logo
Gangsters Rohit Godara, Goldy Brar on Rajasthan's most wanted list

Gangsters Rohit Godara, Goldy Brar on Rajasthan's most wanted list

Indian Express3 days ago
The Rajasthan Police listed gangsters Rohit Godara, Goldy Brar, among others in the latest of the state's most wanted.
Releasing the list of top 25 most wanted on Friday, Additional Director General of Police, Crime, Dinesh M N said, 'We have resolved to strengthen the law and order in the state and restore public confidence. These 25 criminals are a big threat to society, and their arrest is our top priority.'
This list includes 12 new criminals, who are wanted in various heinous crimes and on whom rewards of lakhs of rupees have been announced.
At the top of the list are some current and former Lawrence Bishnoi gang members. Rohit Godara alias Rawataram, who is wanted in 20 cases of murder, robbery, loot, etc. is at the top and carries a reward of Rs 1 lakh by Rajasthan Police and Rs 5 lakh by the National Investigation Agency (NIA).
A native of Bikaner, Godara was allegedly involved in the plot to kill Sidhu Moosewala in May 2022, in gangster Raju Theth's killing in December 2022, and in Karni Sena leader Sukhdev Singh Gogamedi's killing in Jaipur in December 2023. In April last year, he was also allegedly behind the firing at actor Salman Khan's house and was also said to be behind the plot to target stand-up comedian Munawar Faruqui, among other cases.
Then, Mahendra alias Sameer Meghwal is wanted in 25 cases of attempt to murder – including Gogamedi's – apart from cases under Arms Act and theft. He too carries a reward of Rs 5 lakh by NIA and Rs 2 lakh by state police, officials said. Virendra Singh Charan, another accused in Gogamedi murder, is wanted in 9 cases of murder, robbery, and dacoity and carries a Rs 5 lakh reward by NIA.
Satwinder Singh alias Goldy Brar, a former close aide of jailed gangster Lawrence Bishnoi, is wanted in 7 cases of murder, robbery, dacoity in the state. He carries a reward of Rs 10 lakh by NIA and Rs 50,000 at range level.
Lawrence gang member Rahul Swami, a native of Sikar, has 16 cases of murder, robbery, dacoity, etc. and carries a Rs 25,000 reward at range level. Similarly, another Lawrence gang member Mahendra Saran, a native of Churu, has 2 cases of robbery and kidnapping, and carries Rs 25,000 reward at range level.
Other names include Mokham Singh, a resident of Beawar Sadar, who has 62 cases of murder, attempt to murder, robbery, dacoity, etc. against him and carries a reward of Rs 2,000 at district level. Amit Pandit alias Jack, a resident of Ajmer, has 47 cases of attempt to murder, robbery, dacoity, etc. and carries a reward of Rs 25,000 at range level.
The ADG said that all police officers including Jaipur and Jodhpur Police Commissioners, all Range Inspector Generals of Police, Deputy Commissioners of Police, all District Superintendents of Police, GRP and ATS/SOG have been directed to make concerted efforts to arrest these identified criminals.
He said all concerned officers have also been directed to select 10 most active wanted criminals at the range level and ensure that monthly progress reports of the action taken are sent regularly. This step will ensure that there is constant pressure on criminals in every corner of the state, he said, also urging the public 'to share any information with the police without hesitation.'
Officials said that a list of most wanted is maintained at various levels, from police station to range and the state, and that these are refreshed as new names are added or removed on a rolling basis. They said that such a list motivates the police officers to go after the most wanted because not only do they carry a reward, it also fast tracks their promotion.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

CoinDCX offers 25% bounty to recover stolen crypto in $44-mn hack
CoinDCX offers 25% bounty to recover stolen crypto in $44-mn hack

Indian Express

time17 minutes ago

  • Indian Express

CoinDCX offers 25% bounty to recover stolen crypto in $44-mn hack

CoinDCX, one of India's leading cryptocurrency exchanges, has announced a recovery bounty program after suffering a security breach that led to the loss of approximately $44 million (around Rs 379 crore). The company is offering up to 25 per cent of the recovered funds as a reward to those who help retrieve the stolen crypto and assist in identifying and bringing the attackers to justice. If all lost assets are recovered, the bounty could reach a total value of $11 million (Rs 94.6 crore). In a statement, CoinDCX emphasised that the effort goes beyond just recovering funds — it's about uniting the Web3 community to stand against cybercrime. 'This is not just about us. This is about standing up for what's right, for the safety, transparency, and future of the entire Web3 ecosystem. It's a war against cybercrime,' the company said. Co-founder Neeraj Khandelwal highlighted that the breach was not only an attack on CoinDCX but on trust itself. 'When one of us is targeted, all of us are affected. CoinDCX is committed to using this incident as a turning point—to strengthen our defenses, reinforce transparency, and work with the best minds in the industry to make recovery real and replicable,' he said. He added that the company is actively working with an exchange partner to block and recover the stolen assets and is fully committed to the recovery effort. 'We will emerge from this stronger, together,' Khandelwal said. The company also issued a call to action, inviting ethical hackers, white-hat researchers, and partners across the ecosystem to join the fight against cybercrime.

