PNB Scam: Former CEO Of Bank Was Aware Of Fraud, Says CBI

Agencies
May 22, 2018

May 22: Former Managing Director and Chief Executive Officer of Punjab National Bank Usha Ananthasubramanian and some other senior bank officials were aware of the "fraudulent" dealings with diamond merchant Nirav Modi but kept "misleading" the RBI, the CBI has alleged in its charge sheet.

A special CBI court took cognizance of the charge sheet today and permitted the investigating agency to issue fresh non-bailable warrants against Nirav Modi, his brother Nishal and an executive of the Nirav Modi Group Subhash Parab.

In its charge sheet into the Rs 14,000 crore scam, the CBI said the RBI had since October 2016 sent several questionnaires to the PNB, seeking to know what procedures or measures the bank follows before issuing Letters of Understandings and Letters of Credit.

This was duly dealt by accused Ananthasubramanian and the bank’s executive directors – KV Brahmaji Rao, Sanjiv Sharan and Nehal Ahad – and instead of replying to the queries in true spirit and facts, Ahad and the general manager of the International Banking Division of the bank’s headquarters prepared a misleading reply and sent it to the RBI after getting the same approved from Sharan.

The 12,000-page charge sheet further claimed that a similar fraud was detected in 2016 following which the RBI took up the issue and issued circulars to all banks.

"The accused PNB officials, including Ananthasubramanian and others, were aware of this fraud involving PNB Dubai and the Indian Overseas Bank Chandigarh and yet they did not take any corrective action and remained silent spectators. This facilitated continuance of the fraud resulting in wrongful loss to the PNB," it said.

From August 2015 to May 2017, when Ananthasubramanian was the MD and CEO of the PNB, relevant circulars, caution notices and urgent questionnaires issued by the RBI were brought to her notice and she dealt with the same, the CBI said.

Inspite of her knowledge about the modus operandi in these frauds, she (Ananthasubramanian) did not take any meaningful corrective measures in her capacity as the executive head of the bank and had unauthorizedly delegated the RBI guidelines work to her subordinates without any follow up action.

The CBI has further claimed that senior officers from the Nirav Modi Group including accused Vipul Ambani were constantly meeting Ananthasubramanian in order to continue with the credit facilities to the group.

"This indicated clearly that she (Ananthasubramanian) was aware of the facilities extended to the various group entities of Modi," it said.

The agency said the accused bank officials held supervisory roles in the bank and had through their acts facilitated the issuance of the fraudulent LOUs.

"The fact that bank official Gokulnath Shetty continued to issue fraudulent LOUs with impunity despite issuance of several RBI circulars indicates an environment of protection he enjoyed in the form of lack of reconciliation and absence of bank visits by seniors," the CBI said.

The patronage extended by the senior officials of the bank to the accused persons working in the PNB Brady House branch of Mumbai resulted in a huge wrongful loss to the bank and wrongful gain to the accused persons, it said.

MD and CEO Usha Ananthasubramanian and other senior bank officials by failing to take any precautions or preventive steps to prevent the fraud perpetrated by firms controlled by Nirav Modi thereby committed criminal misconduct in conspiracy with the other accused persons.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 3,2020

Kashmir, Mar 3: Four days after the National Investigation Agency made a major breakthrough in the Pulwama terror attack case over a year after the bombing, arresting one person who had sheltered the suicide bomber Adil Ahmad Dar, the NIA on Tuesday arrested two more people in the case - a father-daughter duo - who had also provided shelter to the bomber, officials said.

The NIA also claimed that the video of the suicide bomber was also recorded at their residence and released by the Jaish-e-Mohammad (JeM) terror group from Pakistan after the attack. An NIA spokesperson in Delhi said: "Two more persons have been arrested by the agency in the Pulwama terror attack case and they have been identified as Insha Jan, 23, and her father Tariq Ahmed Shah, 50, who works as a tipper driver."

