How Operation Orca Exposed New Zealand's First SMS Blaster Scam
When cutting-edge criminal technology meets teenage ambition, the result can be devastating for both the perpetrator and potential victims across an entire country.

When cutting-edge criminal technology meets teenage ambition, the result can be devastating for both the perpetrator and potential victims across an entire country.
The device looked innocent enough — about the size of an old computer tower, bristling with antennas and tucked away in the boot of a car parked somewhere in central Auckland. Yet this unassuming piece of technology represented something that had never been seen before in New Zealand: an SMS blaster capable of bypassing the entire country's mobile network security infrastructure.
Within hours of activation, the device could trick thousands of mobile phones into connecting to its fraudulent network, sending convincing text messages that appeared to come from major banks whilst remaining completely invisible to traditional fraud detection systems.
Operation Orca, the multi-agency investigation that dismantled this sophisticated smishing operation in August 2024, offers crucial insights for AML professionals into how criminal technology adapts faster than regulatory frameworks, and why even teenage perpetrators can pose devastating threats to financial system integrity.
The Technology That Changed Everything
An SMS blaster functions as a false cell tower which tricks nearby mobile devices into connecting to a fraudulent network. The psychological impact on victims is immediate and powerful—receiving what appears to be an official bank message creates authentic-seeming urgency that overrides normal caution.
These devices have their roots in technology known as IMSI catchers, StingRays, or cell site simulators, which have been used by law enforcement and intelligence agencies to gather data on individuals. However, criminals have weaponised this legitimate surveillance technology for financial fraud on an unprecedented scale.