
Punjab Police arrest two in major crackdown on online child sexual abuse; 33 identified, 34 devices seized
Director General of Police (DGP), Punjab, Gaurav Yadav, said on Friday that the operation codenamed CSEAM-4 was carried out on Thursday and spanned 40 locations across 18 districts and three Commissionerates. The action followed cyber tip-offs from the Indian Cyber Crime Coordination Centre (I4C) under the Ministry of Home Affairs (MHA).
The two individuals arrested have been identified as Akash Babu, a resident of Rajasthani Colony in Khanna, and Harpreet Singh, a resident of village Burmajra in Morinda, Rupnagar.
DGP Yadav stated that the State Cyber Crime Cell meticulously analysed digital evidence from platforms such as WhatsApp, Facebook, Instagram, and Telegram to trace the offenders. During the operation, 33 suspects were identified throughout Punjab, and field teams were dispatched for coordinated raids. The operation led to the registration of two First Information Reports (FIRs) and the seizure of 34 mobile phones, all of which have been sent for forensic analysis to retrieve deleted content. More arrests are expected.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


India Today
10 minutes ago
- India Today
US military base shooting: Soldier suspected of firing on troops, taken into custody
At least five US soldiers were injured on Wednesday when a gunman opened fire inside a military base in Georgia. The site was placed under lockdown for a brief period after "casualties were reported." The injured soldiers were reportedly shot by another soldier at the base. The suspected shooter has already been taken into custody within half an hour of the incident occurred at Fort Stewart, the largest US military base east of the Mississippi River, which houses the Army's 3rd Infantry soldiers who were shot have been moved to the Winn Army Community Hospital for treatment, Fort Stewart said in a statement. A post on Fort Stewart's Facebook page told all personnel in the locked down area to 'stay inside, close and lock all windows and doors.' However, Fort Stewart has since stated that there is "no active threat to the community" following the shooter's enforcement responded to reports of a possible shooting in the 2nd Armoured Brigade Combat Team area at 10:56 am (local time), and the base was locked down shortly after 11:04 am. The suspected gunman was arrested at 11:35 am, Fort Stewart Brian Kemp wrote on X that he and his family were "saddened by today's tragedy" at the US Army has not yet revealed the seriousness of the injuries."We are keeping the victims, their families, and all those who answer the call to serve in our hearts and prayers, and we ask that Georgians everywhere do the same," he Donald Trump has been briefed on the shooting and is monitoring the situation, White House press secretary Karoline Leavitt said on Stewart is about 362 km southeast of Atlanta and 64 km southwest of Savannah with nearly 9,000 people living at the base, according to the 2020 base supports approximately 15,000 active-duty Army military personnel, as well as thousands of military retirees, family members, and others, according to its website.- EndsInputs from AP and Reuters


Time of India
18 minutes ago
- Time of India
Man nabbed with 566 fake currency notes
Ghaziabad: An assistant manager of a pharma company was arrested by Ghaziabad police on Wednesday on being found with fake currency with a face value of Rs 2.8 lakh. Indirapuram ACP Abhishek Srivastava said cops were conducting checks near Sahibabad railway underpass in Vasundhara's Sector 1 when they came upon Ujjwal Jha (26). A total of 566 counterfeit notes with face value of Rs 500 each was recovered from Jha, who is a resident of Delhi's Mandoli. Police said a case was registered under relevant sections of BNS, and necessary legal action was being taken. You Can Also Check: Noida AQI | Weather in Noida | Bank Holidays in Noida | Public Holidays in Noida "During Jha's interrogation, it was revealed that he met an unknown person on Facebook, who told him he would provide three fake currency notes for every real one. Five months ago, Jha purchased fake currency with a face value of Rs 30,000 with Rs 10,000 in real currency. Recently, he got fake notes with Rs 3 lakh face value in exchange for Rs 1 lakh. Police are now trying to identify this individual," Srivastava said. The ACP added that Jha had been circulating the notes to his contacts, taking real currency for fake notes with a face value of double the amount. A senior police officer said they had unearthed chats between Jha and others in which they were discussing the fake notes. They also found orders the accused had received. Police are checking Jha's call log details, social media chats and emails. A team has been formed to investigate the matter.


Time of India
43 minutes ago
- Time of India
Hyderabad techie loses Rs 67 lakh to crypto investment scam
Hyderabad: An IT employee from the city lost Rs 67 lakh to cyber fraudsters who ran a crypto investment scam through a fake website. The 39-year-old IT professional from Langer Houz alleged that he encountered cryptocurrency investment advertisements on Instagram. Upon clicking the link, he was added to Telegram and WhatsApp groups, where administrators advised him to invest in crypto trading through their portal in July 2024. The fraudsters utilised fake dashboards to demonstrate that the victim had made significant profits on his investments. The victim used his savings and obtained loans to transfer over Rs 67 lakh within a year through hundreds of UPI transfers to bank accounts in Karnataka, Jammu & Kashmir, Kerala, Gujarat, and Himachal Pradesh. You Can Also Check: Hyderabad AQI | Weather in Hyderabad | Bank Holidays in Hyderabad | Public Holidays in Hyderabad 'They allowed him limited withdrawals of about Rs 8 lakh to build trust before blocking access to the fake portal in the first week of July 2025. But bank accounts to which the amounts were transferred by the fraudsters were all blocked as the amounts were proceeds of the crime,' a cybercrime official said. Immediately after the victim initiated withdrawals, the accused abruptly deleted their social media groups and disabled the weblink in the first week of July. The victim also realised that his bank account, into which money had been credited by the fraudsters, was frozen on instructions from the Bengaluru cybercrime police. 'Not just my bank account, but even those of my wife and brother, to whom I had transferred some money, were also frozen by police, causing EMI defaults and credit-score damage,' the complaint stated. After trying to unsuccessfully re-establish communication with the fraudsters and talking to bank representatives about freezed accounts, the victim approached police on August 5. 'I also request you to unfreeze the three bank accounts,' the victim stated in his complaint on Tuesday. On his complaint, a case was registered under Sections 111(2)(b) (organised crime), 318(4) (cheating and dishonestly inducing delivery of property), 319(2) (cheating by personation), 336(3) (forgery for purpose of cheating), 338 (forgery of valuable security, will, etc.), and 340(2) (using as genuine a forged document or electronic record) of the BNS and the IT Act.