logo
Indian-origin Subway owner arrested over US visa fraud, fake robberies

Indian-origin Subway owner arrested over US visa fraud, fake robberies

A Subway franchisee owner in Louisiana, Chandrakant 'Lala' Patel, has been arrested for orchestrating a decade-long immigration fraud scheme that exploited a US visa programme meant for crime victims, the US Attorney's Office for the Western District of Louisiana announced earlier this week.
Patel, who also owns convenience stores in Oakdale, was charged with bribery, mail fraud, and money laundering for allegedly masterminding the scheme that helped hundreds of Indian nationals obtain U-visas.
'This case represents a deliberate attempt to undermine federal immigration protections for true victims of crime,' said Acting US Attorney Alexander C Van Hook. 'This kind of exploitation erodes public trust in both the immigration system and law enforcement.'
Fake robberies reported for visas
According to a federal indictment, Patel paid police officials in small Central Louisiana towns as much as $5,000 for each fabricated report of an armed robbery. These reports falsely identified Indian immigrants, most of whom had no ties to the area, as victims of these crimes, enabling them to apply for the coveted visas. Once the visas were approved, Patel was reimbursed by the immigrants or their intermediaries.
Patel's clients either contacted him directly or through intermediaries to be listed as 'victims'. In return for thousands of dollars in payments, Patel arranged for fabricated police reports and signed I-918B certification forms from his law enforcement co-conspirators.
The scheme allegedly ran from December 2015 through at least July 15, 2025.
What is the U-visa?
The U-visa is a special category reserved for undocumented immigrants who are victims of violent crimes and who assist law enforcement in investigations. The programme was created in 2,000 to provide a path to legal status for undocumented immigrants who are victims of serious crimes and who cooperate with law enforcement.
Federal prosecutors have not said how many immigrants may have obtained legal status through the scheme or whether those individuals will face legal consequences.
Patel and four police officers indicted
Patel is accused of working with four law enforcement officials:
Chad Doyle, Chief of Police for Oakdale
Michael 'Freck' Slaney, Marshal of Ward 5 in Oakdale
Glynn Dixon, Chief of Police for Forest Hill
Tebo Onishea, former Chief of Police for Glenmora
All five face charges of conspiracy to commit visa fraud, along with multiple counts of visa fraud, mail fraud, and money laundering. Additionally, Patel faces a charge of bribery.
If convicted, the defendants face significant penalties, including up to 5 years in prison for conspiracy, up to 10 years for visa fraud, up to 20 years for mail fraud, and up to 10 years for bribery, which applies specifically to Patel. In addition to potential prison time, they could also be subject to fines of up to $250,000 for each count.
The investigation is ongoing.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Six men arrested for running fake lottery and gift scam by posing as foreign women and using fraudulent bank accounts
Six men arrested for running fake lottery and gift scam by posing as foreign women and using fraudulent bank accounts

Time of India

timean hour ago

  • Time of India

Six men arrested for running fake lottery and gift scam by posing as foreign women and using fraudulent bank accounts

New Delhi: Six men, including two Nigerian nationals, were arrested for running a fake lottery and gift scam. They posed as foreign women online, befriended victims, and claimed to send gifts. Tired of too many ads? go ad free now Victims then received calls from fake airport officials demanding money to release the parcels. The scammers often used UK-based phone numbers to appear legitimate. Another method involved contacting people on social media, claiming they won a lottery and needed to pay a fee to claim the prize. These tactics convinced many victims to transfer money, believing they were dealing with genuine individuals and organisations based abroad. The accused were identified as Shedrack Onainor (29), Vikas (25), Shahid Raza (45), Shahrukh Khan (23), Rakesh (22), and Sunday John (40). They were arrested from multiple places in the city. Raza was nabbed from West Delhi, and based on his information, a raid was conducted in South Delhi's Khanpur, from where Onainor, a Nigerian national, was nabbed. Based on his information, other accused individuals, including John, another Nigerian national, were apprehended. Raza is the father-in-law of Shahrukh. Onainor arrived in India on a medical visa in 2013, which expired in 2018. He stayed illegally and, with Nigerian associates, scammed Indian citizens through fake lotteries, gifts, and parcels. He collected money via Indian accomplices Raza and Khan, who also provided bank accounts for fraudulent transactions. "Raza, uneducated and previously employed in Saudi Arabia, joined the racket around 7–8 years ago for a 15% commission. Tired of too many ads? go ad free now With his son-in-law Shahrukh, he collected ATM cards and withdrew cash for Nigerian handlers. Khan joined 6–7 years ago. He used UPI IDs to transfer defrauded funds," Deputy commissioner of police (crime) Vikram Singh said. Vikas opened multiple bank accounts using a fake address in Delhi and handed over ATM cards and SIMs to Rakesh, who then forwarded them to Raza and Khan. Vikas received 3% of each transaction. Vikas's brother Rakesh helped manipulate Aadhaar details to open accounts, receiving a 2% commission. John arrived on a business visa in 2023, which expired in 2024. He illegally remained in India, collecting defrauded funds across Delhi/NCR and splitting them with Nigerian co-conspirators. "Onainor, along with associates, led the fraud by luring victims online. Once victims transferred funds, Shedrack coordinated with Indian handlers for the collection and distribution of cash. Rakesh and his brother Vikas opened 18–20 fake bank accounts in Vikas's name. They altered Aadhaar addresses to Delhi, obtained SIMs, and used forged documents. An associate helped update Aadhaar without verification," police said.

