Kochi: The name of Rajya Sabha MP Lehar Singh Siroya, a senior BJP leader alleged to be the source of the money laundering case in Kodakara, has surfaced. Siroya, a former Karnataka MLC, has been implicated as a key figure behind the operations, according to a report from the Kerala Police shared with the Enforcement Directorate (ED).

The report suggests that Siroya is involved in the illegal transfer of funds into Kerala. It includes details such as his phone number and mentions that the funds were intended for the BJP's election expenditures in Kerala during the 2021 elections. Siroya is also noted for his close ties with national leaders of the BJP.

Previously, reports indicated that ₹41.20 crores flowed into Kerala during the last assembly election period. The names of Kerala leaders such as K. Surendran, M. Ganesh, and Girishan Nair were also mentioned in the report.

In response to the allegations, Siroya has stated that he knows nothing about the Kodakara money laundering case. He claimed in a conversation with Mathrubhumi News that he has not been in Kerala for the past seven years.

Siroya emphasised that he has not been contacted by the Kerala Police regarding this matter. He further stated that he has no prior acquaintance with state leaders, including BJP's state president K. Surendran, asserting that he only knows V. Muraleedharan, with whom he had a relationship during Muraleedharan’s tenure as a Union Minister. He denied being involved in any such transactions and warned that if his name continues to be misused in news reports without his permission, he would file a defamation case.

The report highlights that Siroya, who was a sitting MLC in Karnataka at the time, has been accused of being involved in the illegal transfer of funds into Kerala, which were allegedly intended for the BJP's campaign expenditures. This ongoing investigation has brought significant attention to Siroya, especially due to his connections with national BJP leaders.

Kerala government reopens Kodakara case amid controversy ahead of bypolls

The Kerala government decided to reopen the case after a former secretary of the BJP's Thrissur office claimed that cash-filled bags, marked as election materials, arrived at the office late on 2 April 2021.

The BJP in Kerala is once again embroiled in controversy ahead of the 13 November bypolls, with the state government deciding to further investigate the 2021 Kodakara hawala case. The decision came after Tirur Satheesh, the former office secretary of the BJP’s Thrissur district office, claimed that cash-filled bags marked as election materials arrived at the office on 2 April 2021, just before the Assembly elections.

BJP leaders perceive the government’s move to reopen the case as a political strategy to undermine their election efforts, noting that this could damage the party’s image at a critical moment. Adding to the BJP’s woes, the Kerala High Court had recently ordered a stay on the Kasaragod Sessions Court’s order discharging BJP state president K. Surendran from an election bribery case related to the 2021 Manjeswaram Assembly elections.

By-elections to the Palakkad and Chelakkara Assembly segments and the Wayanad Lok Sabha constituency are scheduled for 13 November.

The significant development in the Kodakara case arose following Satheesh’s claims, leading Chief Minister Pinarayi Vijayan to discuss reopening the case with state police chief Dr. Shaik Darvesh Saheb on 1 November. The CPI(M) state secretariat has also discussed the situation, with party state Secretary MV Govindan stating that a comprehensive inquiry is necessary.

As the case is still under consideration of the Irinjalakuda First Class Judicial Magistrate Court, the Special Investigation Team (SIT) led by Thrissur Range DIG will need to seek the judiciary’s permission for further investigation.

The Kodakara hawala case emerged as a high-profile political controversy in Kerala in 2021, involving an alleged illegal transfer of cash intended for election purposes. On 3 April 2021, just days before Kerala’s Assembly elections, reports surfaced of a robbery on the Kodakara highway in Thrissur district, initially claiming around ₹25 lakh was stolen. However, investigations revealed that the actual amount was over ₹3.5 crore in unaccounted cash, raising suspicions about its possible use in election-related activities and linking it to a hawala operation.

Subsequent reports suggested that the cash belonged to BJP members and was intended to fund their election campaigns in Kerala. Allegations arose that the money was part of an underground hawala network to bypass financial regulations.

Multiple arrests were made in connection to the hawala operation and the robbery, leading to a broader inquiry into whether the funds were linked to BJP’s election financing. A police report handed over to the Enforcement Directorate revealed that ₹41.40 crore was allegedly brought from Karnataka to Kerala during the 2021 Kerala Assembly elections, mentioning the name of BJP leader and Rajya Sabha MP from Karnataka Lehar Singh Siroya.

The BJP has denied any connection to the cash, asserting that it is an attempt to malign the party. However, Satheesh's claims that the stolen money was part of the party’s election fund and that he assisted in moving the moneybags from the ground floor to the party office have put the BJP on the defensive.

Meanwhile, the BJP state leadership dismissed Satheesh’s claims as baseless, accusing political opponents of spreading misinformation. They contend that Satheesh, ousted from the party two years ago on charges of financial misappropriation, is making allegations as an election gimmick. However, the Congress has alleged a deal between the CPI(M) and BJP, asserting that the reopening of the case is merely an eyewash during election time.

