A 68-year-old resident of Humayun Nagar in Hyderabad lost ₹26.06 lakh after cybercriminals impersonating the Anti-Terrorist Squad (ATS), National Investigation Agency (NIA) and even senior state police officials coerced him into transferring funds. The scammers accused him of links to money laundering and a recent attack in Kashmir, then escalated pressure through WhatsApp video calls where they displayed fabricated warrants and official-looking documents. The case underscores the growing use of ‘digital arrest’ tactics—intimidation over phone and video—designed to force victims into secrecy and rapid payments.

How the con unfolded

  • Initial contact: The victim received a call alleging involvement in terrorism-related activity.
  • Escalation via video: Fraudsters shifted to WhatsApp video, showing forged arrest and investigation papers to create urgency and fear.
  • Financial coercion: Under duress, the victim prematurely closed fixed deposits and transferred ₹6.06 lakh from accounts at Kotak Mahindra Bank and RBL Bank.
  • Wider impact: He subsequently moved ₹20 lakh from his wife’s account to a beneficiary named “Hentry Jones.”
  • False legitimacy: The gang used counterfeit letters purportedly from the Reserve Bank of India to bolster credibility.
  • Breaking the silence: After relatives grew suspicious, the victim disclosed the ordeal and reported it to the National Cyber Crime Helpline (1930).

The playbook scammers use

Criminals are increasingly blending social engineering with low-cost tech to mimic authority and trigger panic: - Caller ID spoofing to display names or numbers resembling official agencies. - WhatsApp video calls to present doctored IDs, seals and warrants. - Accusations tied to terrorism or financial crimes to maximize fear and compliance. - Demands for confidentiality to isolate the victim from family and bank safeguards. - Payments framed as ‘verification’, ‘case closing’ or obtaining a so-called ‘No Involvement Certificate.’

What Hyderabad police advise

Authorities stress that real police and investigative agencies do not demand money transfers to clear names, nor do they issue paid ‘certificates’ to end investigations.

If you get such a call: - Hang up immediately and do not engage further. - Do not share personal data, OTPs, account details or ID images. - Verify independently: contact your local police station or official helplines; do not call back numbers provided by the caller. - Report quickly to freeze funds: - Cyber Crime Helpline: 1930 - Online complaint: www.cybercrime.gov.in - Hyderabad Cyber Crime (emergency): Call or WhatsApp 87126 65171

Why the ‘digital arrest’ tactic works

  • Psychological pressure: Visuals of supposed warrants and official seals over video calls exploit trust in uniforms and insignia.
  • Manufactured urgency: Threats of imminent arrest push victims to act before they can verify.
  • Social isolation: Instructions to keep the call secret limit family or bank intervention.
  • Trust laundering: References to national agencies and central bank letters create a veneer of authority.

How to protect yourself and family

  • Pre-commit to a rule: Never move money on a call; always verify in person or via known official channels.
  • Use call-blocking and spam filters, but don’t rely on caller ID; it can be faked.
  • Enable transaction alerts on all bank accounts; set strict daily limits for online transfers.
  • Discuss scams with elders and dependents; agree on a family protocol for suspicious calls.
  • Keep copies of IDs and financial documents secure; avoid sharing on messaging apps.

If you’ve already paid

Speed is critical. Banks can sometimes place a hold if alerted quickly. - Call 1930 immediately and file an online complaint at cybercrime.gov.in. - Inform your bank’s fraud team, provide the UTR/transaction IDs, and request an urgent hold on beneficiary accounts. - Lodge a complaint with the local police/cyber crime unit; preserve call logs, screenshots, video recordings and messages as evidence. - Monitor credit reports and change passwords/UPI PINs linked to compromised numbers or devices.

The bigger picture for Telangana

Hyderabad’s case reflects a national trend of tech-enabled fraud where criminals combine spoofed identities, video intimidation and counterfeit paperwork. As more services move online, attackers are shifting from mass phishing to personalized, high-pressure cons that target trust in institutions. Public awareness, rapid reporting and tighter verification habits remain the most effective defenses while law enforcement pursues the networks behind these operations.