
People want to see the Kolkata gangrape video. And this is becoming a trend
Data shows a surge in Google searches for terms like 'law student rape video', 'Kolkata rape MMS', 'Kolkata rape video', 'Kolkata law student rape', 'Kolkata rape porn', and 'Kolkata gangrape porn' immediately after the incident was reported.India Today also found that a video titled 'Kolkata law student' had been uploaded to a pornographic website on June 30. However, the authenticity of the video could not be independently verified. On Telegram, several Bengali channels selling explicit content switched their wording from 'premium videos' to 'rape videos' as clickbait in the wake of the recent incident.
Pattern emergesThis isn't the only rape case in India where such a disturbing trend has emerged.In the days following the horrific rape and murder of Jyoti Singh in 2012, Google Trends data revealed an alarming spike in searches for the term 'Delhi rape porn'. While the nation was outraged over the brutality of the crime, some expressed intent on seeking it out for voyeuristic gratification.Search for terms like 'Delhi bus porn', 'Delhi bus rape video', and 'Delhi rape video' remained at their peak on Google search until March 2012.While Google search trends reflect a mix of queries, including those for news coverage, the spike in searches specifically targeting 'MMS' or pornographic content related to the incident on adult websites is particularly disturbing.advertisementAfter the 2024 RG Kar rape case in Kolkata, India Today reported on a similar spike and found at least eight Telegram channels in the name of the murdered doctor, with a cumulative subscriber base of more than 70,000 users. Many of these channels carried 'video' either in their title or username — a signal that they solely targeted people searching for such videos. Perhaps the most significant surge in search patterns was observed in July 2023, when two women were stripped and paraded naked by a mob in Manipur. Offensive search terms like 'Manipur naked video', 'Manipur viral video', 'Manipur rape video', 'Manipur naked parade', and 'Manipur naked girls' saw a sharp rise on Google.Hundreds of pages on porn sites and shady content aggregators, Telegram groups, and cloud storage apps like Terabox, where pornographic content is widely hosted and distributed, shared the video. India Today has found more than a dozen telegram channels titled 'Manipur viral video' and similar still exist, with some containing the horrific video.Delhi-based mental health practitioner Dr Khushi K Gund suggests that a deep sense of sexual inadequacy, coupled with porn addiction and other underlying psychological issues, may be driving the disturbing trend of searching for rape videos online.advertisementGund says: 'Many individuals drawn to such content are not aroused by intimacy but by control, domination, and humiliation which are often rooted in unresolved trauma, misogyny, or a need for power. Repeated exposure to mainstream porn can lead to desensitization, pushing some toward more extreme content like rape fantasies to feel aroused.'- Ends

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
38 minutes ago
- Time of India
Cyber crooks lure Vizag youth with paid tasks, steal nearly Rs 70 lakh
1 2 Visakhapatnam: Driven by a combination of greed and unemployment, cyber fraudsters are increasingly targeting youth in Visakhapatnam, Vizianagaram, and several other cities by offering online task-based jobs, such as writing reviews. Once the victims are paid small sums for completing initial tasks, they are manipulated into investing larger amounts, leading to huge financial losses. Kumar (name changed), a youngster from Vizag city, never imagined that joining a Telegram group would lead to financial loss and victimization. He joined a Telegram group that offered money for completing small online tasks. Initially, he earned between Rs 1,000 and Rs 5,000 as rewards, but was later convinced to invest more money in exchange for hefty returns. He eventually lost over Rs 13 lakh. Similar to Kumar, more than 20 youngsters — including students, unemployed youth, and private employees — in the Vizag region were duped in online task-based job scams, resulting in total losses exceeding Rs 68 lakh. Youngsters from the Vijayawada region also suffered significant financial setbacks in similar scams. Speaking to TOI, inspector K Bhanavi Prasad of the cybercrime police station in Vizag said that youngsters are increasingly falling victim to task-based job scams. Fraudsters lure unsuspecting individuals via WhatsApp and Telegram, offering simple tasks such as rating restaurants and places for quick money. While small initial payments help build trust, the real objective is to manipulate victims into investing in fake platforms. These funds are never returned. "We have been educating youngsters and homemakers, who are frequent targets," the inspector added. In several cases, fraudsters gained the victims' trust and persuaded them to invest in fake IPOs by promising returns of over 150 to 200 percent. Though victims tried to withdraw their investments and expected returns, they were asked to pay additional fees to claim the amounts — ultimately resulting in further fraud, police said. "I was added to a WhatsApp group and was asked to complete an online task. After completing it, they transferred Rs 500. Gradually, the number of tasks increased every day. The tasks were very simple, like giving a five-star rating for a product or place, or doing a small translation, and they paid Rs 500 to Rs 1,000 per task. But one day, they asked me to deposit Rs 10,000 with the promise of Rs 3,000 per task. Suspecting a scam, I blocked the group," said Raju (name changed), an employee with a private firm. "However, two of my friends lost Rs 20,000 each in the scam," he added. Police revealed that while many youths are falling victim to such scams, only 20 to 30 per cent of the victims who lose significant amounts actually come forward to file complaints and attempt to recover their money. Stay updated with the latest local news from your city on Times of India (TOI). Check upcoming bank holidays , public holidays , and current gold rates and silver prices in your area.


