Jamtara: India's Cybercrime Capital – The 'Hello' That Steals

Jamtara, a district nestled in the Indian state of Jharkhand, is steeped in a unique history. Its very name, derived from the Santhali words 'Jama' (snake) and 'Tad' (habitat), means 'the abode of snakes' – a nod to the large number of serpents found here. Traditionally known for its bauxite mines, Jamtara has, unfortunately, gained a new, far more insidious reputation: as the epicenter of cybercrime, a place where a simple "hello" on the phone can leave people financially devastated in minutes.


The Genesis of a Digital Underworld: Karmatanr's Dark Secret

Just 17 kilometers from Jamtara lies Karmatanr, a small town with a striking historical paradox. Once the workplace of Ishwar Chandra Vidyasagar, a revered 19th-century social reformer, it has tragically transformed into a hub for cybercrime syndicates. In a disturbing twist of fate, many of its "vishing" (voice phishing) experts are minimally educated youths who have never left their hometown, yet their reach extends to bank accounts of Bollywood celebrities, politicians, and bureaucrats nationwide.

The origins of this pervasive scam culture trace back to Sitaram Mandal, a local resident from Sindarjor village. According to Jamtara police records, about a decade ago, Sitaram went to Mumbai, where he worked in a mobile recharge shop and learned the art of fraud. Upon his return during holidays, he began to apply these tactics. Using fake SIM cards, he would impersonate bank managers, calling customers to inform them their cards were blocked. Under this pretext, he would illicitly obtain ATM numbers, OTPs (One-Time Passwords), and CVV numbers. By the time the call ended, the customer's pockets were often empty. Sitaram's disciples quickly formed numerous gangs, meticulously carrying out this deceitful game across the country from their base in Karmatanr.


High-Profile Victims and Evolving Tactics

The audaciousness of these fraudsters is evident in their choice of targets. A year prior to this report, Delhi Police arrested Sitaram, revealing he had siphoned off ₹5 lakh from a prominent actor's account (whose name was not disclosed). In another notable case, Jamtara's Ataul Ansari defrauded Parneet Kaur, wife of then-Punjab Chief Minister Amarinder Singh, of ₹23 lakh by impersonating a bank manager over the phone. Even a Member of Parliament from Kerala fell victim, losing ₹1.60 lakh in a case registered at the Parliament House police station in Delhi, leading to the arrest of Dhananjay and Pappu Mandal from Jamtara.

The methods have evolved since the initial mobile recharge scams of 2011. Early on, groups of youth learned how to recharge phones without paying. Within a couple of years, this escalated to sophisticated schemes involving the siphoning of money from bank accounts by tricking victims into revealing financial details. Records at the Karmatar police station reveal a surge in activity: between April 2015 and March 2017 alone, police teams from 12 different states visited the station 23 times, arresting around 38 accused.


Beyond Jamtara: The Rise of New Cyberfraud Hubs

The cyberfraud phenomenon is not confined to Jamtara alone. A new epicenter has emerged at the tri-junction of Mewat (Haryana), Bharatpur (Rajasthan), and Mathura (Uttar Pradesh). The reason for this strategic choice lies in network vulnerabilities. Devices in these border areas often pick up networks from different states, and signals frequently switch between mobile towers, creating "black spots" or "no-man's-lands" for mobile networks. These technical glitches provide a crucial shield for fraudsters, making it incredibly difficult for police to track their exact location, as telecom firms maintain separate tower networks for different states.

Furthermore, fraudsters in these regions procure SIM cards in bulk from states in the northeast and Maoist-affected areas. This tactic serves a dual purpose: these SIMs are easier to acquire, and using addresses thousands of kilometers away helps the fraudsters cover their tracks more effectively.


The Latest Threat: e-SIM Phishing and Global Parallels

Jamtara's modus operandi continues to adapt. The latest iteration involves an e-SIM phishing racket. Fraudsters call customers to obtain their OTP and email address, subsequently converting the victim's physical SIM card into an e-SIM. Once they control the e-SIM, they gain control over the victim's bank account, transferring funds into mobile wallets on services like PhonePe, Ola Money, Paytm Payments Bank, and Airtel Payments Bank.

This alarming rise in cybercrime in Jamtara has even drawn international parallels. The Romanian town of Râmnicu Vâlcea, infamously known as "Scamville," is considered its global equivalent, showcasing how localized crime hubs can achieve widespread notoriety. The phenomenon has also permeated popular culture, inspiring the Netflix web series "Jamtara: Sabka Number Aayega" and episodes of "Crime Patrol."


Protecting Yourself: Simple Steps for Cyber Safety

In an era where digital threats loom large, awareness and caution are your best defenses.

  • It is best to avoid clicking on any suspicious links received via message or email.

  • Do not fall into any KYC (Know Your Customer) update traps over the phone, as banks never ask for such details verbally.

  • Never share your banking details, card numbers, PINs, OTPs, or CVV numbers with anyone over the phone or through unverified links.

By remaining vigilant and informed, you can protect yourself from becoming another statistic in Jamtara's dark legacy.


References:


Close Menu