In a significant tax evasion scam involving gaming apps, several shocking details have come to light. The masterminds behind the scheme moved over ₹40 crore in just six months, exploiting a network of fake accounts and financial manipulation to evade taxes.

The Modus Operandi

The accused primarily used current bank accounts to move large sums of money. Unlike savings accounts, which attract the attention of banks and investigative agencies when there is excessive transaction activity, current accounts provided a safer option for large-scale financial transactions. To execute this, the criminals recruited individuals by enticing them with monetary offers and used their names to create fake company documents. Anil Khanna, a key player in the operation, would use these documents to set up shops or offices in various districts, opening multiple current accounts across different banks. These accounts would then handle the massive flow of money, earning Khanna a substantial commission for each account he opened. A portion of the money would be shared with the account holders as well.

The Key Players

The scheme’s core leaders, Daniel and Alex, coordinated the operation by gathering information about these bank accounts through Telegram from Jatin Galani, a resident of Ratanlal Nagar, who acted as an intermediary. Jatin would use these details for online banking operations, transferring funds to other accounts under their control. Saurav, another accomplice, would activate mobile phones and SIM cards linked to the current accounts, ensuring that only the accounts receiving funds were activated for transactions.

Financial Gains and Network Expansion

The financial rewards for those involved were substantial. Jatin, the local mastermind, earned over ₹60 lakh in just six months, with ₹40 lakh seized by the police during investigations. Anil Khanna received around ₹25 lakh from Jatin for his involvement in opening accounts. Saurav earned ₹1,000 per day for every mobile device he activated, amassing over ₹2 lakh in a short period. The scheme’s success was built on exploiting networks of relatives and acquaintances to open accounts across multiple states, including Uttar Pradesh, Madhya Pradesh, and Rajasthan.

Cryptocurrency and Money Laundering

In a bid to launder the money, Daniel and Alex ensured that Jatin received his share in USDT (a cryptocurrency linked to Bitcoin), which was then traded through a cryptocurrency exchange app to convert it into real currency. The money laundered through this system was shared with the account holders as well.

The APK File Scheme

The criminals used APK files to gain control of the mobile phones linked to the fraudulent accounts. These files were sent via Telegram by Daniel and Alex, and once installed on the mobile phones, they provided full access to the accounts, allowing them to transfer money at will. This method ensured that the criminals could maintain anonymity and avoid detection by law enforcement.

Conclusion

The investigation continues as the police work to seize the remaining illicit funds. The exploitation of fake accounts, online banking, and cryptocurrency has raised serious concerns about the scale of financial crimes linked to gaming apps. This case highlights the sophistication of modern tax evasion schemes and the growing use of technology to bypass financial regulations.

(Source: Amar Ujala)

Leave a Reply

Your email address will not be published. Required fields are marked *