Pilibhit DIOS Scam Investigation Uncovers ₹5 Crore Siphoned Through Relatives’ Accounts

Published:

spot_img

Pilibhit DIOS Scam Investigation Uncovers ₹5 Crore Siphoned Through Relatives’ Accounts

The ongoing investigation into a significant ₹5 crore scam linked to the District Inspector of Schools (DIOS) office in Pilibhit has unveiled a disturbing network of financial misconduct. Authorities have discovered that government funds were allegedly misappropriated and funneled through a web of relatives and close associates, raising serious concerns about the integrity of public financial systems.

Complex Financial Maneuvers

Investigators have traced a convoluted money trail involving multiple bank accounts, which were utilized as “safe zones” to obscure the flow of funds. The primary suspect, Ilham Shamsi, is accused of systematically transferring substantial sums into accounts belonging to his wives and female relatives. Notably, transfers included approximately ₹2.37 crore to Lubna’s account and ₹2.12 crore to Ajara Khan’s account. Additional funds were routed to other relatives, including ₹1.03 crore to Fatima, over ₹80 lakh to Afia, nearly ₹48 lakh to Parveen Khatoon, about ₹95 lakh to Nahid, and roughly ₹38 lakh to Ashkara Parveen. This layered approach to transactions appears to have been designed to complicate tracking efforts by authorities.

Arrests and Legal Proceedings

Among those arrested are Lubna Navi and Ajara Khan, both identified as wives of Shamsi. Another wife, Arshi, had previously been incarcerated in connection with the case. Currently, Shamsi is out on anticipatory bail granted by the High Court. The investigation has also revealed that a portion of the misappropriated funds was transferred to private companies, including ₹90 lakh to Bareilly-based JHM Infrahomes Private Limited and ₹17.18 lakh to Orica Homes Builder. These transactions have been suspended pending further investigation, and fixed deposits worth nearly ₹59 lakh linked to the case have been frozen.

Insider Threats and System Vulnerabilities

A critical aspect of the investigation is the suspected involvement of insiders within the DIOS office and related departments. Investigators have found evidence suggesting that official IDs and digital portals used for processing government payments were misused. This raises significant concerns regarding the roles of personnel not only within the DIOS office but also in finance, accounts, and treasury departments. Despite these findings, no definitive actions have been reported against implicated officials, leading to questions about accountability and oversight in public sector operations.

Exploitation of Salary Bill Processing

The investigation indicates that Shamsi exploited the salary bill processing system for teachers to execute the scam. By gaining the trust of department staff and acquiring their login credentials, he allegedly generated fraudulent salary bills and redirected funds into accounts he controlled. To date, more than 50 bank accounts have been identified as part of this extensive network, highlighting the scale and complexity of the operation.

Shamsi’s background has also come under scrutiny. Initially employed as a peon at an inter-college in Bisalpur, he began working at the DIOS office in 2015. With a strong understanding of computer systems, he gradually increased his influence within the office. Although his official attachment was reportedly canceled a few years later, he managed to regain access, which investigators believe was pivotal in facilitating the fraud over an extended period.

Recognition for Law Enforcement Efforts

The police team responsible for apprehending seven women connected to the case is set to receive recognition for their efforts. The Superintendent of Police has announced a reward of ₹25,000 along with commendation certificates, acknowledging the significance of this breakthrough in the investigation.

Ongoing Investigations and Future Implications

As the investigation continues, authorities are examining the full extent of the network and its financial connections. Further revelations are anticipated as more accounts and transactions are scrutinized. This case underscores serious vulnerabilities in internal controls and monitoring mechanisms within government systems, emphasizing the need for robust cybersecurity measures.

The implications of this scam extend beyond immediate arrests and recoveries. It raises broader concerns about how insider access, inadequate oversight, and the absence of real-time monitoring can facilitate large-scale financial fraud. Strengthening digital safeguards, enforcing accountability, and ensuring transparent processes are critical to preventing similar incidents in the future.

For more detailed information, refer to the original reporting source: the420.in.

Keep reading for the latest cybersecurity developments, threat intelligence, and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

Zambia Postpones RightsCon 2026, Raising Alarms Over Human Rights Commitment

Zambia Postpones RightsCon 2026, Raising Alarms Over Human Rights Commitment The Zambian government's recent decision to postpone RightsCon 2026, effectively canceling the summit, has sparked...

Cybersecurity Alert: SMS Blaster Arrests, 38 OpenEMR Vulnerabilities, 610K Roblox Accounts Hacked, and 25 More Threats

Cybersecurity Alert: SMS Blaster Arrests, 38 OpenEMR Vulnerabilities, 610K Roblox Accounts Hacked, and 25 More Threats In a week marked by significant cybersecurity incidents, authorities...

SAS Unveils AI Navigator to Strengthen Governance Amidst Rapid AI Adoption Challenges

SAS Unveils AI Navigator to Strengthen Governance Amidst Rapid AI Adoption Challenges The rapid integration of artificial intelligence (AI) into business processes has left many...

Kanpur Cyber Fraud Probe Uncovers ₹100 Crore Laundering Network, Eight Arrested

Kanpur Cyber Fraud Probe Uncovers ₹100 Crore Laundering Network, Eight Arrested In a significant development, a cyber fraud case in Kanpur has unveiled a complex...