<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>USDT &#8211; News Analysis India</title>
	<atom:link href="https://newsanalysisindia.com/tag/usdt/feed/" rel="self" type="application/rss+xml" />
	<link>https://newsanalysisindia.com</link>
	<description>The news you need to know, explained</description>
	<lastBuildDate>Mon, 29 Sep 2025 00:00:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>ED Raids Across 4 States, Uncovers Foreign Currency and Crypto Transactions at Big Daddy Casino</title>
		<link>https://newsanalysisindia.com/india/ed-raids-across-4-states-uncovers-foreign-currency-and-crypto-transactions-at-big-daddy-casino/</link>
		
		<dc:creator><![CDATA[News Analysis India]]></dc:creator>
		<pubDate>Mon, 29 Sep 2025 00:00:00 +0000</pubDate>
				<category><![CDATA[India]]></category>
		<category><![CDATA[Big Daddy Casino]]></category>
		<category><![CDATA[Crypto Transactions]]></category>
		<category><![CDATA[ED Raid]]></category>
		<category><![CDATA[FEMA]]></category>
		<category><![CDATA[Foreign Currency]]></category>
		<category><![CDATA[Goa]]></category>
		<category><![CDATA[Hawala]]></category>
		<category><![CDATA[money laundering]]></category>
		<category><![CDATA[Online Gambling]]></category>
		<category><![CDATA[USDT]]></category>
		<guid isPermaLink="false">http://newsanalysisindia.local/ed-raids-across-4-states-uncovers-foreign-currency-and-crypto-transactions-at-big-daddy-casino/</guid>

					<description><![CDATA[The Enforcement Directorate (ED) conducted raids across multiple locations in Goa, Delhi-NCR, Mumbai, and Rajkot under the Foreign Exchange Management Act (FEMA). The searches, carried out on September 28th and&#8230;]]></description>
										<content:encoded><![CDATA[
<p>The Enforcement Directorate (ED) conducted raids across multiple locations in Goa, Delhi-NCR, Mumbai, and Rajkot under the Foreign Exchange Management Act (FEMA). The searches, carried out on September 28th and 29th, targeted 15 premises linked to Golden Globe Hotels Private Limited, Worldwide Resorts and Entertainment Private Limited, and the renowned Big Daddy Casino in Goa.</p>



<p>During the searches, the ED seized approximately 2.25 crore rupees in Indian currency, 14,000 US dollars, and foreign currency equivalent to 8.50 lakh rupees. Furthermore, cryptocurrencies (including USDT) worth over 90 lakh rupees were frozen. The ED also confiscated several incriminating documents and digital evidence during the raids.</p>



<p>**Poker Chips Exchanged for Foreign Currency at the Casino**</p>



<p>The investigation revealed that poker chips were provided to customers in exchange for foreign currency at the casino. Winnings were also returned in foreign currency as per their preference. Employees associated with Golden Globe Hotels were actively promoting online gambling platforms such as rolex777.co, iCasino247.com, play247s.com, Win Daddy, and Poker Daddy.</p>



<p>**Crypto and Hawala Network Exposed**</p>



<p>The ED&#8217;s investigation uncovered that poker players&#8217; crypto wallets were being utilized for financial transactions. USDT (USDT) was being sent to Dubai and other countries through Hawala channels. This network used mule accounts (bank accounts opened in the names of others) to deposit winnings and send funds abroad.</p>



<p>**Enforcement Directorate&#8217;s Claims**</p>



<p>The ED stated that the documents and digital evidence gathered during the searches clearly expose FEMA violations and a network associated with cross-border Hawala-crypto transactions. The ED indicated that the investigation is ongoing and further revelations are anticipated.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Fraud Ring Busted in Lucknow: Bank Accounts Used for Illegal Transactions</title>
		<link>https://newsanalysisindia.com/india/cyber-fraud-ring-busted-in-lucknow-bank-accounts-used-for-illegal-transactions/</link>
		
		<dc:creator><![CDATA[News Analysis India]]></dc:creator>
		<pubDate>Sun, 10 Aug 2025 00:00:00 +0000</pubDate>
				<category><![CDATA[India]]></category>
		<category><![CDATA[Arrests]]></category>
		<category><![CDATA[Bank Accounts]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[Lucknow]]></category>
		<category><![CDATA[money laundering]]></category>
		<category><![CDATA[police investigation]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[USDT]]></category>
		<guid isPermaLink="false">http://newsanalysisindia.local/cyber-fraud-ring-busted-in-lucknow-bank-accounts-used-for-illegal-transactions/</guid>

					<description><![CDATA[Police in Lucknow, Uttar Pradesh, have arrested several individuals in connection with a cyber fraud case, unearthing a large network. Investigations revealed that numerous young people were using their bank&#8230;]]></description>
										<content:encoded><![CDATA[
<p>Police in Lucknow, Uttar Pradesh, have arrested several individuals in connection with a cyber fraud case, unearthing a large network. Investigations revealed that numerous young people were using their bank accounts for illicit financial transactions. Cryptocurrency and USDT were utilized for transactions within these accounts. The network was found to be involved in online investment schemes and fake job offers, linked to cryptocurrency and fraudulent online platforms.</p>



<p>A 24-year-old restaurant waiter, Ajay, was initially arrested by Lucknow police. His interrogation led to significant revelations. Ajay disclosed that a friend introduced him to a crypto trader, who offered him ₹20,000 to use his bank account for a day&#8217;s transactions.</p>



<p>Lured by the money, Ajay allowed his account to be used. The following day, a substantial amount of money was deposited into his account. As instructed by the trader, he transferred the money to specified individuals. Ajay later turned government witness after the police raid, revealing his involvement in an international cyber fraud group.</p>



<p>During intense questioning, Ajay provided detailed information about the cyber gang operating in Lucknow, assisting the police in their investigation. The probe, spanning three months, revealed that the group targeted dozens of people, using them to transfer funds.</p>



<p>The group specifically targeted vulnerable individuals, including those working in small shops and restaurants, as well as some college students. These individuals received payments ranging from ₹10,000 to ₹30,000 for allowing their bank accounts to be used.</p>



<p>According to police, the activities were orchestrated via encrypted Telegram channels operated by Chinese operatives or their proxies. Local agents collected account information and documents. During transaction days, mule account holders were taken to banks to withdraw cash immediately following large NEFT, RTGS, or IMPS transfers. The cash was then handed over to crypto brokers, who converted it to USDT using decentralized, non-KYC wallets. The Binance app was extensively used in this entire network.</p>



<p>Over the past two months, Lucknow police have uncovered money laundering of ₹5 lakh to ₹5 crore through such accounts. All the money was converted to USDT and sent abroad.</p>



<p>More than 60 individuals are currently being questioned. Police are concerned about the concentration of mule accounts in areas like Chowk, Indira Nagar, and other newly developed areas of Lucknow. While several cases have been exposed, officials believe the scope of the fraud is extensive.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
