Event Alert | Join us at 10th International Police Expo, New Delhi | 31st July – 1 August 

How ARGUS Exposed a ₹1.5 Crore Investment Fraud & Money Laundering Network

Using forensic analysis of 350 GB+ mobile extraction data, investigators uncovered operational misuse of trust accounts, unauthorized banking access, layered fund movement, and conversations indicating coordinated laundering activity. 

The Investigation

The investigation involved forensic analysis of: 

  • Two UFDR extractions containing nearly 350 GB of data  
  • Complaint and transaction records  
  • Trust and business-linked banking artefacts  
  • WhatsApp communications  
  • OTP records and banking alerts  

Using ARGUS, investigators correlated digital evidence across multiple sources to uncover the operational structure behind the fraud network. 

The investigation involved forensic analysis of

The Challenge

What initially appeared to be an isolated investment fraud turned into a highly coordinated financial network involving: 

  • Trust-linked bank accounts  
  • Business-front entities  
  • Multiple mobile numbers  
  • Layered fund movement  
  • Unauthorized account access  
The Challenge
How ARGUS Helped

How ARGUS Helped

  • OCR-Powered Evidence Discovery   
  • 360° Search & Correlation 
  • Keyword & Boolean Intelligence 
  • Detection of Unauthorized Account Access 

Key Results

Trust Accounts Used as Financial Routing Layer

Liza Foundation's trust-linked accounts were misused as a routing layer, with external participants controlling transactions despite formal ownership under the trust structure.

Business Entity Used for Fund Layering

Aditi Logistics was identified as a business-front entity used to redistribute and layer funds flowing through the broader financial network.

Recovery of Laundering-Related Conversations

Forensically recovered chats revealed coordinated discussions on account percentages, bank freezes, fund conversion, and transaction routing — indicating deliberate attempts to legitimize suspicious funds.

Financial Flow Reconstruction

Suspicious fund movement was mapped across accounts, entities, QR systems, and laundering channels used to circulate fraudulent proceeds.

Our Customers