A phone that cannot dial 911 is more than an inconvenience. It is a failure of the system that sits at the foundation of every assumption about public safety. For a period during the Toronto SMS blaster operation, that failure was real β€” and it was deliberate.

Toronto police announced the conclusion of a months-long investigation this week with the confirmation that three men have been arrested in what authorities describe as Canada’s first criminal prosecution of individuals using SMS blasters: devices that impersonate legitimate cellular towers to intercept connections and deliver mass phishing text messages. Their operation caused more than 13 million network disruptions and, critically, temporarily blocked tens of thousands of mobile devices from reaching emergency services.

β€œThis wasn’t targeting a single individual or business,” said Deputy Chief Robert Johnson. β€œIt had the ability to reach thousands of devices at once.”

What an SMS Blaster Actually Does

An SMS blaster β€” technically a rogue base transceiver station or IMSI catcher operating in aggressive downgrade mode β€” mimics a legitimate cell tower. Mobile phones within range detect the device’s signal and connect to it automatically, following the same logic they use to connect to any carrier infrastructure. Once connected, the device can send SMS messages to the connected phones that appear to originate from trusted senders: banks, government agencies, package delivery services, or any other entity the operators choose to impersonate.

The legitimate cellular carrier never sees the connection. The phone’s user sees a text message that looks like it came from their bank asking them to verify their account, or from the government informing them of a benefit requiring confirmation, or from a courier requesting a fee to release a parcel. The phishing payload is delivered silently, at scale, to every device that connected to the fake tower.

The secondary effect β€” the 911 disruption β€” emerges from how these devices function at a technical level. By forcing devices to connect to a rogue tower operating in a degraded mode, the blaster can prevent those devices from registering on the legitimate network. A phone that has handed off its connection to a rogue tower may be unable to reach emergency services until it re-establishes a legitimate carrier connection β€” which requires the rogue tower to release it or the user to power-cycle the device.

This is not a theoretical risk. In the Toronto operation, investigators confirmed that the disruption was observed across tens of thousands of devices simultaneously, and that 911 access was blocked during those windows.

The Investigation: November 2025 to April 2026

The investigation began in November 2025, when Toronto police and Canadian telecommunications carriers began observing anomalous patterns in network connectivity β€” spikes in device handoffs, unusual signal interference patterns in specific geographic areas, and a correlation between those patterns and a rise in phishing text complaints from residents.

SMS blaster activity is detectable with the right tooling. Legitimate cell towers have registered identifiers that appear in carrier monitoring systems. A rogue tower does not. When devices in a given area begin reporting connections to an unregistered base station, that is a detectable signal β€” though localising the physical device requires mobile scanning equipment and operational resources that most law enforcement agencies have only recently begun deploying.

The first arrests came in March 2026 after investigators narrowed the location of the blasting operations and identified the individuals operating the equipment. The third suspect turned himself in to Toronto police in late April. The final arrest closed the case the same week authorities made the announcement.

Three Suspects, One First

The three suspects’ names have not been released publicly at the time of writing, consistent with Canadian practice for individuals who have been arrested but not yet formally charged or convicted.

What authorities have confirmed is that this is the first criminal prosecution under Canadian law for SMS blaster use. That is a notable milestone not because the technology is new β€” rogue cell tower devices have been documented in academic and security research for years, and their use by cybercriminals in other jurisdictions (particularly the UK, where multiple SMS blaster prosecutions have occurred) is well established β€” but because Canada had not previously brought criminal charges for the activity.

The charges are expected to include criminal use of a prohibited device, fraud, and interference with telecommunications infrastructure. The specific sections of the Criminal Code of Canada being applied have not been confirmed at the time of writing.

The Scale Problem

Thirteen million network disruptions is a number that requires some context. It does not mean thirteen million distinct victims. A network disruption, in this context, means a device connection that was intercepted or interfered with. A single device that passed in and out of the rogue tower’s range multiple times β€” on multiple days, as the suspects moved the equipment β€” would generate multiple disruptions. A downtown Toronto street during peak commuting hours might generate thousands of disruption events from a relatively small number of affected individuals.

