crackdowns. The network behind these crimes is complex, involving corrupt PoS agents, imposters posing as genuine customers, and even criminals acting as PoS agents themselves. Since everyone is motivated by incentives, many vanish before a thorough investigation can take place.

      Therefore, consistent inspections combined with educating the public are essential steps to effectively combat this growing problem.

      Also Read:UN Report: India Fuels and Feeds Global Cyber Scam Networks

      What can citizens do to protect themselves?

      It is crucial for individuals to actively monitor the number of SIM cards issued under their name to prevent misuse. The Department of Telecommunications offers a helpful tool called the Sanchar Saathi portal, which includes a sub-portal named TAFCOP. By entering their mobile number and verifying via an OTP, users can instantly see all the SIM cards linked to their identity.

      If anyone notices unfamiliar or suspicious SIM cards registered in their name, they should immediately take action by filing a formal written complaint with their local cyber police station.

      Additionally, they should register a case of identity forgery to initiate an official investigation. Regular vigilance and prompt reporting can help prevent further fraud and protect one’s digital identity.

      Also Read:DIY Fraud: How Fake Aadhaar And PAN Are Sold Like Fast Food

      Tags

      Cybercrimecyber fraudKYCAadhaarcyber security
      Read Full Article

      Next Story
      Our website is made possible by displaying online advertisements to our visitors.
      Please consider supporting us by disabling your ad blocker. Please reload after ad blocker is disabled.
      X

      Subscribe to BOOM Newsletters

      👉 No spam, no paywall — but verified insights.

      Please enter a Email Address
      Subscribe for free!

      Stay Ahead of Misinformation!

      Please enter a Email Address
      Subscribe Now🛡️ 100% Privacy Protected | No Spam, Just Facts
      By subscribing, you agree with the Terms & conditions and Privacy Policy connected to the offer

      Thank you for subscribing!

      You’re now part of the BOOM community.

      Or, Subscribe to receive latest news via email
      Subscribed Successfully...
      Copy HTMLHTML is copied!
      There's no data to copy!