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



Ottawa/New Delhi, Nov 2: Amid an ongoing diplomatic row, Canada has for the first time named India in a list of cyberthreat adversaries and suggested state-sponsored actors could be spying against it, an allegation that New Delhi slammed on Saturday terming it to be “another example” of Ottawa's strategy to “attack India.”

India is named fifth after China, Russia, Iran and North Korea in the National Cyber Threat Assessment 2025-2026 (NCTA 2025-2026) report.

“We assess that Indian state-sponsored cyber threat actors likely conduct cyber threat activity against Government of Canada networks for the purpose of espionage,” the report said.

India is also mentioned in the trend on 'Geopolitically inspired non-state actors are creating unpredictability' citing as example how a pro-India hacktivist group claimed to have defaced and conducted brief attack against Canadian websites after India was accused of involvement in the killing of a Canadian citizen.

The NCTA 2025-2026 that highlights the cyber threats facing individuals and organisations in Canada was released on October 30 by the Canadian Centre for Cyber Security (Cyber Centre), which is Canada’s technical authority on cyber security, and part of the Communications Security Establishment Canada (CSE). The assessment reports are released every two years.

While there was no mention of India in the National Cyber Threat Assessment reports of 2018, 2020 and 2023-24, the 2025-26 assessment mentions India – along with China, Russia, Iran and North Korea -- in the 'Cyber threat from state adversaries' section that introduces the state cyber threat ecosystem and discusses the cyber threats to Canada.

“India’s leadership almost certainly aspires to build a modernised cyber programme with domestic cyber capabilities. India very likely uses its cyber programme to advance its national security imperatives, including espionage, counter-terrorism, and the country’s efforts to promote its global status and counter narratives against India and the Indian government,” the assessment report said.

“We assess that India’s cyber programme likely leverages commercial cyber vendors to enhance its operations. We assess that Indian state-sponsored cyber threat actors likely conduct cyber threat activity against Government of Canada networks for the purpose of espionage,” it said further.

“We judge that official bilateral relations between Canada and India will very likely drive Indian state-sponsored cyber threat activity against Canada,” it claimed.

CSE and its partners in Canada and across the Five Eyes are attuned to the cyber threats to Canada from state and nonstate cyber threat actors and are tracking them as they evolve, the report said.

NCTA 2025-2026 provides the Canadian public with CSE’s current insights on the state and non-state cyber threat actors conducting malicious cyber threat activity against Canada and how we assess the cyber threat landscape will evolve in the next two years, it added.

Canada is confronting an expanding and more complex state cyber ecosystem, the report said, and talked about strategic adversaries, emerging cyber programmes and wider cyber ecosystem.

In the 'Emerging cyber programmes,' it said: “At the same time, countries that aspire to become new centres of power within the global system, such as India, are building cyber programmes that present varying levels of threat to Canada.”

“While emerging states focus their cyber efforts on domestic threats and regional rivals, they also use their cyber capabilities to track and surveil activists and dissidents living abroad,” it added.

The NCTA 2025-2026 also mentioned “Geopolitical conflicts and tensions are inspiring disruptive cyber threat activity from non-state groups, commonly referred to as hacktivists” and gave example of how geopolitically motivated hacktivists typically conduct attacks to gain attention, such as distributed denial-of-service (DDoS) attacks, website defacements, and data leaks from Russia and India.

“Diplomatic tensions are also inspiring hacktivist activity. After Canada accused India of involvement in the killing of a Canadian citizen, a pro-India hacktivist group claimed to have defaced and conducted brief DDoS attacks against websites in Canada, including the public-facing website of the Canadian Armed Forces,” the report said.

“This non-state ecosystem is dynamic and unpredictable,” it added.

The development comes as the bilateral relationship has gone south since Prime Minister Justin Trudeau said a year ago that Canada had credible evidence that agents of the Indian government were involved in the murder of Canadian Sikh activist Hardeep Singh Nijjar in British Columbia in June 2023, a charge dismissed as absurd by India.

Meanwhile, the Ministry of External Affairs (MEA) on trashed the report.

MEA spokesperson Randhir Jaiswal told reporters in New Delhi: “Another category, Canada has put India into. This categorisation is as per the cyber report that they have issued. It appears to be another example of a Canadian strategy to attack India.”

“As I mentioned earlier, their senior officials have openly confessed that they are seeking to manipulate global opinion against India, as on other occasions, imputations are made without any evidence,” Jaiswal added.

While rejecting India being bracketed in that category, the MEA spokesperson said the accusation being levelled against India is “absolutely not right.”

India has been maintaining that the main issue between the two countries is that of Canada giving space to pro-Khalistan elements operating from Canadian soil with impunity.

India last month expelled six Canadian diplomats and withdrawn its high commissioner Sanjay Verma and other “targeted” officials from Canada after strongly dismissing Ottawa's charges.