logo
UP foils Kanwar riot plot: 3 held for circulating Pakistan-origin video, ISI role under probe

UP foils Kanwar riot plot: 3 held for circulating Pakistan-origin video, ISI role under probe

Time of India21-07-2025
Uttar Pradesh police arrested three individuals for sharing a hate video from Pakistan. The video, falsely attributed to Bajrang Dal, aimed to incite communal unrest. It depicted a man killing his family and was circulated on WhatsApp groups. Police are investigating possible involvement of Pakistani intelligence agencies. The accused face charges under UAPA, BNS, and IT Act.
Tired of too many ads?
Remove Ads
New Delhi: Uttar Pradesh police on Monday said they have arrested three persons suspected of being involved in circulating on social media a hate video message from Pakistan.Also being investigated is the possible role of Pakistani intelligence agencies in pushing the video, which was shared over WhatsApp in the western part of the state.The arrested persons-identified as Nadeem (25), Manser (45) and Rahees (35)-have been booked under the Unlawful Activities (Prevention) Act (UAPA), Bhartiya Nyay Sanhita (BNS) and the Information Technology Act.According to UP Police , the video, from Muzaffargarh in Pakistan and dated April 2024, shows a man killing his wife and seven children with an axe. It was circulated on the second Monday of the Shravan month during the Kanwar Yatra , with fake voice notes alleging Bajrang Dal members were attacking Muslim families. Five WhatsApp groups-All India Employer Group, Khidmat Abbasi Group, Proud Indian Muslim, Muslim Samaj Zindabad and Kakraulli Yuva Ekta-were used to spread the clip.ADG (Meerut Zone) Bhanu Bhaskar said, "The field formations of Saharanpur and Meerut Range were continuously monitoring social media. On the input of a digital volunteer from Muzaffarnagar district, we were alerted to an attempt to incite communal disturbances in the district by posting fake, morphed, disturbing and provocative images."
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

NIA court to pronounce order on bail plea of Kerala nuns today
NIA court to pronounce order on bail plea of Kerala nuns today

Indian Express

time12 minutes ago

  • Indian Express

NIA court to pronounce order on bail plea of Kerala nuns today

A NIA court in Chhattisgarh's Bilaspur district Friday reserved its order for Saturday on a bail application filed by three persons, including two nuns from Kerala, who were arrested on July 25 for allegedly trafficking and forcibly converting three women from the state's Narayanpur district. Nuns Preethi Mary and Vandana Francis along with another person Sukaman Mandavi were arrested at Durg railway station on July 25 following a complaint by a local Bajrang Dal functionary, who accused them of forcibly converting three women from Narayanpur and trafficking them. On Thursday, a sessions court in Durg district had disposed of bail plea of two Kerala nuns, saying that the matter should be heard by an NIA court. The matter was heard by Principal District and Sessions Judge (NIA court) Sirajuddin Qureshi on Friday. Amrito Das, one of the lawyers of the accused, told The Indian Express, 'Our prime thrust was three women victims' parents clearly said they have been following Christianity for years now and there is no question of forcible conversion. All 3 women are adults. Nothing in the (case) diary said they (victims) were assaulted (by the accused). There are no ingredients for human trafficking or forcible conversion in the FIR or case diary… We argued that the nuns are aged, do not have criminal records and there was no element for registering an offense.' GRP counsel Dauram Chandravanshi told the media, 'The case diary was presented in the court… From the government's side, we argued investigations are in the initial stage and hence we are opposing their bail.'

Cops crack down on dating apps promoting obscene video chats
Cops crack down on dating apps promoting obscene video chats

