top of page
Search

FBI Deepens Probe into Sprawling 'SIM Farm' Network as New Jersey Cache Reveals Ties to Foreign Actors

  • Writer: 17GEN4
    17GEN4
  • Nov 15
  • 4 min read

New York, NY – November 15, 2025  As federal investigators peel back the layers of one of the most sophisticated telecommunications sabotage operations ever uncovered on U.S. soil, the FBI has taken the lead in a multi-agency effort to trace the origins of a vast network of illicit "SIM farms" stretching from the shadow of the United Nations headquarters to remote warehouses in New Jersey and beyond. What began as a routine probe into anonymous threats against high-ranking officials has ballooned into a nationwide hunt for foreign-linked operatives, with authorities warning that the dismantled network was just the tip of a potentially catastrophic iceberg.



The saga unfolded in late August when U.S. Secret Service agents, acting on intelligence from springtime "telephonic threats" targeting three unnamed senior government officials, raided five clandestine sites encircling New York City's cellular infrastructure. Hidden in nondescript buildings—from upscale Armonk, New York, to affluent Greenwich, Connecticut, and gritty Queens—investigators seized over 300 SIM servers and more than 100,000 programmable SIM cards. These devices, officials say, were primed for a barrage of attacks: overwhelming cell towers to trigger citywide blackouts akin to those after 9/11, spoofing 911 calls to paralyze emergency response, or enabling encrypted backchannels for espionage and cyber intrusions."


The scale and sophistication here are unprecedented," FBI Assistant Director for Counterintelligence Jay D. Johnson stated during a rare briefing at the agency's New York field office on Thursday. "This wasn't a lone hacker in a basement. We're talking about a well-resourced enterprise capable of crippling communications at the precise moment New York—and the world—was most vulnerable." The timing, just ahead of the United Nations General Assembly in September, amplified the alarm; though no direct plot against the summit was confirmed, the network's 35-mile radius around UN headquarters raised immediate red flags.


The plot thickened in early October, when Homeland Security Investigations (HSI) agents uncovered a sixth site in rural Essex County, New Jersey—a sprawling, unmarked warehouse stocked with an additional 200,000 SIM cards, high-end servers, and forensic traces of illegal firearms, 80 grams of cocaine, and burner phones. This discovery, sources familiar with the case told the Associated Press, effectively doubled the operation's potential firepower and pointed to a "series of connected networks" designed for redundancy and evasion. "It was like finding a second arsenal," one HSI official remarked anonymously. "These weren't isolated stashes; they were nodes in a web that extended into Pennsylvania and possibly further west."


As of November 15, the FBI's involvement has escalated the probe into a full-scale counterintelligence operation, partnering with the Secret Service, HSI, the Department of Justice, and the Office of the Director of National Intelligence. Forensic teams are sifting through terabytes of data from the seized devices—call logs, text metadata, browser histories, and encrypted traffic—revealing "multiple foreign links," including communications to known Chinese threat actors. Officials have stopped short of naming state sponsors, citing the active investigation, but private-sector cybersecurity firms like CrowdStrike have flagged similarities to the "Salt Typhoon" hacks, where Chinese operatives infiltrated U.S. telecom giants to spy on political figures.


No arrests have been made, a point of frustration for lawmakers on Capitol Hill. At a House Intelligence Committee hearing last week, Rep. Mike Turner (R-Ohio) lambasted the agencies for "playing catch-up with invisible enemies." "This network could have jammed every iPhone from Manhattan to Newark during a crisis," Turner said. "We need names, indictments, and a firewall against the next one—yesterday." In response, FBI Director Kash Patel vowed in a statement to Congress that "every lead will be chased to its source," allocating an additional 50 agents to the task force.


The human cost lingers in the shadows. The initial threats—swatting calls and bomb hoaxes that forced evacuations and diverted resources—left officials and their families in a state of heightened paranoia. One victim, a Cabinet-level figure, described the ordeal to CNN as "a digital noose tightening around your neck." Broader implications ripple through critical infrastructure: Wireless providers like MobileX, whose SIMs dominated the cache, have bolstered fraud detection, but experts warn that SIM farms remain a cheap, scalable weapon for disruption.


Critics, including privacy advocates, have raised eyebrows at the government's narrative. Techdirt published an analysis questioning the Secret Service's claims of an "imminent threat" to the UN, suggesting the haul might stem from a massive spam operation rather than a targeted attack. "300,000 SIMs for DoS? Overkill," the report argued. "This looks more like a burner-phone mill for scams." Yet counterterrorism experts like former FBI agent John Ferrante counter that the setup's modularity—stacked servers ready for mass activation—screams statecraft. "Simple tools, asymmetric impact," Ferrante told PBS. "That's the hallmark of modern hybrid warfare.


"For New Yorkers, the unease persists. Enhanced sweeps continue across the tri-state area, with the NYPD deploying mobile signal detectors in high-risk zones. UN security, already ironclad, has layered in telecom redundancies for future assemblies. As winter sets in, Patel's team presses on, chasing digital breadcrumbs that could unravel a global plot. "We've dismantled the hardware," he said. "Now we hunt the hands behind it." The question remains: How many more farms lurk in the ether, waiting to dial up chaos?

 
 
 

Comments


bottom of page