
Chhattisgarh: Two CRPF jawans suffer critical injuries in IED blast triggered by Maoists in Bastar's Bijapur district
Condition of both the jawans was stated to be critical while another personnel escaped with bruises .
Bijapur SP Jitendra Yadav told TOI that the personnel were part of the Road Opening Party and they were out on patrol when an IED blast went off, leaving the jawans severely injured.
A
CRPF
officer said that it wasn't yet clear if it was a pressure IED or command. He said that there was an exchange of fire between Maoists and security forces after the blast.
The incident took place on the Timapur–Murdanda road near Awapalli police station around Murdonda security camp and the injured jawans were immediately evacuated, followed by deployment of reinforcement. The explosive, believed to have been planted earlier by Maoists, detonated as the team was passing through the area and the jawans might have inadvertently stepped upon the bomb.
Both injured jawans received initial medical treatment and have now been referred to a higher medical center in Raipur for advanced care.
Security forces have since launched a search operation in the area to trace the insurgents and ensure the safety of other patrolling units.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
32 minutes ago
- Time of India
Govt appoints ADG Panda as head of anti-Maoist operations
Bhubaneswar: State govt on Wednesday appointed ADG Sanjeeb Panda to exclusively lead anti-Maoist operations, a new post in Odisha police, with about eight months remaining before the Centre's March 2026 deadline to eliminate Maoists from the country. Tired of too many ads? go ad free now Earlier, the director (intelligence) managed anti-Maoist operations. The govt also appointed Akhileshvar Singh as DIG of special intelligence wing (SIW), a dedicated unit responsible for gathering Maoist intelligence and supporting anti-Maoist operations. Panda previously led SIW as a DIG-rank officer. Singh, formerly DIG (south-western range), exchanges posts with Kanwar Vishal Singh. The home department's notification read, "Panda, who was ADG (training), will look after functioning of both SIW and anti-Naxal operations. He will directly report to DGP." "The appointment aims to further strengthen anti-Maoist operations in accordance with Union home minister Amit Shah's directive to eliminate Naxals nationwide by March 2026," a senior police officer said. The creation of the maiden anti-Maoist chief position is particularly significant as chief minister Mohan Charan Majhi prepares to attend the Eastern Zonal Council meeting in Ranchi on Thursday, chaired by Shah. The agenda encompasses inter-state matters and Left-wing extremism (LWE). Officers said that Panda will conduct a thorough assessment of anti-Maoist strategies in the wake of the recent theft of about 5,000kg of gelatin sticks by Maoists from a Sundargarh district quarry on May 27. The incident created concern as Sundargarh was removed from the list of LWE-affected districts last year. Odisha police claimed that the state's LWE situation remains in control compared to Chhattisgarh and Jharkhand, where recent anti-Maoist operations resulted in casualties of a large number of rebels. Tired of too many ads? go ad free now Police sources said that while 10 districts — Koraput, Malkangiri, Rayagada, Nabarangpur, Boudh, Kandhamal, Kalahandi, Nuapada, Balangir and Bargarh — are officially LWE-affected, three — Koraput, Rayagada and Nabarangpur — have recorded no Maoist incidents in three years. The CM recently informed the assembly that only about 100-120 Maoists currently operate in the state. Records indicated that security forces eliminated 118 Maoists over the past decade. Between 2015 and Jan 2025, forces neutralised 118 Naxals, arrested 315 involved in Naxal activities, and facilitated 238 Maoist surrenders.