Time of India
3 hours ago
- Time of India
Man scours Net for AI-based trading platform, loses 2.3 cr
Hyderabad: A 52-year-old businessman, who was looking for an artificial intelligence-based trading platform, was duped by a cyber fraudster of 2.30 crore. The incident took place under the Rachakonda police commissionerate limits. Police said that the victim first did a Google search for an AI-based trading platform. Subsequently, he was included in an unsolicited WhatsApp group 'Shoonya' allegedly administered by Sarvjeet Singh and his associate, Swetha. "The group provided stock recommendations, trading ideas, investment opportunities, and claimed to offer stock investment training. Unaware of any fraudulent intent, I trusted the group. After getting information about the AI-based platform, I downloaded an application shared via the link," the complaint told police. He first began investing a small amount, and by seeing the statement shown by the accused about the profits made by the investment, the victim invested more money in about 20 online transactions. When he finally wanted to withdraw the money, the accused started demanding money, citing various reasons, to allow him to withdraw money. You Can Also Check: Hyderabad AQI | Weather in Hyderabad | Bank Holidays in Hyderabad | Public Holidays in Hyderabad | Gold Rates Today in Hyderabad | Silver Rates Today in Hyderabad Realising that he lost 2.30 crore, the victim approached the cyber crime police. Stay updated with the latest local news from your city on Times of India (TOI). Check upcoming bank holidays , public holidays , and current gold rates and silver prices in your area.


Mint
11 hours ago
- Mint
One-sided lover plants IED in music system speaker in Chhattisgarh, sends as gift to kill woman's husband
In a horrific incident, a 20-year-old electrician from Chhattisgarh allegedly sent a gift to husband of a woman he was infatuated with a twist. The man planted an improvised explosive device (IED) in a music system speaker, PTI quoted the police as saying on Sunday. The police added that the electrician assembled the IED using online tutorials, and designed it to detonate upon being plugged in. His Google search history showed "how to kill a person using a bomb without being caught by police", officials said. Identified as Vinay Verma, he was arrested along with six others by the Khairagarh-Chhuikhadan-Gandai district police. Others have been identified as Parmeshwar Verma (25), Gopal Verma (22), Ghasiram Verma (46), Dilip Dhimar (38), Gopal Khelwar and Khilesh Verma (19). With the arrest of the accused, the Khairagarh-Chhuikhadan-Gandai district police have also unearthed an explosive smuggling racket which supplied gelatin sticks to the accused. Few days ago, a suspicious parcel, neatly gift-wrapped and bearing a fake India Post logo, was delivered to a shop in Manpur village under Gandai police station limits. It was addressed to village resident Afsar Khan, who found it suspicious and alerted the police. Following this, a bomb disposal team examined the package and found a 2-kg IED concealed inside a brand-new speaker, Khairagarh-Chhuikhadan-Gandai district Superintendent of Police (SP) Lakshya Sharma told PTI. The bomb disposal team stated that the IED was designed to detonate upon being plugged into a power source. When the current reaches a detonator connected to the speaker's wiring, it triggers the explosion. As the primary explosive, Gelatin sticks were used, while the speaker's outer casing would act as deadly shrapnel upon detonation, the SP added. Upon investigation, it was found out the Vinay Verma, resident of Kusami village in Khairagarh, allegedly hatched the plot in a bid to murder Khan. The police said that Vinay was in one-sided love with Khan's wife since her college day, but after she married Khan a few months back, Verma allegedly plotted to eliminate him. Police also added that the accused siphoned off the explosives used in the device from a stone quarry in Chhattisgarh's Durg district. To procure gelatin rods from Gopal and Dilip, Durg resident Parmeshwar allegedly paid ₹ 6,000. Explosives were delivered by Ghasiram and Khilesh is accused of preparing the fake India Post logo used on the parcel. Police added that Verma, with the help from Gopal, eventually delivered the explosive-laden gift to Khan's shop. Police also seized 60 gelatin sticks and two detonators from the premises of Gopal and Dilip in Durg. All the explosives had been illegally diverted from a quarry in Patharia area, whose operator will also be questioned, he said. "This action not only thwarted a planned murder but also exposed a network of illegal explosive supply in the region," Sharma said. Meanwhile, the probe is underway.