logo
Tripura BSF apprehend 5 smugglers; rescue cattle, seize contraband

Tripura BSF apprehend 5 smugglers; rescue cattle, seize contraband

The Border Security Force (BSF) foiled multiple smuggling attempts along the India-Bangladesh border in Tripura, arresting five cattle smugglers and seizing contraband, including mobile phones and foreign goods worth over Rs 20 lakh, officials said on Sunday.
In one major operation, BSF troops of Border Outpost (BOP) Dholakcheri, located in South Tripura district, apprehended five cattle smugglers and rescued 12 cattle from their possession.
The operation was conducted on June 14 at around 3:45 PM. All the accused were found to be residents of South Tripura and Gomati districts, the BSF confirmed.
In a separate operation, BSF personnel from BOP Nirbhoypur in West Tripura district seized 47 brand new mobile phones worth approximately Rs 10 lakh.
The seizure was made when miscreants attempted to throw the consignment over the border fence into Bangladesh.
BSF's quick response foiled the smuggling attempt and secured the high-value items before they could cross the international border.
Meanwhile, Border Security Force (BSF) personnel will soon be donning newly designed uniforms with upgraded features tailored for India's diverse climate conditions.
Sharing the details, BSF (North) Deputy Inspector General Yogendra Singh Rathore said that major changes will be made in the new uniform's fabric composition, colour scheme, and overall design.
"There are a lot of changes, be it the texture or colour. As far as texture is concerned, it was 50-50 per cent in the old uniform -- 50 per cent cotton and 50 per cent polyester. The new uniform is 80 percent cotton and 20 percent polyester because it is hot in Rajasthan and humid in the northeast. So, such a cotton-based uniform is very comfortable," he said.
"The colour has also been changed. The current uniform is 50 per cent khaki, 45 per cent green and 5 per cent brown in colour. Other patterns have also been changed, the logo has been introduced, and changes have also been made to the rank we put up.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Six-month police op dismantles cybercrime syndicate in Delhi targeting SBI credit card holders
Six-month police op dismantles cybercrime syndicate in Delhi targeting SBI credit card holders

Indian Express

time5 minutes ago

  • Indian Express

Six-month police op dismantles cybercrime syndicate in Delhi targeting SBI credit card holders

In a six-month-long operation, Delhi Police said it dismantled what it described as a major cybercrime syndicate that defrauded State Bank of India credit card holders across the country, siphoning off more than Rs 2.6 crore. The Police said Saturday that 18 people had been arrested, including the alleged masterminds, insiders at a Gurgaon call centre, SIM card suppliers, cryptocurrency handlers and field operatives. The network was operating out of Kakrola and Uttam Nagar in Dwarka, the police added. The police said the syndicate was run much like a company, with divided roles and responsibilities. The scheme began with employees at a Gurgaon-based call centre, which had authorisation to handle SBI's Card Protection Plan services. Those employees, police said, leaked customer information — including names, registered mobile numbers and partial card details — with particular focus on clients enrolled in the protection program. The data was passed on to callers who posed as bank executives. According to police, those callers used scripted conversations to persuade victims that they were dealing with genuine customer service representatives. 'The pretext for these calls commonly involved offering assistance, renewal, or verification of CPP benefits, thereby creating a facade of legitimacy and instilling trust in the victim,' said Vinit Kumar, deputy commissioner of police with the Intelligence Fusion and Strategic Operations unit. During the calls, the accused deployed fabricated terms such as One Time Permission and Customer Value Verification Code to manipulate victims into handing over authentication details like one-time passwords and card verification values. 'The process was executed in real time, allowing the syndicate to immediately utilize the stolen credentials to conduct unauthorized online transactions,' Kumar added. The stolen data was then used to purchase electronic gift cards from platforms including EaseMyTrip and Woohoo. Those gift cards were sold to travel agents and intermediaries, who used them to buy domestic airline tickets. The gang was paid in cash or cryptocurrency, often in the form of Tether, police said. The cycle was repeated across multiple states, with callers deliberately avoiding customers in Delhi to avoid drawing scrutiny. In the crackdown, the police seized 52 mobile phones, dozens of SIM cards and sensitive customer data. Police identified the alleged ringleaders as Ankit Rathi, Waseem and Vishal Bhardwaj. Two call centre employees, Vishesh Lahori and Durgesh Dhakad, were accused of leaking customer information. Others arrested included operational handlers Rahul Vishwakarma, Pawan Bisht, Kailash Purohit, Himanshu Chugh and Ravin Saini, as well as finance operatives Akhilesh Lakhotia and Harsh Chauhan. Another man, Shivam Sehrawat, was accused of supplying SIM cards to the group. 'It is a matter of grave concern that sensitive data has been consistently leaked by employees of a major call centre,' Kumar said. He added that employees hired as far back as 2019 had been systematically leaking company data for years. 'This alarming breach not only exposes the company's inability to safeguard confidential information but also raises urgent questions about the adequacy of its security protocols and monitoring systems,' he said. 'Given that the call centre holds critical data of major banks in India, this breach represents a severe financial risk and positions the company as a significant source of data leakage leading to cyber financial frauds.'

