logo
Religious conversion racket: Naveen Rohra key to exposing Chhangur Baba's money trail, says ED

Religious conversion racket: Naveen Rohra key to exposing Chhangur Baba's money trail, says ED

Hindustan Times4 days ago
Naveen Rohra, who once ran a shipment agency in Dubai, could expose key financial transactions related to the Balrampur religious conversion and money-laundering racket allegedly run by Jalaluddin Shah alias Chhangur Baba, according to senior Enforcement Directorate (ED) officials investigating the case under the Prevention of Money Laundering Act (PMLA). The focus shifted to Naveen Rohra during Chhangur Baba's interrogation. (File Photo)
The officials said that Naveen Rohra, who converted to Islam and adopted the name Jamaluddin, is the husband of Neetu alias Nasreen, who was arrested along with Chhangur Baba by the Uttar Pradesh Anti-Terrorism Squad on July 5.
Prior to their arrest, Naveen Rohra and Chhangur Baba's son Mehboob were nabbed by the UP ATS on April 8 earlier this year. However, the information was not disclosed to the media at that time. The matter came to light after the arrest of Chhangur Baba and Nasreen.
Much like the ATS, the ED, which joined the investigation into money laundering after the arrest of Chhangur Baba on July 8, also realised belatedly that Naveen Rohra could be the key person to extract details about the financial transaction and expose the money-laundering racket operational in the garb of the alleged religious conversion nexus. The focus shifted to Naveen Rohra during the kingpin's interrogation.
'We have applied for the custody remand of Naveen Rohra in the competent court. The court is likely to grant his custody remand on the next hearing scheduled for Monday,' a senior ED official confirmed.
'His name came up during the interrogation of Chhangur Baba and even Nasreen, leading us to believe he handled a large portion of the financial transactions,' he added.
A senior official said that though it is a perception that Chhangur Baba had been using Naveen Rohra and his wife Neetu Rohra for money laundering and to channel funds from foreign countries, it is suspected that the couple just used the religious clout of Chhangur Baba to smoothly operate the money-laundering nexus.
Chhangur Baba is accused of being the kingpin of a large-scale conversion syndicate that targeted economically backward individuals from the Hindu community, particularly those from the Scheduled Caste category.
So far, the ED investigation has revealed that Chhangur Baba's network received approximately ₹60 crore in foreign funding, which was used for illegal conversions and other activities. The ED had previously conducted raids at 15 locations, seizing documents and digital devices that suggested money laundering and hawala transactions.
The ED is investigating foreign bank accounts linked to Chhangur Baba and his associates. The agency aims to identify properties purchased using proceeds from the alleged crimes. Chhangur Baba's network is suspected to have operated across multiple cities, including Balrampur, Chennai, Mumbai, Nepal and Dubai.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

ED attaches Rs 29,000 from Mangaluru blast suspect's account, says bomb was supposed to be planted at Dharmasthala temple
ED attaches Rs 29,000 from Mangaluru blast suspect's account, says bomb was supposed to be planted at Dharmasthala temple

Indian Express

timean hour ago

  • Indian Express

ED attaches Rs 29,000 from Mangaluru blast suspect's account, says bomb was supposed to be planted at Dharmasthala temple

The Bengaluru zonal office of the Enforcement Directorate (ED) on Tuesday provisionally attached Rs 29,176 kept in the bank account of Syed Yasin, one of the accused in the 2022 case in which a pressure-cooker bomb accidentally exploded in an autorickshaw in Mangaluru. The agency said the bomb was meant to be planted at the Dharmasthala Manjunatha Swamy Temple. 'Investigations conducted revealed that the ISIS online handler named 'Colonel' had given training over Wicker app/ Telegram etc. to the main accused Mohammad Shariq alias Premraj and other accused persons, to make improvised explosive device (IED)/Bomb and also arranged funds through certain mute accounts and also through crypto currencies which were at times encashed by Syed Yasin and Mohammad Shariq, through PoS agents, for a commission and at some instances the encashed cryptocurrencies were routed through the fraudulently opened mule accounts in FINO Payments Bank,' ED said in a statement on Wednesday, citing the investigation done by the National Investigation Agency (NIA). The NIA, which took over the investigation from the Karnataka Police, has said in its chargesheet filed in the case that the blast was part of an ISIS terrorist plot. According to ED, Rs 2,86,008 was deposited by different cryptocurrency dealers in the mule accounts and Rs 41,680 was collected in cash from point-of-sale agents as part of the terror plot. The amounts were used for buying items online to assemble the improvised explosive device (IED), hiring hideouts in Mysuru city and other places, and also for conducting reconnaissance at various places in Tamil Nadu, Kerala and Karnataka. The bomb was supposed to be planted at the Dharmasthala Manjunatha Swamy Temple, the agency said in its statement. Also, the police had seized Rs 39,228 from Mohammed Shariq at Father Muller Hospital in Mangaluru. On November 19, 2022, Mohammed Shariq, 24, suffered 40 per cent burns after an IED he was carrying in a bag kept on his lap while travelling in an autorickshaw accidentally went off in Mangaluru. It exploded as the bomb timer was set for 09 seconds, instead of 90 minutes, according to the NIA. The police arrested Shariq after the blast. Another accused in the case, Maaz Munir, allegedly provided details of the mule accounts to Shariq to receive payments sent by the online handler, 'Colonel'. Further investigation in the case is in progress, the agency said.

