Billionaire jeweller Nirav Modi flees to UK, claiming political asylum: Report

Agencies
June 11, 2018

New Delhi, Jun 11: Nirav Modi, the billionaire jeweller at the heart of a more than $2 billion fraud case, has fled to the UK, where he is claiming political asylum, the Financial Times reported on Sunday, citing Indian and British officials.

Britain's Home Office said it does not provide information on individual cases.

Nirav Modi could not be contacted by Reuters for comment on the FT report.

Punjab National Bank, the country'a second-largest state-run bank, said earlier in 2018 that two jewellery groups headed by Modi and his uncle Mehul Choksi had defrauded it of about $2.2 billion by raising credit from overseas branches of other Indian banks using illegal guarantees issued by rogue PNB staff at a Mumbai branch over several years.

Nirav Modi is in London trying to claim asylum from what he calls "political persecution", the FT reported.

Ministry of external affairs told the FT that the government was waiting for law enforcement agencies to approach them before pushing for an extradition, which had thus far not happened. The ministry did not respond to a Reuters request for comment outside regular working hours.

The Centre is already seeking the extradition of liquor and aviation tycoon Vijay Mallya over unpaid loans to his defunct Kingfisher Airlines after the businessman and co-owner of the Formula One Force India team moved to Britain in March last year.

Police filed charges against more than 25 people in May including Modi, Choksi, former PNB chief Usha Ananthasubramanian, two of the bank's executive directors and three companies belonging to Nirav Modi.

Modi and Choksi have denied any wrongdoing.

Last month, senior executives at the bank were accused by the police, in a chargesheet filed in court, of misleading the central bank in late 2016 over the lender's handling of the financial messaging system and credit guarantees that were at the centre of the fraud.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 6,2020

New Delhi, Jun 6: Military commanders of India and China are scheduled to meet today at Moldo on the Chinese side of the Line of Actual Control (LAC), to discuss the ongoing dispute along the LAC in Eastern Ladakh.

The Commander of the Leh-based 14 Corps of the Indian Army Commander Lieutenant Gen Harinder Singh will meet his Chinese equivalent Maj Gen Liu Lin, who is the commander of South Xinjiang Military Region of Chinese People's Liberation Army (PLA) to address the ongoing tussle in Eastern Ladakh between the two countries over the heavy military build-up by the People's Liberation Army along the LAC there.

The two sides have held close to a dozen rounds of talks since the first week of May when the Chinese sent over 5,000 troops to the LAC.

On Friday, officials of India and China interacted through video-conferencing with the two sides agreeing that they should handle "their differences through peaceful discussion" while respecting each other's sensitivities and concerns and not allowing them to become disputes in accordance with the guidance provided by the leadership.

In the last few days, there has not been any major movement of the People's Liberation Army troops at the multiple sites where it has stationed itself along the LAC opposite Indian forces.

India and China have been locked in a dispute over the heavy military build-up by the People's Liberation Army (PLA) where they have brought in more than 5,000 troops along with the Eastern Ladakh sector.

The Chinese Army's intent to carry out deeper incursions was checked by the Indian security forces by quick deployment. The Chinese have also brought in heavy vehicles with artillery guns and infantry combat vehicles in their rear positions close to the Indian territory.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 6,2020

New Delhi, Jun 6: With 9,887 new positive cases reported in the last 24 hours, India's COVID-19 count touched 2,36,657 on Saturday surpassing Italy's latest tally of over 2.34 lakh, taking India to the sixth spot among countries with the highest caseloads of the virus.

The Union Ministry of Health and Family Welfare (MoHFW) said that India registered a spike of 9887 new cases and 294 deaths in the past 24 hours taking the tally to 1,15,942 active cases and 6642 deaths.

Today's count was the highest single-day spike in the country, which has now overtaken Italy, according to the tally posted by the Johns Hopkins University which posted that globally the coronavirus had infected over 66.64 lakh people and claimed over 3.91 lakh lives so far.

In india, the MoHFW informed that 1,14,073 persons have been cured/discharged/migrated so far.

Maharashtra remains the worst-hit State as the total number of COVID-19 positive cases reached 80,229. While the total number of active cases in the state stands at 42,224.

In Tamil Nadu, 28,694 cases have been detected so far while Delhi has reported 26,334 coronavirus cases.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.