London Underground Fraud Gang Used Suitcase SMS Blasters to Target Commuters
A sophisticated fraud operation targeting London Underground passengers with homemade "SMS blasters" concealed in large suitcases has been detailed in court proceedings, revealing a carefully orchestrated scheme to steal money from unsuspecting commuters through deceptive text messages.
Suitcase-Based Smishing Operation Uncovered
Prosecutors at Inner London Crown Court described how alleged fraudsters wheeled reinforced suitcases containing specialized equipment through the London Underground network, specifically designed to broadcast fraudulent text messages to nearby mobile phones. The devices, described as "rather sophisticated" by the prosecution, functioned by masquerading as legitimate cell towers, tricking passengers' phones into connecting to them instead of their normal network providers.
Once connected, the system automatically sent scam messages pretending to be from reputable delivery companies like Evri and Royal Mail, claiming packages could not be delivered and urging recipients to follow links that would ultimately compromise their bank account information. This technique, known as "smishing" (combining SMS and phishing), represents a growing threat in urban transportation environments where high passenger density creates ideal conditions for such operations.
Key Defendants and Alleged Roles
The prosecution identified 48-year-old Zhijia Fan as the alleged "top boss" of the criminal organization, with 20-year-old Daoyan Shang described as his "right-hand man" and lieutenant. Both defendants, who have no fixed address, have pleaded not guilty to charges of conspiracy to defraud and possessing articles for use in fraud between January and March 2025.
According to prosecutor Alex Davidson, evidence suggests Fan directed the operation while Shang assisted in its implementation. Mobile phones, antennas, and base stations were reportedly seized from both men following their arrests. The court heard that another alleged gang member, Wan Hafiz, has already pleaded guilty to involvement in the conspiracy, while a fourth suspect, Jinhua Zhang, remains at large after fleeing while on bail.
Technical Details of the Operation
The homemade SMS blasters were described as "crude" yet effective devices that required careful concealment and transportation. Prosecutors explained that the gang used large suitcases with reinforced metal bottoms and ventilation holes punched into the material to accommodate the "rather bulky and heavy" base stations, which reportedly suffered from frequent breakdowns requiring regular maintenance.
Davidson emphasized to the jury that the London Underground network provided the perfect environment for this type of fraud due to its millions of daily passenger trips, dense urban locations, and areas with limited cellular signal where phones would be more likely to connect to the fraudulent devices. The prosecution argued this demonstrated careful planning and targeting by the alleged conspirators.
International Expansion Plans Revealed
Court proceedings revealed that the alleged fraud network had ambitions beyond London's transport system. Evidence presented suggested discussions between Fan and another individual, Gatis Lauks (who has pleaded guilty to separate fraud charges), about "the feasibility of deploying" similar SMS blaster operations on the Paris Metro system.
Prosecutors argued this international dimension further implicated Fan as someone actively engaged in defrauding the public on a significant scale. The revelation highlights how such criminal operations can potentially expand across borders using similar technical approaches in different metropolitan transit systems.
Discovery and Arrests
The scheme began to unravel when an off-duty British Transport Police officer, described as "very perceptive," became suspicious while waiting for a train in March 2025. The officer noticed a suitcase with unusual holes punched in it, leading to Zhang's initial arrest. Subsequent investigations resulted in the arrests of Fan, Shang, and Hafiz at later dates.
The prosecution emphasized to the jury that the guilty plea from one gang member and the attempted expansion to Paris provide clear evidence of an organized conspiracy to defraud the public. The central question for the jury remains whether Fan and Shang were willing participants in this elaborate scheme targeting London Underground passengers through technological deception.
The trial continues as the court examines the evidence against the two defendants who maintain their innocence against the fraud allegations. The case highlights growing concerns about technological vulnerabilities in public transportation systems and the sophisticated methods criminals employ to exploit everyday commuters.