I-T unearths Rs 871 crore scam in Rajkot bank

January 9, 2017

New Delhi, Jan 9: The income tax (I-T) department has detected huge alleged discrepancies in the transactions of a Rajkotbased cooperative bank where Rs 871 crore deposits were made, over 4,500 new accounts opened and more than five dozen accounts having same mobile number initiated, making it one of the biggest cases of black fund generation post November 8.

rajkotThe department's Ahmedabad probe wing has now initiated action under tax laws and has sought full details from the bank after it conducted survey operations against it sometime back and found large irregularities.

Officials said the department's investigation till now has found that cash deposits of Rs 871 crore, majorly using the old notes of Rs 500 and Rs 1000, was made in this bank between November 9-December 30 last year while Rs 108 crore was withdrawn during the same period in a highly suspicious manner not commensurate with the bank's activities during the same period in 2015 or at other times.

The sleuths have identified at least 25 high value cash deposits post demonetization where Rs 30 crore monies have been transacted in an alleged suspicious and unsatisfactory manner and in accounts with purported weak KYC norms in place. An I-T analysis report prepared in this regard states that Rs 10 crore funds were deposited in a number of "dormant" accounts post the currency scrap, including in that of a petroleum firm where Rs 2.53 crore was deposited.

What has startled the taxman has been the fact that a total of "4,551 new accounts were opened in the bank post demonetization as against the average 5,000 of such accounts usually opened in the full year while 62 of these were opened using one mobile number." It was detected, they said, that there were blatant discrepancies in the pay-in slips filled to make the deposits as none of them had PAN numbers quoted, many had no signatures of the depositor even as none had any documents to reflect the source of these amounts.

"It was found that the son of bank's ex-director has received Rs 1 crore through cash deposits in 30 bank accounts. All the pay-in slips were filled by the same person. "Also, the mother of the vice-chairman of the bank has received 64 lakh of cash deposits which have ultimately been transferred to a jeweller," the report alleged and added the funds moved through RTGS and other banking transfer channels.

Comments

Skazi
 - 
Monday, 9 Jan 2017

Shaji, even the role of notorious BJP leaders can not be ruled out ....

Let the justice prevail, and INDIA be CLEAN ....

shaji
 - 
Monday, 9 Jan 2017

I hope investigation will lead to involvement of anti social, anti national and terrorist organisation in this huge currency deal.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest.com web desk
June 8,2020

New Delhi, Jun 8: Two civil defence employees have been arrested by the Rajasthan Police today in Jaipur based on Military Intelligence (MI) inputs that they had been passing on sensitive information to Pakistan's spy agency ISI.

The arrested are: Vikas Kumar (29), a civil defence employee at an army ammunition depot near Shri Ganganagar (Rajasthan) and Chiman Lal (22), a civil contractual employee of the army's Mahajan Field Firing Range (MFFR), Bikaner. 

Both were working as espionage agents on behalf of Pakistan's intelligence agency and were giving out details of Ammunition and MFFR, vital military installations in India's Western front. 

The MI Lucknow's operation named Desert Chase assumes great importance as the Shri Ganganagar Ammunition Depot and Bikaner MMFR are strategically important military installations on the western front along the Pakistan border.

The work on the "operation" began in August 2019, when the MI Lucknow, through its sleuths, learnt about an espionage agent near Sri Ganganagar who was passing military information to his handlers in Pakistan. The individual was identified as Vikas Kumar - the civil defence employee at an army ammunition depot near Sri Ganganagar.

The MI Lucknow shared the case with UP ATS in the month of January 2020. Vikas's activities were monitored and analysed by a joint team of MI Lucknow and UP ATS. The operation was code-named 'Desert Chase'.

Based on these, it was learnt that Vikas is acquiring photos of a "water distribution register" at a water point/pump house in MFFR through a contractual civil employee named Chiman Lal. The development of the case was halted due to the start of the lockdown period all across the country.

Finally, the case shared with Rajasthan Police Intelligence in the first week of May 2020. A joint team was formed between Rajasthan Police-Intelligence and MI Lucknow.

Fresh leads were found as new payments were detected along with a trail of sensitive information being passed on to Pakistan by two accused.  

