logo
‘Operation Fire Trail':  DRI seizes Rs 35-cr worth of Chinese firecrackers from Mumbai ports

‘Operation Fire Trail': DRI seizes Rs 35-cr worth of Chinese firecrackers from Mumbai ports

Indian Express3 days ago
The Directorate of Revenue Intelligence (DRI) has seized Chinese firecrackers worth approximately Rs 35 crore, following a multi-port operation codenamed 'Operation Fire Trail', the agency said on Friday.
The action, based on specific intelligence inputs, led to the interception of seven containers at Nhava Sheva Port, Mundra Port, and the Kandla Special Economic Zone (SEZ).
According to a statement by the DRI, the seized cargo weighing nearly 100 metric tonnes was illicitly imported in the name of a KASEZ unit and certain Import-Export Code (IEC) holders. The goods were falsely declared as 'Mini Decorative Plants', 'Artificial Flowers', and 'Plastic Mats' in an attempt to evade detection.
The press release noted that some of the consignments were routed through the Kandla SEZ with the intent of illegal diversion into the Domestic Tariff Area (DTA), in violation of the SEZ provisions. A key individual, identified as a partner of the SEZ unit, has been arrested for his role in the smuggling operation and remanded in judicial custody by the court.
The import of firecrackers is classified as 'Restricted' under the ITC (HS) Classification of the Foreign Trade Policy and requires licences from the Directorate General of Foreign Trade (DGFT) and the Petroleum and Explosives Safety Organisation (PESO) under the Explosives Rules, 2008. The DRI pointed out that the smuggled firecrackers contained banned chemicals such as red lead, copper oxide, and lithium, which are hazardous to health and the environment.
'Firecrackers pose a significant risk to public safety, port infrastructure, and the broader logistics supply chain due to their highly combustible nature,' the DRI said in its statement, adding that the successful seizure prevented potential threats such as accidental explosions and disruptions in cargo handling operations.
'This meticulously planned and seamlessly executed operation underscores DRI's resolve to detect, deter, and dismantle illicit networks that undermine the Exim trade ecosystem and endanger public safety,' the release said.
Further investigations are underway.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

CBI court sends NHAI manager to jail for 4 years in DA case
CBI court sends NHAI manager to jail for 4 years in DA case

Hans India

time32 minutes ago

  • Hans India

CBI court sends NHAI manager to jail for 4 years in DA case

Jodhpur: A Special CBI Court in Jodhpur sentenced a manager of the National Highways Authority of India (NHAI) to four years of imprisonment with a fine of Rs 41.65 lakh for possessing illegal assets, an official said on Tuesday. Surender Kumar Soni, the then Manager (Technical), NHAI, Chittorgarh, Rajasthan, was convicted for possessing assets disproportionate (DA) to his known sources of income during his tenure. The court, in its decision on July 14, found that the accused had 116 per cent more assets than his known sources of income. The CBI had registered the case against Soni on July 30, 2013. After the completion of the investigation, a chargesheet was filed by the CBI on December 18, 2014, against the accused before the Special CBI Judge. In a separate case, CBI booked two NHAI engineers, a resolution board member of the Authority and five others, including builders and a middleman, over bribes of more than Rs 10 lakh linked to doctoring of the quality audit report of a road project in Jharkhand. The CBI booked two NHAI Deputy Managers and a retired engineer empanelled as a Dispute Resolution Board (DRB) Member by the Authority for bribes in lieu of furnishing a favourable Quality Audit Report (QAR) to a group of contractors working on the Rs 818 crore project for widening National Highway-75 in Jharkhand. A Quality Audit Team assessed the project executed by a number of contractors and sub-contractors, with Dineshchandra R. Agrawal Infracon being in the lead, between June 26 and June 30, the FIR said. The FIR accused the NHAI representatives of indulging in the corrupt practice of accepting and/or conspiring to take illegal gratification, in lieu of furnishing favourable QAR for inspection of the Package-III project in Ranchi, Jharkhand, from Manish Mishra, Chief Operating Officer, M/s Bharat Vanijya Eastern Private Limited (BVEPL). According to source information received by the federal agency, Rakesh Bhasin, empanelled as Dispute Resolution Board (DRB) Member, NHAI, and retired Chief Engineer, Military Engineering Service, was supposed to be paid a bribe of Rs 4 lakh at his residence in Jaipur while NHAI's Deputy Manager Swatantra Gaurav's Gurugram-based friend Dheeraj collected Rs 5 lakh on his behalf. A bribe of Rs 1 lakh was to be delivered to another NHAI Deputy Manager, Vishwajeet Singh, on the instruction of Manish Mishra, said the FIR. The CBI FIR registered on July 12 said, 'The above acts of obtaining and accepting undue advantage by the said public servants, private persons and unknown officials of NHAI are disclosing offences punishable under Sections 7, 7A, 8, 9, 10 and 12 of the Prevention of Corruption Act, 1988 (as amended in 2018) and 61(2) of Bharatiya Nyaya Sanhita (BNS), 2023. Hence, a regular case is registered…'