Time of India
2 hours ago
- Time of India
3 lines, 3 rooms, 3 portraits: How a digital arrest scam hub operates
Gurgaon: Line 1 is the entry-level job in the cybercon food chain – the one who makes the call. In a separate room, designed to resemble a typical govt office in India, is Line 2. Here, a scammer dressed in police uniform sits for video calls, with framed portraits of Mahatma Gandhi, BR Ambedkar and Sardar Patel mounted on the wall behind. Tired of too many ads? go ad free now Line 3, a third room, hosts seasoned conmen. Posing as Enforcement Directorate or CBI officers, they know sections of laws such as UAPA, NDPS, FEMA, BNS and IPC with which they threaten their victims. This was the architecture of a cybercrime call centre in Cambodia, where a woman from Surat landed up. Khushi Chaudhary (24) was arrested from IGI Airport in Delhi by Gurgaon police on June 29 after they got a tip-off that she was flying back to India. Khushi was the 16th accused to be taken into custody after an 81-year-old woman in Gurgaon complained that she lost Rs 2.9 crore to an elaborate cyber scam that involved a 'digital arrest' for three days in Dec 2024. Investigators told TOI on Wednesday that Khushi's arrest and interrogation had revealed an elaborate syndicate that is at play. "She was a cog in a massive machinery. These cybercrime operations have roots across borders and work with clockwork precision. The financial trail is long and circuitous and often ends in crypto wallets," a senior police officer said. Khushi, police said, worked as a barista at a café in Surat. In Nov 2023, a friend's husband convinced her to move to Dubai for a better-paying job. There, she briefly worked at a cybercrime call centre in Ajman before the friend's husband allegedly put her in touch with a Pakistani recruiter who took her to Cambodia in Aug 2024. Tired of too many ads? go ad free now The call centre she was employed at operated like a corporate office at a building called 'Mango Park' in Phnom Penh in the southeast Asian country. "Every day, Line 1 operators were given a list of phone numbers to call. These callers posed as FedEx employees or law enforcement officials who told people that parcels addressed to them had illegal items or contraband. The other ruse was to say hawala transactions linked to their accounts were traced to terror outfits," the officer said. Line 1 operators like Khushi would scare the receivers with these claims. If they took the bait, the call would be transferred to Line 2. "On Line 2 is the video call setup. A man, often posing as a Colaba police station ACP, would appear in a dimly lit room with photos of Gandhi, Ambedkar and Patel in the backdrop to make the fraud look legitimate. He would talk in an aggressive tone to get the victims to do as he said," the police officer said. The final step, Line 3, would be the appearance of an ED or CBI official -- who in this case went by the name of 'Rahul Gupta'. "This scamster would tell victims to transfer large sums of money into different bank accounts. By then, the victim had been isolated for some time, and was told not to disclose anything to anyone," the officer said. Lines 2 and 3 would be the 'digital arrest' stage, with constant mental pressure put on the victim, who would be instructed not to switch off the phone or communicate with anyone with threats of harm to family members. Such 'digital arrests', as we have seen, have happened for weeks and months, during which victims have transferred crores of money from their own accounts into the accounts of scamsters, their ability to think logically compromised by fear. Sometimes, they gave the money hoping to "settle", sometimes it would be to ascertain -- as instructed by scamsters -- to ascertain the money was clean. The 'digital arrest' would suddenly end once the money was gone. Rewards & parties Khushi told investigators that she started out as a Line 1 operator but later assumed the role of a "merchant" -- one who would split the amount transferred to scammers by their targets into "mule accounts" in India. "Then the money was moved abroad and converted into cryptocurrency, all in 10-15 minutes," the police officer explained. Khushi's bosses were two Chinese citizens, known to her only as 'Lion' and 'Panda'. She earned $700 (approximately Rs 60,000) as fixed monthly salary and made another $50 (nearly Rs 4,300) for every target who fell into the trap. "Her work hours were 9am to 8pm. As Line 1 caller, she made 30-40 calls an hour. And on average, 3-4 victims fell for the con," the police officer said. Well-performing scamsters also got promotions. "People were lured with promises of a better life. The more victims you trap, the more you could go up the ranks. It meant getting closer to the bosses and getting a raise at every step. Another attraction was the weekend parties, which were organised for the call centre staff at luxury villas," the police officer said. In the case that led Gurgaon police to Khushi's arrest, 15 other suspects – most of them holders of mule bank accounts – were nabbed. They have been charged under sections 318(4) (cheating), 336(3) (forgery), 348 (making or possession of any instrument for counterfeiting a property mark) and 340 (forged document) of BNS. Gurgaon: Line 1 is the entry-level job in the cybercon food chain – the one who makes the call. In a separate room, designed to resemble a typical govt office in India, is Line 2. Here, a scammer dressed in police uniform sits for video calls, with framed portraits of Mahatma Gandhi, BR Ambedkar and Sardar Patel mounted on the wall behind. Line 3, a third room, hosts seasoned conmen. Posing as Enforcement Directorate or CBI officers, they know sections of laws such as UAPA, NDPS, FEMA, BNS and IPC with which they threaten their victims. This was the architecture of a cybercrime call centre in Cambodia, where a woman from Surat landed up. Khushi Chaudhary (24) was arrested from IGI Airport in Delhi by Gurgaon police on June 29 after they got a tip-off that she was flying back to India. Khushi was the 16th accused to be taken into custody after an 81-year-old woman in Gurgaon complained that she lost Rs 2.9 crore to an