Tamil Nadu: Three killed in firecracker factory blast near Sivakasi
Tamil Nadu: Three killed in firecracker factory blast near Sivakasi

Hans India

timean hour ago

  • Hans India

Tamil Nadu: Three killed in firecracker factory blast near Sivakasi

Chennai: In a tragic incident, a powerful explosion at a private firecracker manufacturing unit in Andiyapuram near Sivakasi in Tamil Nadu claimed the lives of three workers, including two women, on Monday. Several others were seriously injured in the blast, which sent shockwaves through the surrounding area. The explosion occurred while workers were engaged in routine operations at the fireworks unit. According to eyewitnesses, firecrackers stored in one of the rooms suddenly ignited, triggering a chain reaction of explosions. The deafening sound could be heard several hundred meters away, causing panic among local residents. Fire and rescue teams from Sivakasi and nearby areas rushed to the spot and launched immediate firefighting and rescue operations. The flames were brought under control after a strenuous effort, and the injured workers were shifted to nearby government and private hospitals for treatment. Fire and emergency personnel worked through the debris in search of survivors, while police cordoned off the area to prevent further hazards. Local reports indicate that the three deceased workers were trapped inside the factory when the explosion occurred and could not be rescued in time. The cause of the explosion is yet to be officially determined. Police officials have registered a case and launched a detailed investigation. Preliminary findings suggest possible mishandling of volatile chemicals or negligence in safety protocols, but authorities are awaiting forensic reports. Chief Minister M.K. Stalin expressed condolences to the bereaved families and announced a solatium of Rs 4 lakh each to the kin of the deceased. Sivakasi, known as the firecracker capital of India, has a long history of such accidents due to the hazardous nature of the work and frequent lapses in safety enforcement. This incident once again raises concerns about the working conditions in firecracker factories and the urgent need for stringent regulatory oversight to prevent recurring tragedies in the region.

EOU busts syndicate involved in Rs 40 crore cyberfraud, 6 held
EOU busts syndicate involved in Rs 40 crore cyberfraud, 6 held

Time of India

timean hour ago

  • Time of India

EOU busts syndicate involved in Rs 40 crore cyberfraud, 6 held

Patna: The Economic Offences Unit (EOU) of Bihar Police, in collaboration with department of telecommunications (Govt of India), has uncovered a major cybercrime syndicate, involved in a nationwide fraud of more than Rs 40 crore, with the arrest of its 21-year-old mastermind, Harshit Kumar, and five others from Gauspur in Supaul district on Sunday, said additional director general (ADG) Nayyar Hasnain Khan on Monday. The syndicate committed frauds using spoofed SIM boxes, brought from China and Vietnam, causing a loss of about Rs 2.5 crore to the telecommunications department just in the last two weeks, he added. The operation, conducted across Supaul, Vaishali and other districts in Bihar, revealed an extensive cyberfraud network with international connections. Police have linked the syndicate's operations to at least 18 cases reported across West Bengal, Uttar Pradesh, Goa, Karnataka, Delhi, Odisha and Jharkhand. ADG, EOU, Khan said a total of six people, including Common Service Center operator Mohd Sultan and four point of sale (POS) machine operators, were arrested in the matter. "Eight spoofed SIM box devices and hundreds of certified, used and unused SIM cards, along with multiple bank passbooks and other documents were seized. An Investigation revealed that Harshit established connections with individuals from China, Vietnam, Cambodia and other countries through social media platforms," Khan said. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Ukraine: New Container Houses (Prices May Surprise You) Container House | Search Ads Search Now Undo Explaining the modus operandi, he said the syndicate operated a parallel exchange system, converting Voice over Internet Protocol calls into local fraud calls, targeting citizens across the country. The group reportedly made over 10,000 fake calls daily through these spoofed SIM boxes. "The cybercrime syndicate has been operating the network since Jan 2025. It means that the department must have suffered a loss in revenue of about Rs 30 crore in the last seven months," he said. Khan added mastermind Harshit has a luxurious house in Motihari, East Champaran. "Besides, Rs 3 crore worth transactions were discovered through his bank account. He also holds accounts on two cryptocurrency exchanges, suggesting evidence of significant cryptocurrency transactions," the ADG said. The investigation also uncovered a sophisticated SIM card supply network. One Sumit Shah from Pakur in neighbouring Jharkhand, supplied approximately 1,000 SIM cards to Harshit since March. Accused Mohd Sultan was involved in collecting biometric data from villagers under the pretence of govt schemes, which was then used to obtain SIM cards illegally. The EOU is currently investigating the financial aspects of the case, including PAN details, bank accounts and Aadhaar information of the accused.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store