
Delhi HC junks Turkish firm's plea against revocation of security clearance
The Bureau of Civil Aviation Safety (BCAS) on May 15 revoked the security clearance, days after Turkey backed Pakistan and condemned India's strikes on terror camps in the neighbouring country. Justice Sachin Datta on Monday underlined the necessity to eliminate the possibility of espionage or dual use of logistics capabilities which would be highly detrimental to the security of the country, especially in the event of an external conflict.
Celebi Airport Services India Pvt Ltd and Celebi Delhi Cargo Terminal Management India Pvt Ltd oversee ground handling and cargo terminal functions at various airports in the country.
The court rejected the contention of the petitioners on the denial of principles of natural justice. 'No doubt, the principles of natural justice are sacrosanct; however, it is a compelling constitutional truth that security of the realm is the pre-condition for enjoyment of all other rights,' the court said in its 94-page verdict.
It said the authorities are justified in taking prompt and definitive action to completely obviate the possibility of the country's civil aviation and national security being compromised.
Ground handling services at airports, the court said, offered deep access to airside operations, aircraft, cargo, passenger information system and security zones. Such unbridled access to vital installations and infrastructure naturally elevates the need for strict security vetting for operators, and their foreign affiliations, it added.
'This is particularly true in the wake of contemporary challenges faced by the country in the security domain, and the escalations/ incidents witnessed in the recent past, with geopolitical factors at play,' the verdict said.
The court, as a result, found 'compelling national security considerations' which prompted
authorities to take
requisite action against the Turkish firm. 'While it would not be inappropriate for this court to make a verbatim reference to the relevant information/ inputs, suffice it to say, that there is a necessity to eliminate the possibility of espionage and/or dual use of logistics capabilities which would be highly detrimental to the security of the country, especially in the event of an external conflict,' it said.
The court referred to a Supreme Court judgment observing the executive wing and not the judicial wing possessed the knowledge of India's geo-political relationships to assess if an action is in the interest of India's national security.
At the same time, the court noted, the Supreme Court clarified that a judicial review would not be excluded on a mere mention of the phrase 'national security' and state couldn't be allowed to use national security as a tool to deny citizens remedies provided under law.
The high court was also 'acutely conscious' that the state must not be allowed to invoke national security as a ruse to deny procedural due process.
Once national security considerations were found to exist, on the basis of which the security clearance has been cancelled or revoked, it is not for the court to 'second guess' the same, the high court said.
The verdict found the twin tests set out in an apex court decision to be satisfied in the present case with the state justifying the involvement of national security considerations besides the abrogation of principles of natural justice.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Hindu
6 minutes ago
- The Hindu
Commercial Tax Dept. unearths inter-State GST racket by nabbing Rajasthan ‘fake bill trader' who facilitated bogus input tax credit claim of ₹39 crore
Karnataka Commercial Taxes Department officials have unearthed a multi-State GST racket and arrested a Rajasthan-based 'fake bill trader' who had allegedly facilitated the fictitious transfer of input tax credit (ITC) of ₹39 crore under Goods and Services Tax (GST) to various manufacturers through fake firms in Karnataka. According to sources in the Commercial Taxes Department, fake bill trader Kailash Bishnoi, a resident of Jalore district in Rajasthan, was taken into custody in Bengaluru on Tuesday by a team comprising officers from the department's South Zone and Vigilance Division in coordination with the Bengaluru East police team. 17 fake firms Department sources said Bishnoi had created 17 fake firms in Karnataka that have shown a total turnover of ₹208 crore, based on which nearly ₹39 crore of ITC was passed on to some manufacturers. Sources noted that ₹39 crore was a financial burden caused by Bishnoi on Karnataka alone. Bishnoi was involved in the creation of fake GST registrations and bank accounts by fabricating Aadhaar cards, using which tax invoices were issued to the tune of several hundred crores to facilitate the fictitious movement of goods in metal scrap and facilitating the claim of bogus ITC by recipients, the department sources said. Investigation into the case is learnt to have revealed that he has operated in Chhattisgarh, Madhya Pradesh, Rajasthan, Telangana, Andhra Pradesh, Tamil Nadu, and Karnataka, creating fake firms and issuing tax invoices in association with his team members. The total quantum of the fraud would be much higher if the losses caused to other States is taken into account, officials explained. The arrest of his associate Rohit alias Rohtash in December 2024 and gathering of several incriminating material and digital evidences pointing to their crime finally resulted in the department officials nailing Bishnoi. Many fake documents In September 2023, the accused, along with his accomplices, tried to open 10 bank accounts by providing fake names, Aadhaar cards and PAN cards in HDFC Bank's Murugeshpalya branch in Bengaluru. The bank's branch manager had noticed this and filed a complaint with the Jeevan Bima Nagar police. The investigation team of the Bengaluru East police and the Commercial Taxes Department visited Rajasthan twice to track Bishnoi in the last six months. But he remained elusive as he was on constant move, changing locations in multiple States and using 14 mobile phone numbers to evade being tracked, sources said. Finally, he was arrested on Tuesday by the warrant of the Special Court for Economic Offences, Bengaluru, and given custody for further inquiry. Officers of the Commercial Taxes Department are continuing their investigation and analysing his actions from various angles. Ninth such case Incidentally, this is the ninth such case being traced in the last 15 months by the Karnataka Commercial Taxes Department which is continuing its pursuit against such offences to ensure equitable taxation and safeguard the interests of both the State and its honest taxpayers.