Merely crying of woman cannot make out case of dowry harassment: Delhi HC
Merely crying of woman cannot make out case of dowry harassment: Delhi HC

News18

time14 minutes ago

  • News18

Merely crying of woman cannot make out case of dowry harassment: Delhi HC

Last Updated: New Delhi, Aug 17 (PTI) The Delhi High Court has held that mere fact that a woman was crying, cannot per se make out any case of dowry harassment. Justice Neena Bansal Krishna made the observation while dismissing a petition against the discharge of a husband and his family from charges of cruelty and dowry harassment. According to the prosecution, the woman, married in December 2010, faced harassment and dowry demands from her husband and in-laws. Her family claimed that they spent nearly Rs 4 lakh on the wedding, alleging that later demands for a motorcycle, cash, and a gold bracelet were made by the husband and in-laws. The woman, a mother of two daughters, died on 31 March 2014. 'Statement of the sister of the deceased under Section 161 Cr.P.C. was recorded wherein she also stated that on the occasion of Holi, she had called her sister and found her crying. However, merely because the deceased was crying, cannot per se make out any case of dowry harassment," the high court said. The trial court had discharged the accused noting that the death took place due to pneumonia, a natural cause. The high court also emphasised that the post-mortem report attributed the cause of death to pneumonia, not cruelty. 'In the present case, to bring in the clause of cruelty leading to the death of the woman, it may be noted that the deceased had died not because of any act of cruelty but for natural reasons… Therefore, Clause (a) to the Explanation annexed to Section 498A IPC is not attracted," the Court said. It also observed that the father of the woman neither mentioned specific incidents nor did he provide proof of giving money to the accused. 'Such bald assertions, in the given situation, cannot be held to be even making out a prima facie case of harassment," the judge added. PTI UK NB NB view comments First Published: August 17, 2025, 09:45 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

Elvish Yadav's Gurugram Home Firing: A Look At YouTuber's Controversies And Past Death Threats
Elvish Yadav's Gurugram Home Firing: A Look At YouTuber's Controversies And Past Death Threats

News18

time17 minutes ago

  • News18

Elvish Yadav's Gurugram Home Firing: A Look At YouTuber's Controversies And Past Death Threats

Gunmen allegedly opened fire at the Gurugram home of YouTuber Elvish Yadav on Sunday morning. Here's a look at other times he faced threats and controversies. Gunshots Fired At Elvish Yadav's Home: Unidentified gunmen allegedly opened fire at the Gurugram home of YouTuber and former Bigg Boss winner Elvish Yadav early Sunday, officials said. Police stated that the attack took place between 5:30 am and 6 am, when three men on motorcycles fired more than two dozen shots before fleeing the scene. This is not the first time that Elvish Yadav received threats. In 2023, the YouTuber's fans were left shocked when it was reported that the Bigg Boss OTT 2 winner received an extortion case for Rs 1 crore. He was in London when he received a long WhatsApp message from a person asking for Rs 1 crore or else they would kill him. A police complaint in the case was also filed and the accused were arrested. 'I filed a complaint late at night. It then made headlines. It spread like a fire. But we have very good police, they nabbed the man from Gujarat in just six hours. Policemen went there via flight and picked up that person. He was an RTO agent. He got my contact number from my car's registration," Elvish revealed later when he appeared on Bharti Singh and Haarsh Limbachiyaa's podcast. In 2024, the YouTuber and Bigg Boss OTT 2 winner was reportedly threatened during the Entertainers Cricket League in Delhi. He was scheduled to play against Munawar Faruqui. Reports say the two joked around before the match, but later Elvish allegedly received death threats for playing against Munawar. Officials evacuated the stadium to keep him safe. Fans were asked to leave, gates were sealed, and the match continued without an audience. Elvish Yadav Controversies Elvish Yadav has faced multiple controversies that drew widespread media attention. In November 2023, he was arrested under the Wildlife Protection Act for allegedly supplying snake venom at rave parties in Noida. Authorities seized nine snakes and 20ml of venom during the raid, with several individuals naming Yadav as the organiser and supplier. He was granted bail after eight days in custody. In March 2024, Yadav got into a physical confrontation with fellow YouTuber Maxtern (Sagar Thakur). He admitted to slapping Maxtern, explaining that the other YouTuber had allegedly threatened to 'burn" him and his parents alive. The incident sparked a heated debate across social media platforms. Elvish Yadav Shows Elvish Yadav is a YouTuber whose popularity multiplied after he participated in Bigg Boss OTT 2. While he emerged as the winner of the show, Abhishek Malhan was the first runner-up. In 2025, Elvish Yadav debuted as a gang leader on MTV's Roadies XX: Double Cross. Under his guidance, Kushal Tanwar, aka Gullu, won the show, taking home Rs 10 lakh and a Hero Karizma XMR bike. He also appeared as a contestant on Laughter Chefs 2. First Published: August 17, 2025, 09:43 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store