Document Fragment View

Matching Fragments

7. It is further stated that the manipulation was done by one of the user ID and bid IDs. For manipulating the tenders of MPJNM, a demo file was created on MP e-procurement portal. That file was created using ID PT 4, which was given to OSMO IT Solutions at the time of performance testing and they also used digital signature certificate (DSC) of Keshav Rao Uikey. The IP address registered while creating the said demo file was 27.60.163.98 and 27.60.185.14, which was linked with mobile No.9755092919. The SIM of this mobile number was registered in the name of co-accused Varun Chaturvedi and was being used by co-accused Vinay Choudhary. Thereafter, hackers entered into the database through the staging server, where original tenders were stored and this process was done through virtual private network (VPN), the access of which was only with co-accused Nandkishore Bramhe. After reaching the database server hackers accessed the file where the original tenders were saved. They copied the details of all the bidders, who submitted the bids, which were encrypted. After copying the bids they again came back to the demo tender file created by them earlier and by using bidder ID number 15597 and vendor ID number QK 829 846 pasted the said bids in demo file. The vendor ID used for this purpose was the same, which was issued to OSMO for performance testing in the year 2016. After pasting the encrypted bid in the demo file, the hackers assessed the system again on 03-03-2018 i.e. the date on which the said bids stood decrypted as the date of opening the demo tender was mentioned as 03- 03-2018. Thus, they were able to see the figures/bids submitted by all the bidders in encrypted form. After seeing the amount filed by each bidder another demo file was created in the second demo file, the encrypted bids as visible in the first demo file were pasted in the second demo file. Again by using the bidder ID No.15597 having vendor ID number QK29846 they manipulated the bids and made the person they wanted to benefit as the lowest bidder (L-1). After making the change in the second demo file and placing a wrong bidder L-1 hackers copied the encrypted/manipulated bid value and again by using the staging server reached the database server through a VPN, access of which was given to co-accused Nandkishore Bramhe, opened the original tender file and pasted the said encrypted manipulated bid value next to the name of the bidder they wanted to benefit and thus manipulated the bids.

9. On the other hand, learned counsel for the respondent/EOW opposed the prayer and submitted that the whole responsibility of security of e-procurement portal was with the applicant Manohar M.N. since he was the head of Antares in respect of e-procurement portal at Bhopal. In the latter produced by Suresh Kumar CEO of Antares this fact is mentioned. Applicant Manohar M.N. was hand and gloves with all the co-accused persons and just to benefit them came with the first report dated 17/04/2018 that there was no tempering in the bids. Even prior to that Antares also sent an Email on 11/04/2018 mentioning that no irregularity was found. Later, when the said tempering came to the knowledge of higher officials second finding report was given accepting that the tempering had happened in the whole tendering process, which shows that he was also involved in the conspiracy. No manipulation could have taken place without the knowledge of applicant Manohar M.N. The demo files which were used in the manipulation in the bids were created and made available to OSMO by the applicant Manohar M.N. and by using the bidder ID, bids were changed and manipulated. On the request of co-accused Nandkishore Brahme VPN Access was given to him, which was also used by the Antares from his Bangalore office for maintenance of the e- procurement portal. That VPN was used in the tender manipulation. In the report of CERT it is mentioned that the Staging server had access to the main database, which should ideally not be the case. By assessing the database through the staging server, data had been read from genuine tenders and copied to blank tenders name Demo. The said faulty process was created by applicant Manohar M.N. so that the other co-accused persons could access the main database seamlessly and manipulation could be done. This clearly shows that applicant Manohar M.N. was involved in the conspiracy. The investigation is still going on, so he should not be released on bail.