LM NEWS 24
LM NEWS 24

ED Arrests Punjab Minister Sanjeev Arora In Rs 100 Crore Money Laundering Case

The Enforcement Directorate (ED) on Saturday arrested Punjab minister Sanjeev Arora in connection with an ongoing Rs 100 crore money laundering investigation linked to alleged fraudulent Goods and Services Tax (GST) transactions, officials said.

Arora’s arrest came after a day-long search operation carried out across multiple locations associated with him and his business entities. The raids were conducted under the provisions of the Prevention of Money Laundering Act (PMLA), 2002.

According to officials, ED teams initiated coordinated searches early on Saturday at five premises spread across Delhi, Gurugram and Chandigarh. Of these, four locations were directly linked to Arora and his associated entities, while one office premises belonged to Hampton Sky Realty Limited, which is also under the agency’s scanner in the case.

Meanwhile, AAP MP Sanjay Singh reacted strongly to the arrest of Punjab Cabinet Minister Sanjeev Arora and alleged misuse of central investigative agencies in opposition-ruled states ahead of elections.

Speaking to ANI, Singh said, “ED is acting like a contract killer. State after state, raids are being done on rivals and they are being jailed. This has become the trend of ED. Their experiment in other states is being replicated in Punjab by PM Modi, ahead of elections. Today, cabinet minister Sanjeev Arora has been arrested. Nothing was found from Sanjeev Arora in three raids. Despite that, he has been arrested because this is the election model of the BJP. I would like to tell PM Modi, that his Aurangzeb-like policy will not work in Punjab…”

The investigation pertains to an alleged large-scale money laundering network involving fake GST transactions.

ED officials claim that Arora, through his company, generated fraudulent purchase invoices for mobile phones worth over Rs 100 crore from non-existent firms based in Delhi. These transactions were allegedly used to claim undue input tax credit (ITC), along with wrongful GST refunds on export credits and duty drawbacks.

Sources in the agency indicated that the alleged scheme enabled the accused to siphon off government funds by exploiting loopholes in the GST framework.

The ED further suspects that the proceeds of crime were routed through export channels and subsequently round-tripped back into India from Dubai in an attempt to legitimise the illicit gains.

Officials said the alleged activities caused substantial losses to the government exchequer and pointed to a well-organised financial trail involving shell entities and layered transactions.

Search operations were still underway at multiple premises linked to Arora and his associates in Chandigarh and the Delhi-NCR region at the time of filing this report. These include his official residence allotted to him as a minister.

The ED is expected to produce Arora before a special PMLA court and seek custodial interrogation to further probe the financial trail and identify other individuals involved in the case. (ANI)

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

We use cookies to give you the best online experience. By agreeing you accept the use of cookies in accordance with our cookie policy.

Privacy Settings saved!
Privacy Settings

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. Control your personal Cookie Services here.

These cookies are essential in order to enable you to move around the website and use its features. Without these cookies basic services cannot be provided.

Cookie generated by applications based on the PHP language. This is a general purpose identifier used to maintain user session variables. It is normally a random generated number, how it is used can be specific to the site, but a good example is maintaining a logged-in status for a user between pages.
  • PHPSESSID

Used on sites built with Wordpress. Tests whether or not the browser has cookies enabled
  • wordpress_test_cookie

In order to use this website we use the following technically required cookies
  • wordpress_test_cookie
  • wordpress_logged_in_
  • wordpress_sec

Decline all Services
Accept all Services