Vikas Kumar confessed to having passed the following information to Pakistan:

•    Details received from Chiman Lal about Army units and their strength coming to MFFR.
•    Details of ammunition coming to his ammunition depot including their type, quantity, mode of transportation, date of arrival on a routine basis (almost every time it came to his notice).
•    Details of ammunition (to include their type, quantity and mode/date of transportation) further distributed/transferred to local army establishments/units (including two local brigades) and elsewhere from his ammunition depot.
•    ORBAT (Order of battle; composition related details) of two local army brigades and all changes in them as they came to his notice.
•    Name, rank and personality traits of some Senior Military Officers in the two army brigades nearby, his ammunition depot and others who visited the military station.
•    Photos of arms, ammunition, tanks other military vehicles (with their tactical numbers) at MFFR whenever he could visit it after April 2019.

Vikas also confessed to having received at least Rs 75,000 in total from his Pakistani handler for the information he has shared during this entire period. He used to receive them mostly on bank accounts of his and his brother, Hemant Kumar. The latter was found to have no links to the espionage case otherwise. Out of this sum, he had paid approximately Rs 9,000 in total to Chiman Lal for his assistance in lots of Rs 1000- Rs 2000 since their first meet.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 6,2020

Bengaluru, Jan 6: Cab aggregators are once again in news for the wrong reasons after an Ola cab driver misbehaved with a 34-year-old woman passenger and even threatened to kill her when she raised an alarm.

But what followed was worse. The woman, a software engineer, immediately called the Ola emergency number following which they asked her to check if the driver was drunk. She later pressed the emergency button on the Ola app but received a message asking her to dial 100. After the aggregator failed to help her, she said she was lucky to be saved by the public.

Reacting to the incident, an Ola spokesperson said, “We regret the unfortunate incident and have immediately terminated the driver-partner from the platform upon receiving the complaint.”

Shruthi G (name changed), an employee at a software company at Bagmane Tech Park in Mahadevapura, booked an Ola cab after her work in the evening of January 3. She booked pick-up stops at two locations as she had to pick her four-year-old daughter from the day-care centre, which is 2 km away from her house.

However, around 6.22 pm, when the cab reached Malleshpalya near Kids Castle, the driver did not stop the vehicle. He asked her to get down at the last drop location. She told him to stop and tried to open the doors but he locked the doors, insisting that she sit in the car. When she resisted, he held her hands and abused her; he even threatened to kill her if she raised an alarm.

The victim said she pressed the emergency button on the app twice but only got a message advising her to call the police.

When she called the Ola emergency number, the person at the other end asked about her condition and to check whether the driver was drunk. They called back after one-and-a-half hours when she was filing a complaint at the police station.

“Ola did not make any efforts to reach out to the police or do anything to track my location and help me in that situation,” she said.

The victim called 100 and the staffer at the control room asked her which area she was in. Since she was familiar with the area, Shruthi was able to give her location.

“First they told me that the area comes under Baiyappanahalli. Later, they said it comes under HAL. Finally, they figured out the location. It took 20 minutes for the police to reach the spot,” she said.

What saved Shruti was her sheer instinct and luck. Alone in the cab, she started raising an alarm. Luckily, commuters in the other vehicles next to the cab noticed her screaming for help and stopped the driver.

“If this is the kind of security Ola provides its customer, it is very questionable,” she said. “If we have to really call the police during an emergency then why they put out the number and emergency button, it’s a waste of time during that crucial situation. If they directly told us to dial 100 during an emergency, it will save time. Lakhs of commuters take Ola cabs thinking it is safe but they have no mechanism to check their drivers and track their customers in danger.”

Baiyappanahalli police said the accused Bhimashankar Malged was arrested and remanded in judicial custody following the complaint.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 12,2020

Belagavi, 12: Even though the investigation into the four abandoned country pistols that were recovered by the Karnataka police on the outskirts of Waghawade village in Belagavi taluk last weekend did not make any headway, the police are verifying if the weapons had been used by the assassin of Gauri Lankesh for training.

Four country pistols were found abandoned on the outskirts of Waghawade on Sunday. Locals informed that the police had taken the weapons for inspection.

Prima facie it appeared that the weapons were rusted and had not been used for long. Cases had been registered against unidentified persons and investigations were in progress.

After reports that the weapons could have been used for training by the assassin of Gauri Lankesh in the forests in Khanapur, a few kilometres away from the spot wherein they were found, police have been looking into this angle too.

Sources said the condition of the weapons indicated that they have not been used for decades but to allay doubt all aspects were being looked into.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.