logo
Delhi School Bomb Threat Emails Were Sent From Germany? Exclusive From Investigators

Delhi School Bomb Threat Emails Were Sent From Germany? Exclusive From Investigators

News1816-07-2025
At least five schools in Delhi received bomb threats on Wednesday – Richmondd Global School, Dwarka, Vasant Kunj, Paschim Vihar, Hauz Khas
The origin of the bomb threat emails sent to Delhi schools on Wednesday, in the continuing series of such emails seen over the past year, has been traced to Germany, said investigators. However, they suspect the use of a Virtual Private Network (VPN) may have masked the actual location of the sender.
A senior official involved in the investigation told News18 that the IP address of Wednesday's emails indicates a German network, with the email account also linked to a Germany-based provider.
'It appears to be a network IP, possibly associated with a public place or network, though the exact location is still being verified," the official said. Similar indicators were found in threats sent to other schools as well.
At least five schools across the capital received fresh bomb threats today – Richmondd Global School (4.16 am), Dwarka (5.26 am), Vasant Kunj (6.30 am), Paschim Vihar (8.11 am), Hauz Khas (8.12 am).
The threatening message read: 'Good morning. Explosive devices are hidden inside backpacks and placed around the classrooms of the school. This is extremely serious. You will all pay for your sins."
The email also included a disturbing request to release certain withheld names to the media for publicity.
Cyber investigators believe that the email was sent using Tuta Mail (formaly Tutanota), a Germany-based encrypted email service which recently launched new encrypted protocal.
'Tuta Mail, which recently launched a post-quantum encryption protocol called TutaCrypt, was used to send these threats," said a senior government cyber investigator. 'Tuta is an open-source, end-to-end encrypted email platform with over 10 million users. The company is also working on secure, post-quantum cloud storage solutions for the German government."
Despite the technological barriers in tracing such messages, efforts are ongoing to identify the true source.
Bomb disposal squads, local police, and cyber forensics teams were immediately deployed to all affected schools. As of now, no explosives or suspicious materials have been found.
On Tuesday, St. Stephen's College and St. Thomas School had received similar threat emails, in the concerning trend of targeted hoaxes disrupting educational institutions across the city seen over the past year.
view comments
First Published:
Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

UP villagers expose fake vigilance raid, 4 held for extortion attempt
UP villagers expose fake vigilance raid, 4 held for extortion attempt

News18

time15 minutes ago

  • News18

UP villagers expose fake vigilance raid, 4 held for extortion attempt

Last Updated: Hathras (UP), Aug 1 (PTI) Residents of a village here thwarted a fake raid, overpowering four men allegedly posing as officials from the electricity department's vigilance team, police said on Friday. The group was extorting money from locals under the guise of inspecting power theft, police said. The incident took place in Farouli village on July 30. According to police, the accused arrived in a Bolero SUV bearing government plates and claimed to be part of an official electricity vigilance drive. When villagers asked to see identification, the men attempted to flee, raising further suspicion. Alert locals chased them down, detained them, and alerted authorities. Police said they have arrested all four individuals, who were later identified as residents of the Sasni area in Hathras district. Among them was the driver of the vehicle, Praveen Sharma, who had leased the SUV to the state power department. During interrogation, Sharma claimed, 'The raid was conducted on the instructions of a Sub-Divisional Officer (SDO) from the power department and that they were targeting homes with illegal electricity connections." However, the SDO in question, Om Prakash, denied any involvement and said no official inspection had been ordered. 'The vehicle was privately hired, and I had no knowledge of any such activity," the SDO told reporters. The local power department has launched an internal inquiry. Executive Engineer Abhinav Tiwari said that a committee has been formed to investigate whether any department staff were complicit. 'Anyone found guilty will face strict departmental and legal action," he said. The villagers, meanwhile, said the men had demanded bribes and threatened penalties. 'They told us they were from vigilance, but when we asked for ID cards, they tried to run. That's when we knew something was wrong," said one resident. Police say further arrests could follow based on the findings of the investigation. PTI COR KIS HIG HIG view comments First Published: August 01, 2025, 15:15 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

Bihar: Policemen, residents injured in stone-pelting incident in Muzaffarpur
Bihar: Policemen, residents injured in stone-pelting incident in Muzaffarpur

News18

time30 minutes ago

  • News18

Bihar: Policemen, residents injured in stone-pelting incident in Muzaffarpur

Agency: Muzaffarpur (Bihar), Aug 1 (PTI) Several policemen, including the station house officer (SHO) of Rajepur police station, and a number of local residents were injured in a stone-pelting incident during a religious procession in Bihar's Muzaffarpur district, officials said on Friday. The incident took place during the Mahaviri flag procession in Meenapur village under the jurisdiction of Rajepur police station on Thursday evening. Talking to reporters, Muzaffarpur SSP Sushil Kumar said, 'The incident took place when some troublemakers threw stones from rooftops at a procession, where a team of police officials was also present." 'Several policemen, including the SHO, and five to six local residents were injured. The injured were admitted to the nearest government hospital, and their condition is reported to be out of danger," he added. view comments First Published: August 01, 2025, 15:00 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

Falcon scam: ED attaches ₹18.14 crore worth properties
Falcon scam: ED attaches ₹18.14 crore worth properties

The Hindu

time39 minutes ago

  • The Hindu

Falcon scam: ED attaches ₹18.14 crore worth properties

The Directorate of Enforcement (ED) has provisionally attached twelve immovable properties worth ₹18.14 crore in connection with the ₹792 crore fraud allegedly orchestrated by Hyderabad-based Capital Protection Force Pvt. Ltd. and its director Amardeep Kumar. The attachment, made under the Prevention of Money Laundering Act, 2002, is part of an ongoing investigation into a bogus invoice discounting racket that duped hundreds of investors under the guise of high returns. The properties, attached on Wednesday (July 30, 2025), are held in the name of Amardeep Kumar, his family members, and two firms, Rhett Healthcare Pvt. Ltd. and Rhett Herbal Pvt. Ltd. According to the agency, the scam revolved around a scheme dubbed 'Falcon invoice discounting app', which promised attractive returns by purportedly financing business invoices. However, ED's probe has revealed there was no legitimate invoice discounting business at all. Instead, Amardeep Kumar allegedly developed and aggressively promoted the Falcon app through Google, YouTube and other social media platforms to solicit public investments. The entire scheme was a front, with investor money rerouted into a range of personal luxuries and corporate ventures, including equity investments, unsecured loans, casino spendings, and the purchase of a private jet. The ED pegged the total cheating amount around ₹792 crore, calling Amardeep Kumar the 'mastermind' behind the operation. The app served as the key tool for gathering deposits, while false promises of high returns masked the absence of any real business activity. Earlier in March, the ED had seized a 'Hawker 800A' aircraft allegedly bought by Amardeep Kumar using the proceeds of crime. That seizure came during a series of searches carried out on March 7, 2025. The money laundering investigation stems from three FIRs registered by the Economic Offences Wing, Cyberabad Police. These cases accused Kumar and his company of defrauding investors with promises of lucrative returns that never materialised. The ED said further investigation is ongoing.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store