Three men are facing 44 charges in a first-of-its-kind cybercrime investigation in Canada.
Project Lighthouse began in November 2025 after a security partner alerted law enforcement to a suspected SMS blaster operating in downtown Toronto.
This marks the first known instance of this technology being used in Canada and highlights an emerging threat to both public safety and financial security.
“What makes this particularly concerning is the scale and impact,” Deputy Chief Rob Johnson said at a news conference at police headquarters on April 23. “This wasn’t targeting a single individual or business. It had the ability to reach thousands of devices at once. And beyond the financial risk, there are real public safety implications. For instance, when devices are diverted from legitimate networks, even briefly, it interferes with a person’s ability to connect to emergency services.”
An SMS blaster works by mimicking a legitimate cellular tower. When nearby phones connect to it, users receive fraudulent text messages that appear to come from trusted organizations. These messages often prompt recipients to click on links that lead to fake websites designed to capture personal information, including banking credentials and passwords. This tactic is commonly known as “smishing.”
“This is a clear example of how cyber-enabled crime is becoming more advanced, more mobile, and more difficult to detect — and why policing must continue to evolve alongside it,” Johnson said.
Throughout the course of the investigation, police determined the device was mobile and being run out of vehicles which allowed it to move throughout the Greater Toronto Area and be used in multiple locations.
“We believe tens of thousands of devices were connected to the blaster over several months,” Detective Sergeant Lindsay Riddell said. “We also identified more than 13 million network disruptions where devices were unable to properly connect to legitimate cell towers. That is significant because during those moments, access to services like 9-1-1 could be impacted.”
Toronto Police executed search warrants at residences in Markham and Hamilton on March 31. Two men were arrested, and a large quantity of electronic evidence, including several SMS blasters, were seized.
On April 21, a third man turned himself in to police.
Riddell said the investigation involved close coordination with multiple partners, including the RCMP’s National Cybercrime Coordination Centre, the RCMP’s Ontario Division, York Regional Police, Hamilton Police Service, as well as financial institutions and telecommunications providers.
“Their support was critical in helping us identify and disrupt this activity,” she said.
Riddell also reminded the public of steps they can take to protect themselves.
“If you receive a text message you weren’t expecting, do not click on any links,” she said. “Be cautious of messages claiming to be from legitimate organizations requesting payment. Only access your banking through official apps or by typing the website directly into your browser. And never share your personal or login information through unsolicited messages. If you believe you’ve been a victim of fraud, we encourage you to report it to police.”
Johnson recognized the work of TPS members, particularly the Coordinated Cyber Centre within the Intelligence Unit.
“Their expertise, persistence, and collaboration were critical to identifying and disrupting this activity,” he said.
Johnson also thanked TPS policing partners, including the RCMP’s National Cybercrime Coordination Centre, the RCMP’s Ontario Division, York Regional Police, Hamilton Police Service, and private-sector partners who supported the investigation.
He reminded the public that while the technology is new in Canada, the goal of the criminals is not.
“It’s to gain access to your personal and financial information,” Johnson added. “Staying cautious and informed remains one of the most effective ways to protect yourself.”