7.3cr fraud: Man who gave docus to open mule a/c held
7.3cr fraud: Man who gave docus to open mule a/c held

Time of India

time36 minutes ago

  • Time of India

7.3cr fraud: Man who gave docus to open mule a/c held

1 2 Mumbai: A Chembur resident was recently arrested by south region cyber police in a Rs 7.3-crore investment fraud case for allegedly allowing his address to be used to open a bank account for a shell company to which part of the money was diverted. The victim, a 63-year-old south Mumbai businessman, was shown profits of Rs 31 crore in a virtual wallet. Police said the fraudsters asked the suspect, Rahul Gawli (41), to visit Goa, where they opened a bank account in a fake company's name and used his and another accused's documents for it. Gawli was assured of a monthly pay in exchange. The gang operated the company's account, to which the complainant sent Rs 5 lakh. The complainant lodged a police complaint on May 17 stating that he was added to a WhatsApp group through a link in Feb. A woman, Riya Bansal, and some other gang members pretended to be representatives of a private company that manages the portfolios of investors. In a WhatsApp message, Bansal told the businessman that they would invest his money in the primary market and that he would stand to earn huge profits. The man wanted to open an account in his daughter's name. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Providers are furious: Internet access without a subscription! Techno Mag Learn More Undo So, he sent her details to Bansal. Later, Bansal sent him a registration form, which had a fake Sebi number of the company. He was assured of a 10% monthly profit and was later added to another group for high-end customers. You Can Also Check: Mumbai AQI | Weather in Mumbai | Bank Holidays in Mumbai | Public Holidays in Mumbai This group's administrator asked him to download a trading app. The businessman was asked to send money to different bank accounts. From March 7-May 6, he deposited Rs 7.3 crore. The complainant withdrew Rs 28 lakh, but when he tried to do it again, he failed. Bansal then told him he would have to pay an additional Rs 3.7 crore to withdraw money. This is when he realised he had been conned and approached police. A team comprising senior inspector Nankumar Gopale and inspector Suresh Bhoye is probing the case.

Five get life imprisonment in Aurangabad murder case
Five get life imprisonment in Aurangabad murder case

Time of India

timean hour ago

  • Time of India

Five get life imprisonment in Aurangabad murder case

Aurangabad: The district court on Tuesday sentenced five people to life imprisonment in a murder case related to Fesar police station, which hogged limelight for a long time. The verdict was pronounced by additional district and sessions judge-X, Ashok Kumar Gupta. Along with life imprisonment under IPC Section 302/34, the court imposed a fine of Rs 20,000 on each convict. In case of non-payment, they will have to undergo an additional six months of imprisonment. Additional public prosecutor (APP), Bindeshwari Prasad Tanti, said the convicts—Gajendra Yadav, Mahendra Yadav, Md Tohid, Istekhar Ahmed and Anul Hoda—are residents of Maulanagar in Fesar. The court also awarded one year imprisonment and a fine of Rs 1,000 under IPC Section 323/34. Both sentences will run concurrently. According to advocate Satish Kumar Snehi, the case was registered on March 27, 2022, based on a complaint filed by Jamila Khatoon, a resident of Maulanagar under Fesar PS. She alleged that her husband, Isteyaq Ahmed, along with two sons—Faizan Raza and Ashif Raza—were returning home from the fields when the accused attacked them near one Mahendra Yadav's house. The accused, allegedly lying in wait, attacked the trio with sticks and spears, leaving them critically injured. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Florida: Gov Will Cover Your Cost To Install Solar If You Live In These Zip Codes SunValue Learn More Undo All three were taken to sadar hospital in Aurangabad. However, due to the deteriorating condition of Isteyaq, he was shifted to Anugrah Narayan Magadh Medical College and Hospital (ANMMCH) in Gaya, where he succumbed to his injuries on March 28, 2022. Following the incident, police launched an investigation and filed a chargesheet against all the five accused. After hearing the witnesses and examining the evidence, the court found the accused guilty and delivered the judgment.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store