
Infiltration bid foiled along LoC in Uri sector, operation underway
Srinagar, Apr 23 (UNI) An infiltration attempt by suspected militants was foiled by Army along the Line of Control (LoC) in the Uri sector of Jammu and Kashmir's Baramulla district on Wednesday.
The bid was foiled a day after the deadliest terror attack on civilians in J&K that left 26 dead at a meadow near the famous resort of Pahalgam in Anantnag district.
Army said two to three unidentified terrorists attempted to infiltrate through the general area of Sarjeevan near Uri Nala. The attempt was detected and intercepted by alert troops guarding the LoC, leading to a firefight.
'On 23 Apr 2025, approximately 2-3 UI terrorists tried to infiltrate through general area Sarjeevan at Uri Nala, Baramulla, the alert tps on LC challenged and intercepted them resulting in a firefight,' Army's Srinagar based Chinar Corps said in a post on X.
The Army said the operation is in progress.
UNI MJR GNK

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NDTV
3 hours ago
- NDTV
Chandigarh Rapido Driver Scammed Out Of Rs 4,000 By Passenger: "My Earnings Vanished..."
A Rapido driver from Chandigarh recently shared a post on Reddit about falling victim to a digital scam and losing Rs 4,000. In the post, the driver explained that he had accepted a ride request near Command Hospital and was asked to make a detour to drop off the passenger's wife at the railway station. The situation seemed slightly unusual, but didn't raise immediate red flags. However, it eventually turned out to be a clever ruse. "I got a ride in morning near CH((Army hospital) As I was close I accepted it. The passenger called me saying that his wife is inside hospital and needs to be dropped at Railway station. And he is paying 4200 and I can take my amount and repay at her id as it was not getting done from his account," the Rapido driver wrote. The passenger claimed to have paid Rs 4,200 for the ride but asked the driver to transfer the amount to another account, citing issues with his UPI. The driver verified a Rs 4,000 credit in his account and, trusting the passenger, transferred the money to the QR code provided via WhatsApp. "Then he said he sent 4000 and I check ky account there was 4000 received but I didn't check date of receipt. He said his wife is inside and I should send money on QR which he sent on WhatsApp and I did. As I saw 4009 received I wasn't worried but he said he is sending more money to transfer where I got doubt and disconnected," the driver added. See the post here: by u/Jasszzi in Chandigarh The driver later realised the Rs 4,000 credit in his account was actually from a friend, sent the previous day. The scammer had cleverly exploited the timing, and by the time the driver grew suspicious, the damage was done. The scammer's attempt to send another fake transaction alerted the driver, who disconnected the call, but he had already lost his earnings from several days. "I was happy that I escaped untill I saw date of receipt of 4000. It was Friend who sent me 4000 yesterday. I was scammed, being understanding everything and being smart and educated. My earnings of 4-5 days vanished in a minute bcz of lil ignornace. Where can I report this or is there any chance to get money back?" he said, concluding the post. The incident resonated with many Reddit users, who shared similar experiences. Many urged the driver to file an online complaint on the cybercrime portal and share the FIR with the bank to facilitate a chargeback. One user wrote, "The same happened with a rapido driver, I know. The exact hospital and the exact story. He did go to the police station, and the number was found to be from Rajasthan, iirc. But nothing much happened."


Time of India
3 hours ago
- Time of India
Cybercrime: Nawada gang tricks youth with bizarre job offers
Patna: Nawada is fast emerging as a breeding ground for cybercrime. In a sensational case that has left police stunned, a cyberfraud racket with an unusually provocative front—offering money to men for impregnating women—has been busted in the district's Kunj village. The racket was masterminded by Rajesh Kumar (26), son of a retired Army personnel. A resident of the nondescript Kunj village under the Roh police station area, Rajesh exploited the notion that "sex sells" by launching a fake job agency with a bizarre name: 'All India Pregnant Job Company'. The "company" lured men with promises of payments up to Rs 5 lakh for helping women conceive. However, this was just a front for an elaborate cyberscam targeting youth, unemployed people, and women across the country. People were duped into paying hefty registration fees and additional charges, believing they were enrolling for well-paying jobs. The gang siphoned off lakhs of rupees from unsuspecting applicants through various digital transactions and manipulative schemes. According to police, Rajesh's arrest came after the ministry of home affairs (MHA) shared mobile data analysis with the state authorities. Acting on the lead, a Special Investigation Team (SIT), led by Cyber DSP Priya Jyoti, on Sunday conducted a raid at Kunj village, which led to the arrest of Rajesh and three others, including three minors, one of whom was just 17 years old. An FIR was registered under multiple sections of the BNS and IT Act. The police recovered five cellphones and a keypad phone, along with fake job cards, photographs of women, and other incriminating documents. Further investigation revealed that the gang employed highly professional techniques to build credibility, including well-designed online ads, fake training videos featuring young women endorsing the scheme, social media campaigns and newspaper advertisements, promises of free cellphones and laptops, fake job offers with reputed 5G telecom companies, claiming work-from-home roles with monthly salaries between Rs 22,500 and Rs 75,500 This is the third major cyberfraud busted in Nawada in the past two years. In Jan 2025, a similar racket operated under the same 'Pregnant Job' and 'Playboy Service' banners was uncovered. And in Dec 2023, police had busted another cybercrime gang at Gurma village under the Mufassil police station area, where 11 people were arrested. Those arrested included people with modest backgrounds—a truck driver, a street food vendor. Speaking about the Sunday's arrest, superintendent of police (SP) Abhinav Dhiman said, "The gang specifically targeted vulnerable sections of society, including students, jobseekers, and women. Their scams were designed to lure people with greed."


United News of India
4 hours ago
- United News of India
Odisha CM directs Kendrapara Administration to take strict action against Bangladeshi infiltrators
East Kendrapara, June 9 (UNI) Odisha Chief Minister Mohan Majhi has directed the Kendrapara district administration to take strict action against Bangladeshi infiltrators. The Chief Minister gave this direction while reviewing the various developmental work of the district during his visit on Monday Majhi also announced that appropriate action would be taken after receiving information about challenges like smuggling and law-and-order issues in the district. He said steps would soon be taken for the development of water resources and industries in the district. The mangrove forest in Kendrapara district would be further expanded, while eco-tourism would be accelerated in Bhitarkanika and Gahirmatha, the Chief Minister stated. Majhi also announced that new projects would be inaugurated in the district soon, including the establishment of a medical college in Kendrapara. The meeting also discussed the Parikrama project of the Sri Baladevjew Temple. Majhi said, 'Our goal is to make Kendrapara a model district in the coming days, with a focus on new projects like setting up industries, developing tourism, and promoting renewable energy.' He added that a detailed plan for this should be prepared within the next month. Before the review meeting, the Chief Minister participated in a Tiranga Yatra from the Mausi Maa Temple to the Sri Baladevjew Temple. UNI DP BM