A major embezzlement case has surfaced from the District Inspector of Schools (DIOS) office, where a peon allegedly exploited systemic loopholes to siphon off crores of rupees. In connection with the case, seven women—including the two wives of the main accused, Ilham ur Rahman Shamsi—have been arrested and sent to jail. The investigation has revealed that fake beneficiary IDs were created to divert government funds into accounts of relatives and close associates in a well-planned operation.
How the Fake ID Racket Worked
The case came to light following a complaint filed on February 13, 2026. According to the complaint, Ilham ur Rahman Shamsi, posted as an attached peon in the DIOS office, had access to critical processes such as salary bill preparation and token generation. Taking advantage of this access, he allegedly manipulated the treasury system by generating fake beneficiary IDs and initiating unauthorized fund transfers.
FCRF Academy Launches Premier Anti-Money Laundering Certification Program
Investigators found that between September 12, 2024, and early 2026, the accused executed 98 separate transactions, transferring ₹1,01,95,135 into a single account. However, as the probe widened, the scale of the fraud appeared far larger. So far, authorities have identified 53 suspicious bank accounts and frozen a total of ₹5,50,54,594, indicating the extensive reach of the network.
Funds Diverted Through Family Accounts
Further scrutiny of bank transactions revealed that instead of routing funds directly into his own accounts, the accused distributed the money across accounts belonging to relatives and trusted acquaintances to avoid detection. The funds were transferred as follows: ₹2.37 crore into the account of his first wife Lubna, ₹2.12 crore into the account of his second wife Ajra Khan, ₹1.03 crore to his sister-in-law Fatima Navi, over ₹80 lakh to Afia Khan, ₹95 lakh to his mother-in-law Nahid, ₹48 lakh to Parveen Khatoon, and ₹38 lakh to Ashkara Parveen.
Based on these findings, police arrested all seven women linked to these accounts. The arrested individuals hail from multiple districts, including Sambhal, Bijnor, Ghaziabad, and Bulandshahr. All have been produced before the court and remanded to judicial custody.
Systemic Loopholes and Wider Probe
Investigators suspect that the fraud may not have been carried out by a single person alone but could be part of a larger organized network involving individuals with knowledge of banking and treasury operations. Authorities are now probing whether there was any internal collusion at the departmental level or involvement of additional suspects.
The case has raised serious concerns about financial oversight and digital security within government offices. Experts point out that the lack of multi-layered auditing and real-time monitoring in sensitive systems such as treasury operations and salary disbursement creates opportunities for such frauds to occur.
A cyber and financial crime expert noted that in such cases, offenders often combine knowledge of internal systems with elements of social engineering to execute and conceal their actions. “Creating fake beneficiary IDs and dispersing funds across multiple accounts is a common tactic used to complicate investigations and delay detection,” the expert said.
Police teams are currently working to trace additional suspicious accounts and identify other individuals who may be linked to the मामले. More arrests are expected in the coming days as the investigation progresses. Meanwhile, pressure is mounting on the education department to conduct an internal review and strengthen safeguards to prevent similar incidents in the future.
About the author – Ayesha Aayat is a law student and contributor covering cybercrime, online frauds, and digital safety concerns. Her writing aims to raise awareness about evolving cyber threats and legal responses.