Time of India

time36 minutes ago

  • Time of India

Cops crack down on dating apps promoting obscene video chats

Hyderabad: The Hyderabad cybercrime police have registered a suo-moto case against several mobile dating applications accused of promoting sexually explicit video interactions in exchange for money. Tired of too many ads? go ad free now The case was initiated following observations made during web patrolling by constable Ch Venu Gopal, who flagged multiple apps offering live video chats with women. In his complaint, Gopal stated that after users create a free profile, they are prompted to purchase virtual tokens to initiate video calls with female hosts of their choice. "Almost every video call quickly turns vulgar. The women either expose themselves or persuade users to shift to WhatsApp, where they continue to share explicit content," the constable noted. Police said that many of these apps, despite branding themselves as 'safe dating' or 'friend-making' platforms, are actually facilitating sexually suggestive chats in return for payment. Among the 37 apps named in the FIR, several have amassed millions of downloads on the Google Play Store. "These platforms are camouflaging sex-based commerce under the guise of dating or social networking. It is not just morally degrading, but also a clear violation of laws relating to the indecent representation of women and the transmission of obscene material," the complaint stated. A case has been registered under multiple sections of the Bharatiya Nyaya Sanhita (BNS), including Section 79 (Gesture or act intended to insult the modesty of a woman), Section 143 (Trafficking of person), Section 144 (Exploitation of trafficked persons), Section 294 (Sale of obscene material) and Section 316(2) (Criminal breach of trust). Additionally, charges have been invoked under Sections 3 and 4 of the Indecent Representation of Women (Prohibition) Act, 1986. Tired of too many ads? go ad free now "We are writing to Google Play Store to seek details about these apps. Our investigation will focus on identifying who is behind these platforms, their operating locations, the women featured, and how the revenue is generated," said a senior cybercrime official. "The sale of virtual tokens appears to be the primary revenue model, cleverly masked under social interaction." The police have not ruled out the involvement of organised networks and said further action will depend on digital forensics and platform responses.

Chandigarh police arrest gang of 10 for duping elderly woman of Rs 1cr in ‘digital arrest'
Chandigarh police arrest gang of 10 for duping elderly woman of Rs 1cr in ‘digital arrest'

Time of India

time36 minutes ago

  • Time of India

Chandigarh police arrest gang of 10 for duping elderly woman of Rs 1cr in ‘digital arrest'

1 2 Chandigarh: The UT cyber cell busted a major online fraud racket, arresting 10 persons from Meerut, Ludhiana, and Amritsar for duping an elderly woman of Rs 1 crore. However, they managed to freeze only Rs 36 lakh of the defrauded amount, which will be returned to the victim after court proceedings. The accused used SIM boxes - telecom devices sourced from China - to convert VoIP calls into local mobile calls, masking their international origin. These operations were remotely controlled by handlers believed to be based in Taiwan, China, Malaysia, and Cambodia. The victim, Manjeet Kaur of Sector 33, received a voice call followed by a WhatsApp video call on July 11, 2025, from a man posing as a CBI officer named 'Sunil'. He falsely claimed her Aadhaar-linked mobile number and ICICI bank account were under investigation for money laundering. To gain her trust, he sent forged documents bearing government seals and a fake bank passbook via WhatsApp. Fearing legal consequences, Kaur transferred Rs 1,01,65,094 into multiple accounts provided by the fraudsters. Following her complaint, the cyber cell launched an investigation, tracing the mobile number used to Ludhiana. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Is this legal? Access all TV channels without a subscription! Techno Mag Learn More Undo Its IMEI was linked to around 180 SIM activations, many of which were traced to Meerut and Hapur. On July 24, police raided Meerut and arrested Parvez Chauhan, who confessed to operating a SIM box and earning 50 USDT (a cryptocurrency) daily from vendors for routing international calls. His phone contained chats about cryptocurrency and call routing with foreign contacts. Subsequent raids led to the arrest of Vijay Kumar Shah in Ludhiana, who had provided his POS ID to Krishna Shah for SIM activations. Both of Nepalese origin, they used a single customer's KYC to activate dual SIMs — one from Airtel and another from a different provider — without the customer's knowledge. The second SIM was passed to Akash Kumar, who sold them to Suhail Akhtar for Rs 800–900 each. Suhail then supplied them to Shubham Mehra in Amritsar, who operated active Dinstar-brand SIM boxes. Recruited via a Facebook ad and Telegram, Shubham was paid Rs 25,000 monthly in cash. Akash Kumar revealed he had acquired 180 activated SIMs from Ajit Kumar, who sourced them from POS operators Saroj Kumar and Abhishek Kumar at Rs 250 per SIM. Akash paid Rs 450 per SIM. Vipin Kumar financed the operation. All accused were produced in court and remanded for interrogation. Police recovered 480 SIM cards, six SIM boxes, 14 mobile phones, laptops, routers, and modems. From Parvez in Meerut, they seized one SIM box, a Wi-Fi router, 70–80 SIM cards, and three phones. From Shubham in Amritsar, they recovered six SIM boxes, around 400 SIM cards, 11 phones, one laptop, two modems, and one router. SP (cyber) Geetanjali Khandelwal said that SIM boxes can hold and operate hundreds of SIMs simultaneously, converting VoIP calls into local calls and bypassing telecom detection. Each box can generate over 2,00,000 IVR calls daily.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store