
Who is Harjeet Singh Laddi, Khalistani terrorist involved in firing at Kapil Sharma's cafe?
Videos show masked men shooting from a moving car, shattering the café's glass windows while staff were inside. Thankfully, no one was injured.
Laddi is a Germany-based operative on India's most-wanted list, accused Sharma's show of mocking Nihang Sikhs' religious attire and traditions. Surrey Police's FLIS team is investigating the attack, which occurred days after the café's soft launch.
Terror Group: Babbar Khalsa International (BKI)
Wanted For: Murder of VHP leader Vikas Prabhakar (2024)
NIA Reward: Rs. 10 lakh for capture
Base: Germany (coordinates Canada/UK operations)
Key Role: Weapons smuggling, recruitment, funding terror plots
Laddi's social media statement claimed Sharma's show featured a comedian wearing Nihang attire while making "disgraceful jokes" about Sikh traditions. He alleged his team called Sharma's manager "15 times" seeking an apology but received no response.
Nihang Singhs are revered warrior-saints in Sikhism known for distinctive blue robes and martial history. The banned BKI group, linked to Pakistan-based handlers, has previously attacked Hindu leaders in Punjab.
Kap's Café posted on Instagram: "Violence won't break our dream of building community through coffee." Staff thanked Surrey Police and supporters using #SupportKapsCafeCanada.
Investigators recovered bullet casings and reviewed security footage but haven't shared suspect details.
This is the 5th attack on South Asian businesses in Surrey since 2024, raising safety concerns. Kapil Sharma, currently filming his Netflix show, hasn't commented publicly.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NDTV
39 minutes ago
- NDTV
Nearly 5 Lakh Fake NCERT Textbooks Seized In Piracy Crackdown: Government In Parliament
New Delhi: The Union Education Ministry has seized over 4.7 lakh pirated NCERT textbooks across India since 2024, in a widespread crackdown on textbook piracy. In a written reply to the Rajya Sabha on Thursday, July 24, Minister of State for Education Jayant Chaudhary said piracy cases had been reported from multiple parts of the country. "During the years 2024 and 2025, approximately 4.71 lakh pirated copies of NCERT textbooks have been seized in various operations across different states. Piracy is driven primarily by commercial motives of unscrupulous elements," he said. The scale of the operation underscores the challenge of ensuring genuine and affordable educational material reaches students nationwide. The minister underlined that the primary objective of NCERT is to provide quality textbooks at a very affordable price to the last student across the country, "on a no-profit and no-loss basis". To clamp down on the illicit printing and distribution network, NCERT has intensified enforcement action. Chaudhary informed the Upper House that in the last one year, a total of 29 premises linked to the manufacture and sale of pirated NCERT textbooks have been raided. These included locations involved in printing pirated books, producing counterfeit NCERT watermarked paper, and supplying illegal material. Stock and machinery worth over Rs 20 crore have been confiscated during these operations. The NCERT has also implemented a series of proactive measures. "Including a 20 per cent price reduction of NCERT textbooks, timely printing of NCERT textbooks, improved quality of paper and printing (using modern machines), promotion of online sale of textbooks through e-commerce platforms," said Chaudhary. Additionally, NCERT is encouraging online sales through e-commerce platforms to ensure students have easy and secure access to authentic books. A tech-driven anti-piracy pilot initiative has also been launched to strengthen safeguards against duplication. "NCERT has conducted a pilot trial of a technology-based anti-piracy solution on one million copies of a grade 6 textbook," Chaudhary said. "This tech-based solution has been developed and patented by the Indian Institute of Technology, Kanpur." The Education Ministry's response signals a clear intent to tackle textbook piracy through both enforcement and innovation. As the academic year progresses, authorities hope that these steps will not only deter counterfeiters but also ensure students receive the quality educational resources they are entitled to.


Hans India
41 minutes ago
- Hans India
Cyber fraud busted: Two arrested for duping Delhi man of Rs 10.64 lakh via malicious app
New Delhi: In a breakthrough against rising cyber frauds, the Cyber Police Station of South-West Delhi has arrested two cyber criminals from Jharkhand for cheating a Delhi resident of Rs 10.64 lakh through a malicious mobile application (APK file). The accused, identified as Shankar Dan (27) and Pradeep Kumar Dan (26), both residents of Dhanbad, Jharkhand, were arrested following extensive raids conducted across Jharkhand and West Bengal. According to police, the duo used to impersonate bank representatives and lure victims by sending fake APK files via WhatsApp, which gave them unauthorised access to bank accounts. In this case, the victim received a call on June 30 from someone claiming to be an SBI official, citing issues with cheque clearance. The caller sent a malicious file under the pretext of verifying cheque images. After installing the app, the victim's phone was compromised, and unauthorised transactions worth Rs 10.64 lakh were made from his Bandhan Bank account. The money was routed through the BillDesk payment platform to Axis Bank credit cards and Google Ads, and later withdrawn using third-party apps like CRED and MobiKwik. Police recovered six smartphones, including the device used to make the call and one used to operate the BillDesk app. The devices contained credit card data, banking credentials, and malware. Shankar Dan, who has studied till class 3 and owns a mobile shop, was previously involved in two cyber fraud cases and one murder case. He was responsible for calling victims and sending the malicious links. Pradeep, educated till class 8 and an accused in a murder case, managed the financial transactions. The investigation is ongoing, and police suspect the involvement of a larger cyber syndicate operating from forested areas to evade detection.
&w=3840&q=100)

Business Standard
41 minutes ago
- Business Standard
ED raids call centres in Chandigarh Tricity running tech support scam
The Enforcement Directorate (ED) on Thursday said it had conducted midnight searches on multiple illegal call centres operating in the Chandigarh Tricity region. These centres were duping foreign nationals by offering fraudulent tech support services. According to the ED, the companies had created overseas counterparts to receive payments from unsuspecting customers through payment gateways. The funds were then routed to India through formal banking channels as well as hawala. While the firms advertised services such as web designing and fixed wireless internet, they did not disclose details of promoters or staff. Many employees lacked the technical expertise normally associated with software or BPO services, indicating that the operations were entirely clandestine. One such entity, FSAL Technologies Pvt Ltd, was found running a fake call centre through an overseas front named Bios Tech in the United States. It falsely claimed to provide support for Microsoft, HP printers, routers, and other hardware. However, its director, Faisal Rashid Peerzada, failed to produce any agreements or authorizations from Microsoft, HP, or Arlo to offer such services. Investigators found that FSAL was controlling the backend of Bios Tech's website and monitoring payments received from foreign customers. Another associate, Arshdeep, a friend of Faisal, was listed as the director of Bios Tech. 'Similarly, Terrasparq and Visionaire, operated by Sahu Jain, have been running similar tech scams since 2016. Jain's sister, Ms. Priya, owns a US-based company, CTS Mobility, which acted as the overseas counterpart. ED officials recovered emails and WhatsApp chats showing the creation of fake Microsoft popup alerts and periodic fraudulent credit card transactions from foreign customers for non-existent services,' said an ED statement. The websites of these companies claimed to offer services such as mobile device management, network and device management, and Device-as-a-Service (DaaS), but provided no promoter details. Photographs displayed on the websites portrayed large IT park offices, which were contrary to the reality. The ED has confirmed that further investigation is underway. The directors are likely to be summoned for questioning, and more action is expected as the probe into the multi-crore tech support fraud progresses.