Scammers PANIC After I Hack Their Live CCTV Cameras!

Imagine a room full of scammers, sitting at their computers, thinking they’re untouchable—until suddenly, their own security cameras are hacked and their identities are exposed live. That’s exactly what happened when I turned the tables on a scam call center in Punjab, India, and watched chaos unfold in real time.

How I Found the Scammers

It all started with a simple search for scam phone numbers. I stumbled upon a network of fake websites offering bogus tech support for devices like Amazon Alexa. Victims would Google “download Alexa app,” click on a sponsored link, and end up on a scam site. When they tried to download the app, they’d get a fake error message and be prompted to join a support chat.

Once in the chat, scammers would call the victim, convince them to install remote access software, and “fix” imaginary problems—for a hefty fee. But while they were trying to access my computer, I was hacking right back into theirs.

Infiltrating the Call Center

By exploiting their remote connection, I gained access to one of the scammer’s machines. From there, I discovered their internal CCTV camera system, guessed the password, and suddenly had a live view of the entire call center—12 camera angles, 15–20 agents, all working together to steal from unsuspecting victims.

But the best part? I could watch them eat, socialize, and even panic as I started exposing their operation.

Gathering Evidence

With access to their computers and cameras, I collected hundreds of files:

Employee resumes
ID cards
Photos of the scammers
Spreadsheets with names, phone numbers, and addresses
Payment databases and fraudulent invoices

I traced payments right back to the managing directors, who foolishly used their real names and emails to set up scam PayPal accounts. I even matched LinkedIn profiles to CCTV footage, confirming the identities of the key players.

Pinpointing Their Location

Using Wi-Fi network names and signal strengths, I mapped the exact location of the call center: the Atrium Cork City building in Sector 74, Phase AB, Mohali, Punjab. Google Street View and YouTube building tours confirmed the match. These scammers were operating in a high-end office complex—proof that fraud can hide in plain sight.

Sabotaging the Scammers

Instead of just watching, I took action:

Reported their Google AdSense account and website to get them banned
Sent their AnyDesk IDs to the platform to block remote access
Reported their PayPal accounts for fraud
Manually refunded victims where possible
Sent all evidence to the FBI and Indian authorities

The Live Confrontation

Now, it was time to scare them. I called the call center, revealing their real names and describing their clothes and surroundings in real time:

“Your name is Sanjie, and your friend next to you is wearing a brown shirt. Why are you scamming people, Sanjie? Look up at the CCTV camera above you—I can see you right now.”

Their panic was immediate. The HR manager, visibly concerned, tried to cover the webcam with tape—except she taped over the webcam light instead. The operations manager pointed at the webcam, grabbed tape, and soon everyone was scrambling, shutting down laptops and taping cameras in a frenzy.

The Fallout

With their identities exposed and their operations disrupted, the scammers were left panicking and powerless. I had traced every payment, every employee, and every move—proving that no scam is truly safe from determined investigators.

Conclusion:

This isn’t just a story about hacking scammers. It’s a warning:

Never install remote access software for “tech support”
Always verify who you’re talking to
Use privacy tools like Aura to protect your data from brokers and fraudsters

 

Scammers beware: you might be watched, and your panic is live for the world to see.