logo
Snipers On Rooftops. AI-Powered Cameras: Puri Turns Fortress For Rath Yatra

Snipers On Rooftops. AI-Powered Cameras: Puri Turns Fortress For Rath Yatra

NDTV7 hours ago

Puri:
The seaside pilgrim town of Puri on Wednesday turned into a fortress with around 10,000 security personnel deployed for the annual Rath Yatra celebrations of Lord Jagannath on June 27, police said.
Besides, over 250 Artificial Intelligence-enabled cameras have been installed in various places in the town for surveillance, a police officer said.
The security personnel, including those of central armed forces, participated in a rehearsal to prepare themselves to handle the lakhs of devotees who will arrive in the town from every nook and cranny of the country and abroad to get a glimpse of the trinity, Lord Balabhadra, Devi Subhadra and Lord Jagannath.
The deities come out of the 12th-century shrine to mingle with devotees cutting across caste, creed and religion once a year.
As this year's Rath Yatra celebration will be held post-Pahalgam terror attack, security arrangements have been made keeping different aspects in view, a senior police officer said.
"An Integrated Command and Control Room has been set up in Puri for the first time. Around 275 AI-enabled CCTV cameras have been installed along the route between Uttara Chhak and Puri town and between Puri and Konark. The live visuals from these cameras will be monitored round the clock," Odisha Director General of Police (DGP) Y B Khurania said after giving the final touch to the security arrangements made for the mega festival.
Khurania said the AI powered surveillance system will keep watch on traffic movements, crowd surge and help security personnel make a prompt decision and face emergencies in case any happens.
Sub-control rooms have also been set up at key locations, the DGP said.
For the first time, NSG (National Security Guard) snipers have also been deployed on the rooftops of buildings given the threat assessment, while anti-drone technology and police-operated drones will also be in use for aerial surveillance, the DGP said, adding that anti-sabotage teams, bomb squads, dog squads are also in place.
The 10,000 security personnel deployed for the festival comprises Odisha Police and eight companies of Central Armed Police Force (CAPF).
To ensure full proof security on sea front, arrangements have been made with deployment of Odisha's Marine Police, Coast Guard, and Indian Navy, he said.
A real-time chatbot application has also been launched to assist visitors with information on parking availability, route maps, and directions to vacant parking spaces, Khurania said.
Expecting congregation of around 15 lakh people on the day one and two of the festival, DGP Khurania emphasised that priority will be given to proper service and security of the devotees.
"Extensive arrangements have been made for the orderly darshan of the devotees. Experienced police officers have been deployed for Rath Yatra duty," he said.
The Director of Intelligence R P Koche said since the Shri Jagannath Temple is located in a high-security zone, its importance increases significantly during the Rath Yatra.
Besides, special security arrangements have been made for Sri Gundicha Temple and the three chariots, Koche said.
The Additional Director General (ADG) of Police (Modernisation), Soumendra Priyadarshi, said appropriate arrangements have been made to control the crowd.
ADG (Law and Order) Sanjay Kumar said that the cooperation of the officers/staff of the police administration is essential for the orderly completion of the Rath Yatra.
Shree Jagannath's Rath Yatra will begin on June 27 and end on July 8 with deities returning to the main shrine

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Cryptocurrency Trail From Another Espionage Case: How Navy Staffer Recruited By Pak Spy Was Caught
Cryptocurrency Trail From Another Espionage Case: How Navy Staffer Recruited By Pak Spy Was Caught

News18

time31 minutes ago

  • News18

Cryptocurrency Trail From Another Espionage Case: How Navy Staffer Recruited By Pak Spy Was Caught

