Rajasthan News

Two Rajasthan Royals players of IPL 5 under scanner for spot fixing

by RajasthanDirect
May 17, 2013

After the arrest of three Rajasthan Royals players, the Delhi police has said now said that two more players from the team are under the scanner following revelations made by cricketer-turned-bookie Amit Singh about a match played in last year’s edition of the IPL.

The match in question was the match played between the Rajasthan Royals and Delhi Daredevils on 29 April last year at the Ferozshah Kotla in which the former lost.

Batting first, the Delhi Daredevils made 152 for 6 in 20 overs and Rajasthan made 151 for 3.

The Rajasthan team needed 12 runs from the last two overs and Ajinkya Rahane and Brad Hodge were at the crease. Hodge got out leg before the wicket (lbw) off Morkel’s bowling after scoring 22 runs.

The match has come under the scanner of the Delhi police after the former Rajasthan team player Amit Singh told Delhi police officials that the last two overs of the match had been pre-determined, due to which the Royals lost the match.

As a result of this disclosure, a senior Delhi Police official admitted that this match and as a result the two batsmen were also under the scanner. However, there is no official statement to the effect and the police has no official admission before a court of law regarding it.

Arrested Rajasthan Royals player Ajit Chandila had allegedly admitted to indulging in spot fixing during IPL 5, police officials said.

Investigators today made Chandila hear a recorded conversation between him and a bookie as part of the interrogation.

In the course of conversation, Ajit Chandila is allegedly heard asking for an advance to indulge in spot fixing during IPL 6 and allegedly asks the bookie to adjust the total amount to be paid later.

When the bookie expressed reluctance over paying the advance, Chandila is reportedly heard telling him, “Didn’t you do it last time (IPL5) too?”

For IPL 6, Delhi Police sources say that Chandila had begun talking to the bookies about  a month and a half before the matches started. The first meeting between Ajit Chandila and Mumbai-based Chandresh Patel took place at Country Club, Gurgaon on 6 April.

The deal, according to the Delhi Police sources, was stuck at Rs 20 lakh for one over spot fixing. On 8 April, when KKR had arrived at Jaipur for a match Ankit Chavan was also allegedly roped in for spot fixing.

Delhi police officials have said that Chandila took an advance from the bookies on two occasions. The first time he allegedly took Rs nine lakh and in another installment he took Rs three lakh.

Officials claimed that Chandila had admitted to indulging in spot fixing on multiple occasions during the ongoing IPL tournament.

The Delhi Police is also examining the footage of matches played between the Rajasthan Royals on the following occasions: 8 April (Kolkata Knight Riders), 11 April (Pune Warriors), 14 April (Kings XI Punjab), 17 April (Mumbai Indians), 20 April (Royal Challengers Bangalore), 22 April (Chennai Super Kings) and 27 April (Sunrisers Hyderabad).

All these matches are now under the Delhi Police scanner.

The Delhi Police is also going to quiz Chandila’s wife because the money was routed through the hawala channels to his house. Chandila was also allegedly questioned by his wife, who had asked him to explain the source of the money, but the bowler had allegedly scolded her and asked her to collect it.

A team from the Delhi Police is expected to be dispatched to the Haryana residence of the bowler to question Chandila’s voice.

The Delhi Police has also claimed that S Sreesanth has admitted to his involvement in the crime. ”

He (Sreesanth) said he committed a mistake and he repented that he fell prey to designs of his friend Jiju Janardhan,’’ a senior police official told Firstpost.

src: http://www.firstpost.com/sports/ipl/two-more-rajasthan-royals-players-under-scanner-for-ipl-5-game-delhi-police-792465.html

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload the CAPTCHA.