New Delhi : The BJP Friday dismissed Congress president Rahul Gandhi's claim that Prime Minister Narendra Modi attended a photo-shoot allegedly hours after the Pulwama attack on February 14 as "fake news", asserting that photographs were taken in morning.

"Rahul Ji, India is tired of your fake news. Stop sharing photos from that morning to shamelessly mislead the nation. Maybe you knew in advance of the attack but people of India got to know in the evening. Try a better stunt next time, where sacrifice of soldiers isn't involved," the BJP tweeted.

The BJP took on Gandhi after the Congress chief called Modi "prime time minister" and said he continued shooting for a film in Uttarakhand even three hours after news of the Pulwama terror strike came in.

He also attached photographs of Modi attending the photo-shoot and taking a boat ride in the scenic hilly state.

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



New Delhi (PTI): The CBI has filed a chargesheet against 17 people, including four Chinese nationals, and 58 companies for their alleged roles in a transnational cyber fraud network that siphoned off over Rs 1,000 crore through a sprawling web of shell entities and digital scams, officials said on Sunday.

After busting the racket in October, investigators unravelled a single, tightly coordinated syndicate that relied on an elaborate digital and financial infrastructure to run a range of frauds. These included misleading loan applications, fake investment schemes, Ponzi and multi-level marketing models, bogus part-time job offers and fraudulent online gaming platforms.

According to the probe agency's final report, the group layered the flow of illicit funds through 111 shell companies, routing about Rs 1,000 crore via mule accounts. One account received more than Rs 152 crore in a short span.

The shell companies, the CBI said, were incorporated using dummy directors, forged or misleading documents, fake addresses and false statements of business objectives.

"These shell entities were used to open bank accounts and merchant accounts with various payment gateways, enabling rapid layering and diversion of proceeds of crime," a CBI spokesperson said in a statement.

Investigators traced the origins of the scam to 2020, when the country was grappling with the COVID-19 pandemic. The shell companies were allegedly incorporated at the direction of four Chinese handlers -- Zou Yi, Huan Liu, Weijian Liu and Guanhua Wang.

Their Indian associates procured identity documents from unsuspecting individuals, which were then used to establish the network of shell companies and mule accounts to launder proceeds from the scams and obscure the money trail.

The investigation exposed communication links and operational control that, the agency said, nailed the role of Chinese masterminds running the fraud network from abroad.

"Significantly, a UPI ID linked to the bank accounts of two Indian accused was found to be active in a foreign location as late as August 2025, conclusively establishing continued foreign control and real-time operational oversight of the fraud infrastructure from outside India," the CBI statement said.

The probe found that the racketeers employed a highly layered, technology-driven modus operandi, using Google advertisements, bulk SMS campaigns, SIM-box-based messaging systems, cloud infrastructure, fintech platforms and multiple mule bank accounts.

"Each stage of the operation -- from luring victims to collection and movement of funds -- was deliberately structured to conceal the identities of the actual controllers and evade detection by law enforcement agencies," the spokesperson said.

The chargesheet names 17 individuals, including the four Chinese nationals, and 58 companies.

The investigation was launched on the inputs from the Indian Cyber Crime Coordination Centre (I4C) under the Ministry of Home Affairs, which flagged large-scale cheating of citizens through online investment and employment schemes, resulting in the arrest of three individuals in October.

"Though initially appearing as isolated complaints, detailed analysis by CBI revealed striking similarities in applications used, fund-flow patterns, payment gateways and digital footprints, pointing towards a common organised conspiracy," the agency said.

Following the October arrests, the CBI conducted searches at 27 locations across Karnataka, Tamil Nadu, Kerala, Andhra Pradesh, Jharkhand and Haryana, seizing digital devices, documents and financial records that were later subjected to detailed forensic examination.