CoinDCX hit by $44.2 mn security breach; founders say customer funds unaffected, safe
CoinDCX hit by $44.2 mn security breach; founders say customer funds unaffected, safe

The Hindu

timean hour ago

  • The Hindu

CoinDCX hit by $44.2 mn security breach; founders say customer funds unaffected, safe

Indian cryptocurrency exchange CoinDCX has suffered a security breach, resulting in theft of $44.2 million, or ₹378 crore, even as the founders took to X to reassure that customer funds remained unaffected and safe, with the compromise limited to an internal operational account. The total exposure is being absorbed entirely by CoinDCX, using the company's treasury reserves, the company said in a First Incident Report released on Sunday. According to the report, on July 19, at 4 a.m., CoinDCX security systems detected an incident involving unauthorised access to one of its accounts on the partner exchange, leading to a financial exposure of about $44 million. The incident once again puts the spotlight on mounting security threats in the highly volatile world of cryptocurrencies. Last year, crypto exchange WazirX faced a hack in India, leading to the loss of more than $230 million, and marking one of the biggest such heists in India. The theft had prompted a thorough examination of safety measures and eroded sentiments. CoinDCX co-founders Sumit Gupta and Neeraj Khandelwal took to the social media platform X to address the situation, confirming that the attack was the result of a sophisticated server breach, targeting an internal wallet, not the ones holding customer assets. The incident was first flagged by blockchain investigator ZachXBT, following which the exchange made the disclosure public. "Today, one of our internal operational accounts -- used only for liquidity provisioning on a partner exchange -- was compromised due to a sophisticated server breach. I confirm that the CoinDCX wallets used to store customer assets are not impacted and are completely safe. This won't cause any loss to our customers. CoinDCX will be bearing the full amount," Mr. Gupta said. "The total amount lost was USD 44Mn out of our treasury assets. Coindcx Treasury will be bearing these losses," Mr. Khandelwal wrote. Following this, users rushed to check their balances, leading to a spike in withdrawal requests. The sudden surge in activity led to CoinDCX's portfolio APIs, which display user balances and transaction histories, becoming jammed and unresponsive. For several hours, many were unable to even see their holdings on the app, adding fuel to rumours and anxiety online. The co-founders later updated that Portfolio APIs have been restored. Affected infrastructure has been completely isolated, and CoinDCX operations continue to run normally, the company said. CERT-In, or the Indian Computer Emergency Response Team, has been informed about the incident. Detailed forensics with two globally reputed security agencies is being carried out, and reports will be shared for public benefit, it added. "CoinDCX services remain fully operational. Trading activity, INR deposits and INR withdrawals continue. INR withdrawals below Rs 5 lakhs will reflect in your account within 5 hours, while withdrawals above Rs 5 lakhs will be processed within 72 hours. The incident was isolated and has no impact on your portfolio access or operations," the company stated. Social media is flooded with mixed reactions. While some praised CoinDCX for absorbing the losses and protecting user funds, others criticised the delay in public disclosure and raised concerns over the broader security of crypto platforms in India. "Coindcx silent for 17 hours? That's more suspense than a thriller! In crypto, transparency isn't optional; it's key. Stay open to keep trust alive!" a user wrote. "Good to see CoinDCX acting responsibly, assuring user funds are safe, and not passing losses onto customers. Sets a positive precedent for Indian crypto exchanges," another said.

Punjab Police probes own X post reminding of George Floyd tragedy
Punjab Police probes own X post reminding of George Floyd tragedy

Time of India

time2 hours ago

  • Time of India

Punjab Police probes own X post reminding of George Floyd tragedy

Chandigarh: After backlash over a post on its official X handle -- the screenshot of which was purportedly captured and shared by many users -- Punjab police on Sunday issued a statement that the controversial post was only 'briefly visible' on its official handle before it was deleted. The post, a couple of days ago, had an illustration of a light-complexioned man, dressed as a cop, with his face covered with the Indian flag, crushing a dark-complexioned man under his knee, on whose face the Pakistani flag was seen. To many, it reminded of the George Floyd tragedy. Going by the viral screenshots, the text with the now-deleted illustration by Punjab police, allegedly read, "If you are caught with this flag, be prepared to suffer the consequences. " In a post on X on Sunday evening=, Punjab police said, "It has come to our attention that a contentious post was briefly visible on the official Punjab Police X handle and has since been deleted. Preliminary findings indicate that the imagery used in the post was AI-generated. We are investigating whether this incident resulted from unauthorised access." It added, "Our technical teams are actively probing the matter, including the possibility of a cybersecurity breach. We urge the public not to circulate unverified content and to rely only on information shared through our verified official handles. Your trust and safety remain our highest priority. Punjab Police does not endorse any such content in any form."

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store