Pilibhit DIOS Scam Investigation Uncovers ₹5 Crore Siphoned Through Relatives’ Accounts
The ongoing investigation into a significant ₹5 crore scam linked to the District Inspector of Schools (DIOS) office in Pilibhit has unveiled a disturbing network of financial misconduct. Authorities have discovered that government funds were allegedly misappropriated and funneled through a web of relatives and close associates, raising serious concerns about the integrity of public financial systems.
Complex Financial Maneuvers
Investigators have traced a convoluted money trail involving multiple bank accounts, which were utilized as “safe zones” to obscure the flow of funds. The primary suspect, Ilham Shamsi, is accused of systematically transferring substantial sums into accounts belonging to his wives and female relatives. Notably, transfers included approximately ₹2.37 crore to Lubna’s account and ₹2.12 crore to Ajara Khan’s account. Additional funds were routed to other relatives, including ₹1.03 crore to Fatima, over ₹80 lakh to Afia, nearly ₹48 lakh to Parveen Khatoon, about ₹95 lakh to Nahid, and roughly ₹38 lakh to Ashkara Parveen. This layered approach to transactions appears to have been designed to complicate tracking efforts by authorities.
Arrests and Legal Proceedings
Among those arrested are Lubna Navi and Ajara Khan, both identified as wives of Shamsi. Another wife, Arshi, had previously been incarcerated in connection with the case. Currently, Shamsi is out on anticipatory bail granted by the High Court. The investigation has also revealed that a portion of the misappropriated funds was transferred to private companies, including ₹90 lakh to Bareilly-based JHM Infrahomes Private Limited and ₹17.18 lakh to Orica Homes Builder. These transactions have been suspended pending further investigation, and fixed deposits worth nearly ₹59 lakh linked to the case have been frozen.
Insider Threats and System Vulnerabilities
A critical aspect of the investigation is the suspected involvement of insiders within the DIOS office and related departments. Investigators have found evidence suggesting that official IDs and digital portals used for processing government payments were misused. This raises significant concerns regarding the roles of personnel not only within the DIOS office but also in finance, accounts, and treasury departments. Despite these findings, no definitive actions have been reported against implicated officials, leading to questions about accountability and oversight in public sector operations.
Exploitation of Salary Bill Processing
The investigation indicates that Shamsi exploited the salary bill processing system for teachers to execute the scam. By gaining the trust of department staff and acquiring their login credentials, he allegedly generated fraudulent salary bills and redirected funds into accounts he controlled. To date, more than 50 bank accounts have been identified as part of this extensive network, highlighting the scale and complexity of the operation.
Shamsi’s background has also come under scrutiny. Initially employed as a peon at an inter-college in Bisalpur, he began working at the DIOS office in 2015. With a strong understanding of computer systems, he gradually increased his influence within the office. Although his official attachment was reportedly canceled a few years later, he managed to regain access, which investigators believe was pivotal in facilitating the fraud over an extended period.
Recognition for Law Enforcement Efforts
The police team responsible for apprehending seven women connected to the case is set to receive recognition for their efforts. The Superintendent of Police has announced a reward of ₹25,000 along with commendation certificates, acknowledging the significance of this breakthrough in the investigation.
Ongoing Investigations and Future Implications
As the investigation continues, authorities are examining the full extent of the network and its financial connections. Further revelations are anticipated as more accounts and transactions are scrutinized. This case underscores serious vulnerabilities in internal controls and monitoring mechanisms within government systems, emphasizing the need for robust cybersecurity measures.
The implications of this scam extend beyond immediate arrests and recoveries. It raises broader concerns about how insider access, inadequate oversight, and the absence of real-time monitoring can facilitate large-scale financial fraud. Strengthening digital safeguards, enforcing accountability, and ensuring transparent processes are critical to preventing similar incidents in the future.
For more detailed information, refer to the original reporting source: the420.in.
Keep reading for the latest cybersecurity developments, threat intelligence, and breaking updates from across the Middle East.


