Background and Timeline: The Kaushambi Cyber Police achieve a major breakthrough on Tuesday, January 21, 2026, with the arrest of three individuals for an elaborate impersonation racket. The investigation was triggered by a complaint filed on December 24, 2025, by a resident of Banpurwa Majra. The victim had been cheated of ₹50,000 after being promised that a missing girl from his family had been successfully recovered by authorities.
Modus Operandi: The accused used the UP COP application to download copies of FIRs related to missing boys and girls to identify potential targets. They then used government portals like the Panchayati Raj portal to obtain contact information for village heads or secretaries to locate the victims’ families. Posing as Station House Officers (SHO) or CBI officials, they reached out to these families, falsely claimed the missing person was found, and demanded money for “official expenses”.
Victims and Financial Impact: While the specific complainant lost ₹50,000, the syndicate is suspected of targeting numerous families across Uttar Pradesh who were already under emotional distress. The gang used forged identities and digital tools to facilitate online transfers, making it difficult for rural victims to verify their claims. The financial impact is compounded by the psychological toll on families who were given false hope about their missing loved ones.
Investigation and Agencies Involved: The Cyber Police Station of Kaushambi district conducted the investigation under the direct orders of the Superintendent of Police. Technical teams utilized mobile surveillance, electronic evidence analysis, and digital footprints to track the suspects back to their base in Jhansi district. The investigation revealed that two prior complaints against the suspects had already been recorded on the National Cybercrime Reporting Portal (NCRP).
Arrests and Suspects: Three suspects, all residents of the Jhansi district, were apprehended: Deependra Yadav, Pradeep Kumar, and Ajay Kumar. Police seized six mobile phones, including five Android devices and one iPhone, along with eleven Aadhaar cards and eight SIM cards. The accused were booked under Sections 318(4) and 319(2) of the Bharatiya Nyaya Sanhita (BNS) and Section 66D of the IT Act.
Broader Implications and Trends: This case highlights a “secondary victimization” trend where criminals exploit existing tragedies to extort funds from grieving families. It underscores the vulnerability of public-facing government databases, which are being misused by technical savvy fraudsters to harvest sensitive contact data. Authorities have urged citizens to never pay “official expenses” over the phone and to verify all claims through their local police station in person.