The official said that the father-daughter duo have been arrested from Hakripora area in Pulwama for their involvement in the attack. The two were arrested on early Tuesday morning after senior officials of the NIA raided their house on Monday night.

A senior NIA official related to the probe told IANS: "The video of Dar, who attacked the CRPF convoy, was recorded at the home of the duo. And the same video was released soon after the Pulwama terror attack by the JeM terrorists from a Pakistani IP address."

He said, "The video was shared by them to their handlers in Pakistan."

The spokesperson further claimed that during the probe Tariq Ahmed Shah disclosed that his house in Hakripora area was used by Dar, Mohammad Umar Farooq, a Pakistani terrorist and IED maker, Kamran - another Pakistani terrorist (both were later killed in encounters with security forces), Sameer Ahmed Dar, a Jaish-e-Mohammad terrorist from Pulwama and Mohammad Ismail aka Ibrahim, a Pakistani terrorist.

The spokesperson said that Shah facilitated all the terrorists at his house for sheltering and for planning of the heinous attack on the CRPF convoy. He said Jan, daughter of Shah, facilitated the terrorists at their home and provided food and other logistics during their stay on more than 15 occasions for two to four days each time, in their house during the year 2018-2019.

"Initial interrogation has revealed that Jan was in constant touch with Farooq and was in communication with him over telephone and other social media applications," the spokesperson said. The fresh arrests of the two accused brings the total number of arrests in the case to three.

The arrests were made on the revelations of Shakir Bashir Magrey, who was arrested by the anti-terror probe agency on February 28. According to senior NIA officials, more arrests will be made in the coming days. Magrey, a resident of Hajibal, Kakapora in Pulwama district of Jammu & Kashmir, is an overground worker (OGW) of the Pakistan-based Jaish-e-Mohammad (JeM).

According to agency sources, Magrey allegedly provided shelter and other logistical assistance to the Pulwama suicide bomber. He was sent to 15 days' NIA custody by a special NIA court in Jammu & Kashmir on Friday. During interrogation, Magrey revealed that he had harboured Dar and Pakistan-based terrorist Mohammad Umar Farooq in his house from late 2018 till the attack in February 2019 and assisted them in the preparation of the Improvised Explosive Device (IED). His shop is located near Lethpora bridge, and as advised by Mohammad Umar, he started conducting reconnaissance of the movement of CRPF convoys on Jammu-Srinagar Highway in January 2019, and informed Mohammad Umar and Adil Ahmad Dar about it.

Magrey was also involved in modifying the Maruti Eeco car and fitting the IED into it in early February, 2019 and was introduced to Adil Ahmad Dar in mid-2018 by Mohammad Umar and he became a full-time OGW of JeM.

"During his initial interrogation, he disclosed that on several occasions, he collected and delivered arms, ammunition, cash and explosive material to JeM terrorists, including those involved in the Pulwama attack," the agency had said on February 28.

"During investigation, the make, model and number of the car used in the attack was quickly ascertained by NIA to be a Maruti Eeco through forensic examination of the tiny remnants of the car which were found at the spot during extended searches," the agency stated.

"This has been corroborated by accused Shakir Bashir Magrey. The explosives used in the attack were determined to be ammonium nitrate, nitro-glycerin and RDX, through forensic investigation," it said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 19,2020

New Delhi, Apr 19: The government on Sunday prohibited the sale of non-essential items through e-commerce platforms during the ongoing lockdown, four days after allowing such companies to sale mobile phones, refrigerators and ready-made garments.

Union Home Secretary Ajay Bhalla issued an order excluding the non-essential items from sale by the e-commerce companies from the consolidated revised guidelines, which listed the exemption given to the services and people from the purview of the lockdown.

The order said the following clause "E-commerce companies. Vehicles used by e-commerce operators will be allowed to ply with necessary permissions" is excluded from the guidelines.

The previous order had said such items were allowed for sale through e-commerce platforms from April 20.

However, the reason for reversing the order is not known immediately.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.