elaborate cyber scam that involved a 'digital arrest' for three days in Dec 2024. Investigators told TOI on Wednesday that Khushi's arrest and interrogation had revealed an elaborate syndicate that is at play. "She was a cog in a massive machinery. These cybercrime operations have roots across borders and work with clockwork precision. The financial trail is long and circuitous and often ends in crypto wallets," a senior police officer said. Khushi, police said, worked as a barista at a café in Surat. In Nov 2023, a friend's husband convinced her to move to Dubai for a better-paying job. There, she briefly worked at a cybercrime call centre in Ajman before the friend's husband allegedly put her in touch with a Pakistani recruiter who took her to Cambodia in Aug 2024. The call centre she was employed at operated like a corporate office at a building called 'Mango Park' in Phnom Penh in the southeast Asian country. "Every day, Line 1 operators were given a list of phone numbers to call. These callers posed as FedEx employees or law enforcement officials who told people that parcels addressed to them had illegal items or contraband. The other ruse was to say hawala transactions linked to their accounts were traced to terror outfits," the officer said. Line 1 operators like Khushi would scare the receivers with these claims. If they took the bait, the call would be transferred to Line 2. "On Line 2 is the video call setup. A man, often posing as a Colaba police station ACP, would appear in a dimly lit room with photos of Gandhi, Ambedkar and Patel in the backdrop to make the fraud look legitimate. He would talk in an aggressive tone to get the victims to do as he said," the police officer said. The final step, Line 3, would be the appearance of an ED or CBI official -- who in this case went by the name of 'Rahul Gupta'. "This scamster would tell victims to transfer large sums of money into different bank accounts. By then, the victim had been isolated for some time, and was told not to disclose anything to anyone," the officer said. Lines 2 and 3 would be the 'digital arrest' stage, with constant mental pressure put on the victim, who would be instructed not to switch off the phone or communicate with anyone with threats of harm to family members. Such 'digital arrests', as we have seen, have happened for weeks and months, during which victims have transferred crores of money from their own accounts into the accounts of scamsters, their ability to think logically compromised by fear. Sometimes, they gave the money hoping to "settle", sometimes it would be to ascertain -- as instructed by scamsters -- to ascertain the money was clean. The 'digital arrest' would suddenly end once the money was gone. Rewards & parties Khushi told investigators that she started out as a Line 1 operator but later assumed the role of a "merchant" -- one who would split the amount transferred to scammers by their targets into "mule accounts" in India. "Then the money was moved abroad and converted into cryptocurrency, all in 10-15 minutes," the police officer explained. Khushi's bosses were two Chinese citizens, known to her only as 'Lion' and 'Panda'. She earned $700 (approximately Rs 60,000) as fixed monthly salary and made another $50 (nearly Rs 4,300) for every target who fell into the trap. "Her work hours were 9am to 8pm. As Line 1 caller, she made 30-40 calls an hour. And on average, 3-4 victims fell for the con," the police officer said. Well-performing scamsters also got promotions. "People were lured with promises of a better life. The more victims you trap, the more you could go up the ranks. It meant getting closer to the bosses and getting a raise at every step. Another attraction was the weekend parties, which were organised for the call centre staff at luxury villas," the police officer said. In the case that led Gurgaon police to Khushi's arrest, 15 other suspects – most of them holders of mule bank accounts – were nabbed. They have been charged under sections 318(4) (cheating), 336(3) (forgery), 348 (making or possession of any instrument for counterfeiting a property mark) and 340 (forged document) of BNS.


Time of India
2 hours ago
- Time of India
Pune engineering firm loses Rs2.35 crore to man-in-the-middle fraud
Pune: Cybercrooks cheated an engineering solutions company at Dhayari of Rs2.35 crore in a man-in-the-middle fraud on June 10. This is a type of online fraud in which the perpetrator positions himself in a digital conversation between two users either to eavesdrop or to impersonate one of the parties, making it appear like a normal exchange of information. The director of the company lodged a complaint in this regard. Senior inspector Swapnali Shinde of cyber police told TOI, "The company has a tie-up with an Italy-based company and wanted to purchase a press bending machine to manufacture automobile parts." You Can Also Check: Pune AQI | Weather in Pune | Bank Holidays in Pune | Public Holidays in Pune "In Feb this year, the company in Dhayari, which manufactures automobile spares and engineering products, decided to place an order with the Italian company and communicated their requirement through emails. The Italian company promised to manufacture the press bending machine of the specific requirement of the Dhayari company and to ship to Pune," Shinde said. "The Italian company then sent a payment schedule to Dhayari-based company," Shinde said. "On June 10, the company received an email, which appeared to be from the Italian company, though bank account number mentioned in it was different. Without verifying and cross-checking with Italian company officials, the Pune firm's accounts department transferred 240,000 Euros (Rs2.35 crore) for the machine," Shinde said. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Knee pain prices might surprise you Knee pain | search ads Find Now Undo "After transferring the money, officials of the Dhayari-based company contacted the Italian company to inform them about the payment. However, the Italian company officials denied receiving the payment. The company officials then checked their accounts and realised that the payment was made to some other account," she said.