ED raids 12 sites in Rs 750 cr fake input tax credit scam across 3 states
ED raids 12 sites in Rs 750 cr fake input tax credit scam across 3 states

Business Standard

timean hour ago

  • Business Standard

ED raids 12 sites in Rs 750 cr fake input tax credit scam across 3 states

Fresh ED raids across Jharkhand, West Bengal, and Maharashtra target shell firms and suspects linked to Rs 750-cr fake input tax credit scam under PMLA investigation New Delhi Listen to This Article The Enforcement Directorate (ED) on Thursday launched search operations at 12 locations across Jharkhand, West Bengal, and Maharashtra in connection with a Rs 750-crore fake input tax credit (ITC) fraud case, according to sources. The source further said the action is part of an ongoing investigation under the Prevention of Money Laundering Act (PMLA), 2002. The case involves large-scale financial irregularities carried out through shell entities and unauthorised financial channels. The probe stems from the arrest of Shiva Kumar Deora, the alleged mastermind behind the syndicate, who was taken into custody in May 2025 and subsequently chargesheeted last month. 'The

'Parasakthi' producer Aakash Baskaran's Tasmac case, Madras High Court slaps Rs. 30,000 fine on ED
'Parasakthi' producer Aakash Baskaran's Tasmac case, Madras High Court slaps Rs. 30,000 fine on ED

Time of India

time2 hours ago

  • Time of India

'Parasakthi' producer Aakash Baskaran's Tasmac case, Madras High Court slaps Rs. 30,000 fine on ED

In April, enforcement officials conducted raids at the Tasmac headquarters and several liquor factories in connection with a large-scale fraud allegedly taking place at the Tasmac Corporation. Authorities said that a fraud of around ₹1,000 crore had taken place at that time. Searches were conducted at the homes and offices of 'Parasakthi' producer Aakash Baskaran and businessman Vikram Ravindran in connection with the matter. At the end of the investigation, Vikram Ravindran's assets were sealed. Here's a detailed report. Aakash Baskaran and Vikram Ravindran move court to lift asset seal Aakash Baskaran and Vikram Ravindran filed a case in the Madras High Court against this action. In this case, they demanded that the enforcement department's action be stayed and that the seal placed on their properties be removed. According to Nakkheeran, during the trial, Aakash Baskaran was ordered to return the seized documents, and an order was issued to temporarily halt further proceedings. ED seeks more time during August 6 hearing The case came up for hearing again on August 6. On this occasion, the lawyer appearing for the Enforcement Directorate said that the reply petition has not yet been prepared. Therefore, he requested more time. The judges expressed their strong dissatisfaction with this. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Mr. Bala's Powerful Intraday Strategy Revealed – No More Guesswork TradeWise Learn More Undo The judges also strongly criticized that not responding even after being granted time twice was not proper practice. Court imposes Rs. 30,000 fine on ED for procedural lapse The Enforcement Directorate stated that it was required to file a joint response and requested that time be granted only this time. But the judges opposed it and imposed a fine of Rs. 10,000 each, for a total of ₹30,000 on the enforcement department. The court ordered that this amount be paid to the Chief Justice of the Madras High Court's relief fund and adjourned the next hearing of the case to the 20th.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store