Even adjusting for this, the scale is significant. The rogue towers were operated across multiple locations and over multiple months. The geographic footprint of an SMS blaster depends on its signal strength and the environment, but in urban conditions a single device can reach devices across several city blocks. Operators moving the equipment through populated areas can cover a large total area over time.

The 911 interference, by contrast, is harder to minimise with statistical adjustments. If a device cannot reach emergency services because it has connected to a rogue tower, that is a complete failure of emergency access for that device during that period. Tens of thousands of devices experiencing that failure simultaneously represents a genuine public safety event β€” one that fortunately did not coincide with a mass casualty incident requiring coordinated emergency response.

Why This Technology Has Moved From State Use to Criminal Use

SMS blasters and IMSI catchers originated as law enforcement and intelligence tools. Government agencies in multiple countries use similar technology β€” under judicial oversight in some jurisdictions, with considerably less transparency in others β€” to intercept communications, track device locations, or deliver controlled payloads to specific targets.

The migration of this technology to criminal use follows a familiar pattern: capabilities developed and deployed by state actors eventually become accessible to non-state actors as the technology matures and its cost decreases. What required a government contract in 2015 could be purchased on Alibaba by 2022. The hardware required to build a functional SMS blaster has been commoditised. The software required to operate it is, in some variants, commercially available as a testing tool.

Toronto authorities noted that the equipment seized from the suspects was not proprietary or bespoke β€” it was built from commercially available components that have legitimate telecommunications testing applications. The line between a device that a carrier uses to test network coverage and a device that a criminal uses to intercept subscriber connections is defined more by the operator’s intent than by the hardware itself.

For Carriers and Subscribers

The Toronto case is the kind of incident that Canadian telecommunications providers β€” Bell, Rogers, Telus β€” will have been closely monitoring. The detection side of this problem has improved substantially over the past three years. Carriers now run monitoring systems designed to identify rogue base stations based on their lack of valid network credentials and the anomalous connection patterns they create. GSMA standards for rogue tower detection have been implemented, at varying levels of completeness, across major North American networks.

But detection and disruption are different capabilities. A carrier can identify that a rogue tower is operating in a given area. Removing it requires locating the physical device and involving law enforcement. The gap between detection and interdiction is the window in which the device causes harm.

For subscribers, the most practical guidance remains unchanged: SMS messages from banks, government agencies, and couriers asking you to click a link or confirm account details are suspicious regardless of the apparent sender. Carriers do not ask customers to verify credentials by text. Banks do not ask customers to re-enter card numbers by clicking a link in an SMS. If a message creates urgency around account access, verify it through the official app or a number you independently look up β€” not the number provided in the message.

A Precedent for Canadian Cybercrime Prosecution

Canada’s first SMS blaster prosecution will set important precedents: what specific offences apply, what evidence of harm is required, and what sentencing range is appropriate for technology-assisted mass communications fraud that interferes with emergency services.

The 911 disruption element is likely to be the most consequential at sentencing. Fraud and telecommunications interference carry their own exposure, but a criminal operation that demonstrably blocked emergency services access for tens of thousands of people has caused harm that goes beyond financial loss. How Canadian courts weigh that harm against the other charged offences will shape how prosecutors approach future SMS blaster cases β€” and how carriers and law enforcement prioritise interdiction resources.

What is not in doubt is that the technology will be deployed again, by other actors, in other Canadian cities. The first prosecution does not end the problem. It establishes that the problem has criminal consequences.


Three men were arrested by Toronto police in Canada’s first criminal case involving SMS blasters β€” rogue cell tower devices used to deliver mass phishing texts. The operation caused over 13 million network disruptions and temporarily blocked 911 emergency service access. The investigation ran November 2025 through late April 2026.