logo
Two foreign nationals charged in Singapore for allegedly attempting to bribe officers

Two foreign nationals charged in Singapore for allegedly attempting to bribe officers

Online Citizen​15 hours ago
SINGAPORE: Two foreign nationals were charged on 10 July 2025 for allegedly offering bribes to enforcement officers in separate incidents.
Krishnan Ramakrishnan, a 30-year-old Indian national, was charged in court for allegedly attempting to bribe two Certis Cisco auxiliary police officers (APOs) attached to the National Environment Agency (NEA).
On 18 April 2025, Krishnan allegedly offered a bribe of S$100 to officers Sri Suthan Sellah and Sugeerta B Kalaivanan as an inducement to waive enforcement action taken against him for littering.
The officers rejected the bribe, and the matter was subsequently referred to the Corrupt Practices Investigation Bureau (CPIB).
Krishnan faces one charge punishable under Section 6(b) of the Prevention of Corruption Act.
In a separate case, Xu Manye (许漫烨), a 37-year-old Chinese national, was also charged in court for allegedly offering bribes to two Land Transport Authority (LTA) officers.
On 24 March 2025, Xu allegedly attempted to bribe officers Tay Boon Tat Francis and Lim Ghim Wee on three separate occasions, offering S$50 each time.
The bribes were allegedly intended to secure favourable treatment in relation to the LTA's investigation into his personal mobility device (PMD), and to recover the impounded device, which had failed to meet safety standards during an inspection.
The two LTA officers rejected the bribes, and the case was referred to the CPIB.
Xu faces three charges punishable under Section 6(b) of the Prevention of Corruption Act.
In a statement, CPIB said Singapore adopts a strict zero-tolerance approach towards corruption.
Anyone convicted under Section 6 of the Act may be fined up to S$100,000, jailed for up to five years, or both.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Inter Kashi crowned champions of India's second division after CAS ruling
Inter Kashi crowned champions of India's second division after CAS ruling

Straits Times

time3 hours ago

  • Straits Times

Inter Kashi crowned champions of India's second division after CAS ruling

Find out what's new on ST website and app. BENGALURU - Inter Kashi have been named champions of India's I-League after the Court of Arbitration for Sport ruled in favour of the club in their dispute with the All India Football Federation. In May, the AIFF named Churchill Brothers winners of the country's second division, after the governing body's appeals committee ruled against Inter Kashi for fielding an 'ineligible player' in Mario Barco. According to reports in Indian media, Inter Kashi registered Barco twice, signing the Spaniard before the season and then replacing him when he suffered an injury, only to bring him back into their squad two months later. The AIFF's appeals committee said all matches played by Barco since his return from injury would be forfeited by Inter Kashi, leaving Churchill Brothers at the top of the standings. Inter Kashi, which was established in 2023 in collaboration with Spanish giants Atletico Madrid and Andorran club Inter Escaldes, filed an appeal with CAS last month. "I still don't understand what is the mistake we have made," Inter Kashi president Prithiijit Das told Reuters. "A player got injured, the club spent money, looked after his rehabilitation, he became fit and then his right to play football (was) not being allowed... what is his fault? Top stories Swipe. Select. Stay informed. Singapore Critical infrastructure in S'pore under attack by cyber espionage group: Shanmugam Singapore What is UNC3886, the group that attacked Singapore's critical information infrastructure? Singapore Alleged Kpod peddler filmed trying to flee raid in Bishan charged with 6 offences Asia Indonesia court jails former trade minister for 4½ years in sugar graft case Singapore Singapore police in contact with Indonesian authorities over baby trafficking allegations Singapore NTU upholds zero grade for student accused of using AI in essay; panel found 14 false citations or data Singapore 7-year-old girl, cabby taken to hospital after vehicle pile-up in City Hall area Singapore Former NUH male nurse charged after he allegedly molested man at hospital "We are all grateful that truth has won." In its statement on Friday, sport's highest court CAS said it had "ruled that the AIFF shall declare Inter Kashi FC as winner of the I-League 2024-25." Following the ruling, the AIFF congratulated Inter Kashi on becoming champions. Churchill Brothers did not immediately respond to an emailed request for comment. Das said he was hopeful that as the I-League champions, Inter Kashi would meet the necessary criteria to play in the top division. The top-tier Indian Super League (ISL), however, is on hold after contract renewal talks between the federation and their commercial partners, Reliance-led Football Sports Development Limited, stalled over a case to implement a new constitution for the AIFF ongoing at the Indian Supreme Court. "It's a very worrying situation, because there are so many people involved in the ISL. So many players, livelihoods," Das said. Inter Kashi are also in talks with the Uttar Pradesh state government to upgrade a stadium at their home city of Varanasi, 900 kilometres east of the capital New Delhi, and play there as soon as 2026, he added. REUTERS

Woman, 77, loses $44k in cash and jewellery to con artists claiming she was cursed
Woman, 77, loses $44k in cash and jewellery to con artists claiming she was cursed

New Paper

time5 hours ago

  • New Paper

Woman, 77, loses $44k in cash and jewellery to con artists claiming she was cursed

