The U.S. Secret Service says it has aggressively shut down a quiet network of SIM server farms near New York City—a big enough operation that investigators’ right-hand rule applies, meaning it was likely in place to degrade if not disable hospital and other cell phones nearby. The ring was said to have fueled huge numbers of mass mock calls, involving swatting threats on senior U.S. officials, as well as being used to disguise comms for both nation-state operators and criminal entities.
What Investigators Found Across the New York Region
Investigators seized over 300 SIM servers with some 100,000 cards in various “electronic safe houses,” the Secret Service said. Some of the systems were concealed in rented apartments and “inconspicuous commercial locations,” located densely around the region including Queens, New Jersey, Armonk and Greenwich as part of a ring surrounding critical cell towers.
Early indications are that suspected state-linked operators were in communication with people already identified by federal law enforcement. The same tool was used to make swatting calls to lawmakers, causing emergency deployment on fabricated hostage or shooting situations, CNN reported.
Many of the servers, importantly, were located in the same area as the United Nations campus, and this prompts worries that the network might have been constructed as a plan for disruption of connectivity during high-profile events or deny encrypted channels for operatives in close proximity.
How SIM Server Farms Operate and Enable Abuse
SIM server farms — they’re also known as SIM boxes or banks — cram thousands of SIMs into rack-mounted gateways that can generate voice calls and texts on an industrial scale. In the world of fraud, they are often used to avoid carrier fees or to blitz out one-time passcodes and spam. SIM box abuse has long been highlighted by the GSMA as a major telecom fraud vector.
But at the volume described by the Secret Service, these systems are capable of more than evading tariffs. When coordinated, they can inundate a local radio access network with signaling, obscure the source of calls and automate pervasive campaigns such as organized spoofing or harassment. The seized gear, the investigators said, could also push targeted denial-of-service effects at cell sites — overwhelming resources and degrading service without physical sabotage.
SIM farms are a different technology from IMSI catchers. The former generate or retransmit traffic through valid SIM keys; the latter are interception devices that impersonate base stations. Both can be abused, but they abuse very different parts of the cellular ecosystem.
Why Disabling Cell Towers Endangers Public Safety
Cellular networks underpin public safety. The FCC points out that most 911 calls in the United States come from mobile phones. Even isolated service disruptions can delay emergency response, interrupt Wireless Emergency Alerts and impede coordination among first responders. CISA designates the sector as a National Critical Function specifically because outages cascade through transportation, healthcare, financial and government functions.
In cities, networks are powered by thick grids of 4G and 5G sites that can divide their time between delivering capacity and coverage. A concentrated signaling flood or call storm in a couple of neighborhoods is enough to upset this balance and, for thousands of people, swamp the radio network with dropped calls, failed texts and compromised data sessions. As attacks become increasingly sophisticated, and potentially more damaging to national security, defenses need to scale as quickly as the threats do — though not in terms of how quickly things get blown up.
Attribution and Motives Behind the SIM Server Ring
The location of the money and command structure remains to be pieced together by investigators. The pattern that is beginning to emerge fits a hybrid motive set: political harassment and intimidation through swatting; communications cover for operators; as well as a dormant capability to disrupt networks during politically sensitive moments, with proximity to diplomatic centers suggesting a tradecraft of espionage and call patterns that mimic techniques used in criminal spam and toll bypass efforts.
The F.B.I., which runs a National Swatting Virtual Command Center, has documented an increase in the use of coordinated hoaxes in recent years. Stack a SIM farm on top of internet-based calling and those bad actors have a far more difficult hoax to trace and one that can quickly scale out; in particular when the likely rotation of SIMs is spatially distributed and automated at the server side.
How Carriers and Agencies Are Responding
Carriers already use analytics to identify SIM box patterns—call terminations outside the norm, unusual IMEI–IMSI pairings, and high-velocity SMS traffic—and increasingly collaborate with law enforcement on takedowns. STIR/SHAKEN is a standard for caller ID authentication in IP voice networks that attempts to thwart spoofing among other nefarious tactics; of course, baddies combine many techniques to skirt around filtering.
CISA and the FCC have recommended that carriers harden their signaling planes, share indicators of compromise, and practice dealing with outages alongside emergency services. Tabletop exercises are now a standard part of planning by government facilities and event planners, and scenarios on cellular degradation have been added alongside threats like physical violence or cyberattack.
What to Watch Next in the SIM Server Farm Case
The forensics on that, mapping SIM inventories to traffic, tracing payments and correlating call metadata — all of which will be required eventually to get a handle on the attack — would identify whether this was something state-ordered or a criminal service for hire. Expect more seizures as teams trace up the supply chain — server vendors, apartment leases, power and backhaul contracts and the resellers that provisioned bulk SIMs.
The bigger lesson is strategic. Modular tools that make for legitimate scale in telephony and data need only cyber platforms to be turned against their owners, elected officials and the everyday security of citizens. Exposing a 100,000-card ring on America’s most crowded airwaves highlights that the front lines for defending critical infrastructure now involve racks of plastic cards — and the software smart enough to use them.