The Indian Navy clerk posted at the naval headquarters in New Delhi was already under surveillance for two years due to his online gaming habits It was his addiction to online gaming and a cryptocurrency trail that led to his downfall. The Indian Navy staffer arrested for allegedly working with a Pakistani spy was already under surveillance for two years due to his internet habits. Vikas Yadav, an Upper Division Clerk (UDC) posted at the naval headquarters in New Delhi was nabbed from Jaipur for allegedly leaking defence-related sensitive information to a Pakistani handler in exchange for money. This allegedly included details on Operation Sindoor – strikes carried out by the Indian armed forces in Pakistan and Pakistan-occupied Kashmir in response to the Pahalgam terror attack. In the latest case, police have said Yadav started spying for Pakistan because he needed money to fund his addiction to online gaming. The Pakistani handler, who was posing as an Indian woman under the fake identity of 'Priya Sharma", even made some payments to him in cryptocurrency for the exchange of information. 'He was lured by money and ended up leaking sensitive information from the Navy headquarters," Inspector General of Police (CID-Security) Vishnu Kant Gupta said. 'After monitoring his social media activity and confirming his links with a Pakistani handler, he was detained in Jaipur for joint interrogation involving multiple national agencies." First Published: June 26, 2025, 19:28 IST

₹50,000 for secrets: Navy staffer fell for ‘Priya', leaked Operation Sindoor information to Pakistan
₹50,000 for secrets: Navy staffer fell for ‘Priya', leaked Operation Sindoor information to Pakistan

Hindustan Times

time4 hours ago

  • Hindustan Times

₹50,000 for secrets: Navy staffer fell for ‘Priya', leaked Operation Sindoor information to Pakistan

An Indian Navy staffer posted at the naval headquarters in Delhi has been arrested in Jaipur for allegedly leaking a range of classified defence information to a Pakistani handler, including details of Operation Sindoor, for which he received ₹ 50,000. Vishal Yadav was caught leaking Operation Sindoor details to a Pakistani handler(Representational image/ Pixabay ) Vishal Yadav, an upper division clerk (UDC) in the Directorate of Dockyard at the Navy building in Delhi, allegedly leaked classified information related to Operation Sindoor, a series of strikes carried out by the Indian Armed Forces in Pakistan and Pakistan-occupied Kashmir in retaliation for the Pahalgam terror attack, PTI reported. Yadav, a native of Rewari in Haryana, passed the sensitive information to a female Pakistani handler who had posed as an Indian woman, inspector general of police (CID-security) Vishnu Kant Gupta said. He was arrested on Wednesday in Jaipur and will now face a joint investigation involving multiple agencies. 'Yadav confessed to receiving approximately ₹ 2 lakh in total for the information he passed on. This included ₹ 50,000 for leaking information related to Operation Sindoor,' the IGP added, saying some of the payments had been made through cryptocurrency. Espionage trail began on Facebook Quoting intelligence sources, PTI also reported that the espionage trail began on Facebook, where the Pakistani handler using the fake identity 'Priya Sharma' sent Yadav a friend request. Their communication soon became regular and later shifted to WhatsApp, before eventually moving to Telegram, a platform known for its encryption features. Police said Yadav initially received small sums, ranging from ₹ 5,000 to ₹ 6,000, for lower-grade information. However, as the handler pushed him for more critical material, he began sharing classified defence data for higher payments. 'He was lured by money and ended up leaking sensitive information from the Navy headquarters,' Gupta said. 'After monitoring his social media activity and confirming his links with a Pakistani handler, he was detained in Jaipur for joint interrogation involving multiple national agencies,' the IGP added. Yadav, who hails from Punsika village in Haryana's Rewari district, is also said to be addicted to online gaming, an addiction investigators believe may have contributed to his vulnerability in falling into the espionage trap. Forensic analysis of his mobile phone has revealed substantial evidence, including financial transactions, encrypted chats, and classified defence material shared with the handler, the report added. The probe is ongoing, with authorities examining his cryptocurrency dealings and further connections. IG Gupta warned that Pakistan's intelligence networks are deploying increasingly sophisticated tactics to extract sensitive information. 'We are keeping a constant watch on such activities, and this arrest is a result of sustained monitoring and timely action,' he said. With PTI inputs

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store