A 77-year-old retiree was scammed of more than $44,000 in cash and valuables after being deceived by three Chinese nationals in an elaborate scam involving false claims of a curse and a fictitious doctor. One of the accused, 56-year-old Li Yu Lian (transliterated), pleaded guilty on July 18 to one count of cheating. The incident happened in November 2019. According to Shin Min Daily News, the victim was walking near Block 815 Jellicoe Road on the morning of Nov 16, 2019, when she was approached by a woman, Liang Gui Lian (transliterated), who asked if she knew of a 90-year-old doctor living nearby. Liang was reportedly an accomplice of the accused. When the woman said she didn't, Li joined the conversation, claiming to know the doctor personally. Li then claimed the elderly woman had three sons and a daughter - a detail the group had learned in advance. Having gained the woman's trust, she told her that she was cursed and needed the doctor's help to lift it. But treatment, she said, required a large sum of money, and the doctor only treated patients in even numbers. She then used this as a reason to accompany the victim. The victim returned home to collect $8,000 in cash, gold jewellery and her bank book, then withdrew another $36,000 from a bank near Boon Keng MRT station with Li by her side. The pair returned to Jellicoe Road, where they met Liang and a third accomplice, Zhu Mian Fang (transliterated), who posed as the doctor's granddaughter. Zhu told the victim she too had been cured of a similar curse. She instructed the victim to place all her cash and jewelry into a brown reusable bag for the ritual. She was then handed an identical bag and told not to open it until midnight - and to keep the ritual secret. When the victim returned home and shared the story with her children, her daughter opened the bag - only to find plastic bags and drinks inside. Gone were the real contents: $44,000 in cash, three gold bracelets, two gold rings, two pairs of earrings, a Rolex watch, and a bracelet worth $350. Court proceedings against the accomplices are ongoing.

What is UNC3886? Inside the state-linked group attacking S'pore's critical information infrastructure
What is UNC3886? Inside the state-linked group attacking S'pore's critical information infrastructure

New Paper

time5 hours ago

  • New Paper

What is UNC3886? Inside the state-linked group attacking S'pore's critical information infrastructure

Singapore's critical information infrastructure has come under attack from cyber espionage group UNC3886. A state-linked advanced persistent threat (APT) actor, it is a menace to national security in many countries, including Singapore. Naming the nation's attacker for the first time on July 18, Coordinating Minister for National Security K. Shanmugam said: "UNC3886 poses a serious threat to us, and has the potential to undermine our national security. Even as we speak, UNC3886 is attacking our critical infrastructure right now." What is UNC3886? Are essential services in Singapore safe from the attack? The Straits Times answers questions about the attack and APTs. 1. Who is UNC3886? First detected in 2022 by cyber security firm Mandiant, UNC3886 is a China-linked cyber espionage group. UNC3886's attempts are known to be persistent, with the intention of intelligence gathering and long-term spying. The "UNC" label stands for "uncategorised" or "unclassified" as industry analysts have not formally classified it. "This does not mean that it is any less of a threat," said Mr Shanmugam. 2. How does UNC3886 operate? Mr Vivek Chudgar, managing director of cyber security firm Mandiant Consulting in Asia Pacific and Japan, described UNC3886 as highly adept. "UNC3886 operates in a sophisticated, cautious and evasive nature," he said, adding that the group largely focuses on defence, technology and telecommunication organisations in the US and Asia. The Chinese espionage group is known to target network devices, virtualisation systems and critical information infrastructure with zero-day exploits. Zero-day exploits are attacks that take advantage of security vulnerabilities in software that vendors have yet to develop patches for. Unpatched vulnerabilities in the software of network devices, hypervisors, and virtual machines are typically harder to monitor, said Mr Chudgar. UNC3886 also employs custom malware and tools available on the victim's system to evade detection. Like other APT attackers, UNC3886 is persistent in that even if detected and removed from the network, it will attempt to re-enter the target networks. 3. What cyber attacks has UNC3886 been responsible for? Mr Chudgar said UNC3886 has attacked organisations in the United States, Europe, and parts of Asia. Specifically, it has targeted sectors such as government, telecommunication, technology, aerospace, defense, energy and utility. "UNC3886 poses a severe threat to national security for the organisations and the countries targeted," he added. The Chinese espionage group has exploited vulnerabilities in routers from Juniper Networks, network security devices from Fortinet and virtual machines from VMware. 4. Are essential services in Singapore safe from the attack? On July 18, the Cyber Security Agency said that UNC3886's activities have been detected in parts of Singapore's critical information infrastructure that power essential services. "We have been investigating UNC3886's activities," said CSA, which is leading the investigations. The agency said it is monitoring all critical services sectors and sharing threat intelligence, but did not name the affected sectors. Singapore's 11 critical services sectors are: energy, water, finance, healthcare, transport, government, infocomm, media as well as security and emergency services. The agency is also working closely with other government bodies and partners to support the unnamed affected organisations. CSA also did not say how long UNC3886 has been in the affected networks, saying instead: "These attacks are often protracted campaigns and CSA will need to preserve operational security by not disclosing further information at this stage." 5. What other APT attacks have hit Singapore? In 2014, the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, National University of Singapore and the Nanyang Technological University discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The varsities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, a critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store