India Today
15 minutes ago
- India Today
Beware: This traffic challan message can drain your bank account
The online vehicle services app, mParivahan, used primarily for e-challan management, has been at the centre of attention. The scam came to light when a Mumbai-based professional lost money through a cloned version of the mParivahan app and posted about the incident on wasn't an isolated case—nor is it the only government app being cloned by cybercriminals. Similar incidents of financial loss linked to government applications have been widely reported. To dig deeper, India Today's Open Source Intelligence(OSINT) team scoured the web for the rogue APK(Android Package Kit) file responsible for duping users and conducted a detailed malware scam starts with a WhatsApp message from an Indian number, carrying a fake APK file and the victim's vehicle number to make it look legit. Once installed, the app asks for access to contacts, call logs, and messages—giving hackers full access to your data. Moments later, unauthorised transactions take place—without warning or how does your critical data end up in a scammer's hand, like it's no big deal?India Today downloaded the infected app and ran a detailed malware analysis. The APK file was uploaded to the malware scanning platform VirusTotal, which flagged trojans like and RewardSteal—malware designed to steal sensitive user fake apk file is a near-identical clone of the official mParivahan app—with subtle tweaks that fool you into granting access to phone functions like calls and SMS. Behind the scenes, it retrieves your private data and silently transmits it to scammers via hidden Telegram bots. In an earlier report, India Today exposed the 'Vahan Parivahan' APK, which intercepted OTPs to enable fraudulent e-commerce transactions. The latest clone, however, shows a more advanced threat profile—designed to harvest Aadhaar credentials and banking information. It also exploits device permissions to access local files and storage, significantly heightening the risk of sensitive data infected, the device grants attackers access to SMS, contacts, and storage. The malware uses fake login screens, intercepts OTPs, and extracts sensitive files like Aadhaar documents—silently sending all data via hidden Telegram bots, enabling swift financial frauds. Attackers can monitor all pre-installed banking and payment apps on the infected scam's reach goes beyond the initial victim. By hijacking chats and OTPs, cybercriminals can target victims' family and contacts, attempting to steal their money too. This isn't merely a theoretical risk — in a recent case in Bengaluru, both the victim and his wife were targeted with attempted unauthorised transactions.A US-based mobile security firm, Zimperium, earlier reported a similar trend where malware is spread via WhatsApp as APK files disguised as legitimate government or banking apps. Once installed, these fake apps trick users into revealing sensitive financial and personal zLabs research team discovered nearly 900 malware samples primarily targeting Indian customers using net banking and mobile banking analysis also revealed shared code structures, user interface elements, and app logos, suggesting a coordinated effort by a single threat actor targeting mobile devices running the Android also found 222 exposed firebase storage buckets holding 2.5GB of stolen personal and financial data, highlighting the extensive scale of this threat.- Ends


Time of India
15 minutes ago
- Time of India
Shankh Air plans to expand regional connectivity in UP, Infra News, ET Infra
Advt By , ETInfra Uttar Pradesh-based regional airline Shankh Air is preparing to launch operations, pending approval of its flying permit from the Directorate General of Civil Aviation (DGCA). The carrier aims to begin by connecting six destinations from the state existing regional operators that use turboprop aircraft, Shankh Air plans to lease narrow-body Airbus A320 planes for its services. The airline's chairman, Shravan Kumar Vishwakarma , recently met with Union Civil Aviation Minister K Rammohan Naidu in New Delhi to discuss the airline's meeting also covered potential collaboration to support regional air connectivity goals under the UDAN scheme, according to the company.