
Body Of Missing Briton Found In Lift Shaft In Malaysia
Jordan Johnson-Doyle, 25, was last seen on May 27 at a bar in an upmarket suburb in the capital, sparking a police probe and a frenzied search by his parents.
Police on Wednesday afternoon "received information that a man was found lying on his back in the lift (shaft) on the ground floor of a (building) construction site," Kuala Lumpur police chief Rusdi Mohd Isa said in a statement.
Fire and rescue services recovered the body, which was sent for a post-mortem, he added.
"The results found that the cause of death was a chest injury sustained from a fall from height," Rusdi said.
"No criminal elements were found at the scene and the case has been classified as a sudden death report," he said, adding the body was identified by the victim's uncle based on a tattoo.
Brickfields district police chief Ku Mashariman Ku Mahmood confirmed to AFP that Johnson-Doyle was identified as the victim.
Johnson-Doyle, a software engineer, was last seen on May 27 in the bustling Bangsar district, known for its nightlife, trendy bars and cafes.
Johnson-Doyle's mother, Leanne Burnett, 44, told the Free Malaysia Today news website that her husband had travelled to Kuala Lumpur to look for their son, adding that the family was "distraught" over his disappearance.
Local reports said Johnson-Doyle was on a solo backpacking trip around Southeast Asia when he disappeared.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
20 minutes ago
- Time of India
Punjab Police arrests two Babbar Khalsa International operatives
Punjab Police on Thursday claimed to have foiled a major terror plot orchestrated by Pakistan-based Babbar Khalsa International (BKI) operative Harwinder Singh Rinda with the arrest of two persons. Independence Day 2025 Before Trump, British used tariffs to kill Indian textile Bank of Azad Hind: When Netaji gave India its own currency Swadeshi 2.0: India is no longer just a market, it's a maker The accused, who are also BKI operatives, were actively conspiring to target government establishments using grenades, Director General of Police Gaurav Yadav said. "Acting on specific intelligence inputs, Counter Intelligence , #Ferozepur successfully foiled a major terror plot orchestrated by Harwinder Rinda, a Babbar Khalsa International (BKI) operative based in #Pakistan and backed by Pakistan's ISI and apprehends two operatives of BKI, working under the directions of #UK, # USA, #Europe based handlers," Yadav said on X. Police recovered two hand grenades and one Beretta 9mm pistol with live cartridges from the accused, he said.


Time of India
20 minutes ago
- Time of India
Former employee arrested for Rs 50 lakh extortion attempt in east Delhi
Delhi Police have arrested a 28-year-old former employee for allegedly attempting to extort Rs 50 lakh from his ex-employer, a businessman based in Gandhi Nagar, east Delhi. The accused, identified as Pawan alias Praveen , was apprehended in Shahdara following a complaint and subsequent investigation. Independence Day 2025 Before Trump, British used tariffs to kill Indian textile Bank of Azad Hind: When Netaji gave India its own currency Swadeshi 2.0: India is no longer just a market, it's a maker According to police, Pawan was inspired by a movie and threatened to falsely implicate the businessman by alerting the Income Tax department , accusing him of hoarding black money. He reportedly sent a series of threatening messages and calls, demanding payment in exchange for silence. Businessman targeted through anonymous WhatsApp messages by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like 15 Most Gorgeous Women, Ranked BigGlobalTravel Undo The complaint was filed by a businessman living in Surajmal Vihar. He told police that on July 12, he received a WhatsApp message from an unknown number threatening to file a tax complaint unless he agreed to meet and resolve the matter. The businessman ignored the message and subsequent calls. On August 1, he received similar threats from a second number. The sender claimed to have detailed knowledge of the victim's business operations and family. The accused demanded Rs 50 lakh and warned of serious consequences if the payment was not made. Live Events Accused tracked using digital surveillance tools Deputy Commissioner of Police (Shahdara) Prashant Gautam assigned a team under the SHO of Vivek Vihar to investigate the case. Officers used technical surveillance methods, including call detail and IP record analysis, to identify the suspect. The investigation led police to Pawan, a resident of Jhilmil Industrial Area. He was arrested, and the mobile phone used in the extortion attempt was recovered. During questioning, Pawan confessed to planning the scheme, stating he had worked for the businessman five years ago as a salesman and chose him deliberately. He admitted his intention was to make quick money. A case has been registered, and further inquiries are underway to verify all aspects of the incident.


Time of India
20 minutes ago
- Time of India
Illegal betting app: ED freezes Rs 110 cr worth bank funds; seizes 1,200 credit cards
Funds worth Rs 110 crore kept in mule bank accounts have been frozen and 1,200 mule credit cards were seized following recent searches against the Indian operations of a Cyprus-based "illegal" online betting platform named Parimatch , the Enforcement Directorate said on Thursday. Independence Day 2025 Before Trump, British used tariffs to kill Indian textile Bank of Azad Hind: When Netaji gave India its own currency Swadeshi 2.0: India is no longer just a market, it's a maker Parimatch app, as per the federal probe agency, gained visibility in the country through "aggressive" marketing, including sponsorship of sports tournaments and partnerships with well-known celebrities. It is alleged to have cheated investors luring them with high returns and generating more than Rs 3,000 crore in a year. "They also set up Indian entities to run surrogate advertisements under the names 'Parimatch Sports' and 'Parimatch News'. Payments to these agencies were made via foreign inward remittances," the Enforcement Directorate (ED) said in a statement. The agency had conducted searches at 17 locations in Mumbai, Noida, Jaipur, Surat, Madurai, Kanpur and Hyderabad on August 12 as part of a case registered under the Prevention of Money Laundering Act (PMLA) against the operations of Parimatch. The ED case stems from an FIR filed by the cyber police station of Mumbai Police against for "duping" users through online betting. Live Events The agency said funds worth about Rs 110 crore kept in various bank accounts belonging to persons/entities used as mule accounts (bank accounts used for money laundering and similar criminal activities) and/or for "layering" purposes were frozen. More than 1,200 mule credit cards, found in a single premises during the searches, have also been seized, it said. Describing the alleged modus operandi deployed by the betting platform, the ED said it routed users' fund through mule accounts using different strategies across the country. In one case, it said, funds deposited by users into mule accounts were withdrawn in cash in a specific locality in Tamil Nadu. This cash was handed over to hawala operators, who used it to recharge virtual wallets of a UK-based company. These wallets were used to buy cryptocurrency in the name of mule crypto accounts, which were actually operated by Parimatch agents, it alleged. In western India, the ED said, Parimatch engaged services of domestic money transfer (DMT) agents. Funds collected in mule accounts controlled by these DMT agents were sent to Parimatch agents through payments made by mule credit cards. The ED said it found that payment companies whose application for payment aggregator licences were rejected by the RBI offered their services to Parimatch in garb of technology service providers (TSPs) and offered their API (application programming interface) to facilitate user fund collections. "These TSPs offered the API to Parimatch agents who onboarded mule accounts opened in the name of e-commerce companies and payment solution provider companies for collection of funds from users," the ED probe found. The money so collected through UPI transfers was "layered" and transferred out in the garb of e-commerce refunds, chargebacks, vendor payments etc. effectively "concealing" the actual flow and purpose of funds, it said.