gbo777a.one

Andhra Police Dismantle Philippines-Linked Betting Racket, Arrest Ten Accused

Andhra Police Dismantle Philippines-Linked Betting Racket, Arrest Ten Accused
Foto: gbo777a.one

Authored by gbo777a.one, 06 May 2026

A coordinated crackdown by Anantapur district police has exposed an illegal online betting operation allegedly run from Makati, Metro Manila, with ground-level networks embedded across Andhra Pradesh and Telangana. Ten persons were arrested at Kalyanadurgam town on May 4, following intelligence gathered during the high-viewership period of the Indian Premier League - a window that investigators say reliably drives a surge in illegal wagering activity. Superintendent of Police P Jagadeesh confirmed the arrests and the recovery of assets valued at approximately ₹60 lakh in total seized and frozen funds.

How the Operation Was Structured

The racket operated through a mobile application called "Dream Play 1," which allegedly hosted illegal online casino games and cricket-based betting over the past three years. The principal accused, identified only as Shiva, is believed to have run the offshore end of the operation from the Philippines and remains at large. A second absconder, Sachin from Karnataka, is thought to have managed coordination on the Indian side before disappearing.

Local logistics were handled by Talari Madhu, who police say established contact with Shiva through Instagram - a detail that illustrates how readily organized financial crime now recruits through mainstream social platforms. The arrested individuals come from both AP and Telangana, underscoring the cross-state reach of what would otherwise appear to be a district-level case.

Police seized ₹19.70 lakh in cash, a Mahindra XUV 700 vehicle, four motorcycles, three laptops, a tablet, 15 mobile phones, 15 SIM cards, 13 ATM cards, cheque books, scanners, pen drives, card readers, and promotional material linked to the application. A further ₹18.20 lakh was frozen across nine bank accounts.

The Mule Account Network and Its Significance

A striking element of the investigation is the gang's alleged use of mule bank accounts - a method increasingly favored by transnational cybercrime rings to obscure money flows. According to police, the accused recruited around 70 individuals by paying each approximately ₹10,000 in exchange for their bank account credentials, passbooks, and SIM cards. These materials were then reportedly routed through associates in Delhi and dispatched to the Philippines concealed within cargo consignments.

Mule account schemes are particularly difficult to prosecute because the account holders - often unaware of the full scope of their involvement - occupy a legal grey area between victim and accessory. Regulators and law enforcement agencies across South and Southeast Asia have flagged this recruitment model as one of the more resilient mechanisms used to launder proceeds from illegal online gambling. The relative anonymity of digital payment rails, combined with the physical movement of credentials across borders, creates compounding layers of jurisdictional complexity for investigators.

The Broader Context of Offshore Gambling Operations

The Philippines has, over the past decade, developed a significant footprint in the offshore online gambling industry. While the country's regulatory body, PAGCOR, licenses operators serving foreign markets, the environment has also become a base for unlicensed or outright illegal operations targeting countries - including India - where online gambling remains prohibited or heavily restricted under laws such as the Public Gambling Act of 1867 and various state-level statutes.

India does not have a unified federal framework governing online gambling, leaving enforcement to a patchwork of state laws and investigative discretion. This ambiguity has historically made it easier for offshore operators to function in a legal shadow, collecting rupee-denominated revenue while nominally operating under foreign jurisdiction. The Anantapur case fits a pattern seen repeatedly in recent years: a technology layer operated abroad, a domestic network of agents managing cash and accounts, and a recruitment infrastructure that draws in economically vulnerable individuals as unwitting facilitators.

What the Arrests Reveal About Enforcement Gaps

The fact that the operation ran for approximately three years before detection points to the difficulty of monitoring encrypted application-based platforms, particularly when the server infrastructure sits beyond India's territorial reach. Intelligence-led policing - acting on specific inputs rather than routine surveillance - remains the primary tool available to state-level forces in such cases, but it is inherently reactive rather than preventive.

Two key accused remain absconding, and the offshore operator has not been apprehended. Indian law enforcement agencies face treaty and extradition limitations when pursuing suspects in foreign jurisdictions, meaning the architects of such schemes often face lower personal risk than their local operatives. For the ten arrested in Kalyanadurgam, the charges they face are likely to include provisions under the Information Technology Act alongside applicable gambling statutes - but the network's financial and technical core may remain functional until bilateral cooperation closes the gap.