Banswara PHED Pipe Payment Fraud: ₹3 Crore Under Investigation

Vidushi Singh
4 Min Read

Jaipur, Rajasthan — The Anti‑Corruption Bureau (ACB) has registered a First Information Report (FIR) in connection with an alleged fraud involving payments to a contractor for **pipe supply under the Jal Jeevan Mission (JJM) works in Banswara district, Rajasthan — despite evidence showing that the pipe materials were never actually supplied. The alleged scam is being linked to wider irregularities in JJM implementation across the state. (Original report: ExposeNow)

Allegations and FIR Filing

According to the complaint lodged with the ACB, officials and a contractor known as GA Infra Ltd received payments of around ₹3 crore from the Public Health Engineering Department (PHED) for the supply of water pipelines in Banswara under the JJM scheme — a flagship programme launched by the Government of India’s Ministry of Jal Shakti aimed at providing reliable tap water to rural households across the country.

Investigators allege that while invoices were raised and payment was released from government accounts, the actual pipe materials were never delivered or installed on the ground, raising serious concerns about misappropriation of public funds and violations of procurement and contract execution norms.

The complaint triggered an ACB FIR (date not disclosed in the source) and the case has been registered under relevant sections of the Indian Penal Code and anti‑corruption statutes, including provisions related to criminal breach of trust, cheating, and corruption. (Source: ExposeNow original report)

Context: Broader JJM Scam Probe

This case is part of a multi‑pronged investigation into alleged large‑scale irregularities in the implementation of the Jal Jeevan Mission in Rajasthan’s Public Health Engineering Department (PHED):

  • Earlier, the ACB filed FIRs alleging irregular award of tenders worth hundreds of crores to contractors with forged work experience certificates and manipulation of verification reports.
  • Investigators have accused firms like Shree Ganpati Tubewell Company and Shree Shyam Tubewell Company of securing JJM contracts by submitting fake certificates purportedly issued by Indian Railway Construction International Ltd (IRCON) — a central PSUs — even though those certificates were bogus.
  • ACB raids across multiple cities have led to arrests of senior PHED officials and contractors, with allegations of collusion, bribery, sub‑standard work, and inflated bills.

A Special Investigation Team (SIT) has also been formed by the ACB to probe 18 senior officers connected to the broader scam, including technical and executive engineers linked to tender processes and payments.

What the JJM Scam Investigation Has Shown

Investigators say the alleged corruption in the Jal Jeevan Mission in Rajasthan centres on:

  • Incorrect or incomplete documentation showing projects as completed even when work was unfinished.
  • Payments released without proper delivery of materials or execution of works — as highlighted in the Banswara pipe supply case. (Source: ExposeNow)
  • Collusion between contractors and officials to manipulate tender conditions, verification reports and clearances.

The repeated ACB FIRs, arrests and investigations have revealed a pattern of financial irregularities, with total alleged scam amounts running into hundreds of crores of rupees.

Public and Administrative Impact

The revelation of fraudulent payments under the JJM has shocked rural communities and watchdog groups, who say the misuse of funds meant for drinking water infrastructure undermines the core objective of the mission. Activists argue that such cases erode public trust and call for stronger monitoring mechanisms in fund disbursement, contract award and project execution.

Officials within PHED and the ACB have indicated the probe is ongoing, and further FIRs and arrests could be expected as more evidence and documents are analysed.

Share This Article
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *