logo
Rural SP sets up WhatsApp groups in over 2,200 villages

Rural SP sets up WhatsApp groups in over 2,200 villages

Time of India29-07-2025
Nashik: The Nashik Rural police, under the leadership of SP Balasaheb Patil, are rolling out a new initiative to strengthen ties with communities across the district.
They are creating WhatsApp groups for every village and urban ward, aiming to foster continuous communication with the residents.
Tired of too many ads? go ad free now
These dedicated groups will serve as a vital tool for the police to gather feedback directly from the citizens and disseminate important information and awareness messages on various issues.
SP Patil said that with over 2,200 villages in the rural district, a WhatsApp group is being established for each, as well as for urban wards. "Each group will be monitored by a police personnel who will not only get regular feedback, but also conduct in-person meetings with the residents.
This proactive approach will significantly contribute to maintaining law and order, as well as aid in crime prevention and detection," Patil said.
Each WhatsApp group will comprise 200 to 1,000 members, including villagers, the police patil and influential community figures such as teachers, lawyers, traders, and doctors. This direct engagement through WhatsApp is expected to bridge the gap between the public and the police.
Furthermore, these active members will effectively become the "eyes and ears" of the rural police, providing crucial local intelligence.
These groups will be useful for spreading information among people about different matters. "The process to form the groups has started and soon the entire rural district will be covered. The population of the rural district is approximately 50 lakh, covered by 40 police stations. A sizeable number of people in the rural district will thus be in contact with the police," Patil said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

DYFI launches protest against BJP tying rakhi on anganwadi students
DYFI launches protest against BJP tying rakhi on anganwadi students

New Indian Express

time6 hours ago

  • New Indian Express

DYFI launches protest against BJP tying rakhi on anganwadi students

THIRUVANANTHAPURAM: DYFI workers on Saturday took out a protest in front of the Varkala child development project officer's (CDPO) office after photos of BJP leaders tying rakhis on anganwadi children as part of the Independence Day celebrations went viral on social media platforms. Close to 25 protesters were arrested and later released, said a DYFI leader who alleged that the BJP and RSS leaders tied rakhis (a sacred thread tied on brothers by their sisters) to the students of 11 anganwadis. 'On August 14, the CDPO instructed the teachers through a WhatsApp voice note that rakhis should be tied to the students as part of the Independence Day celebrations. The rakhis, similar to those worn by Sangh affiliates, were tied to the hands of the children,' DYFI leader Lenin Raj told the TNIE. He said that six anganwadis in Elakamon, three in Idava, and two in the Varkala municipality conducted similar programmes on Wednesday. Adding that children, too, might have tied rakhis amongst themselves, the leader stated that DYFI sees the incident as an extension of the RSS saffronisation propaganda. However, the CDPO refuted the allegations. 'My instruction was to tie rakhis to children, as many of them loved making tricolour rakhis, and were urged to wear one,' she told the TNIE. The officer said that she forgot to mention the term 'tricolour' in the voice note, which she sent to the teachers, and called it a 'fault' from her side. Mentioning that the BJP leaders who tied these rakhis were the ward councillors, she said that no RSS leader was part of these programmes anywhere. 'I have no political interest in this,' she mentioned, adding that there will be only a maximum of five anganwadis where such an event happened. Meanwhile, BJP ward councillor Priya Gopan termed the controversy 'unwanted'. 'Who said that rakhi was part of RSS politics? There is no law that bans the tying of rakhis,' the Kannamba councillor told the TNIE.

Suspected terror operative detained in Dharmavaram
Suspected terror operative detained in Dharmavaram

Hans India

time10 hours ago

  • Hans India

Suspected terror operative detained in Dharmavaram

Dharmavaram: In a significant catch, the police in Dharmavaram town of Sri Sathya Sai district on Friday detained a man identified as Sheikh Noor Mohammad on suspicion of having links to Pakistan-based terror groups. The arrest comes close on the heels of authorities in Vizianagaram district foiling a terror plot by arresting a suspected sympathiser and his associate. According to Penukonda DSP Narasingappa, Noor, a cook at a local hotel in Kota Colony, was taken into custody for questioning following intelligence inputs. During a search of his residence subsequently, investigators reportedly seized 16 SIM cards and sent them for forensic examination. The authorities are analysing his social media accounts to uncover any connections to extremist groups. Police seized some 'radical literature' works also from Noor. Sources indicate that Noor is being interrogated about his links to previously arrested suspects and his potential role in supporting or facilitating extremist activities. The police are also examining his local contacts and financial transactions to determine the extent of his circles. 'He (Mohammed) only consumed content and got influenced but didn't execute any act or perhaps didn't get a chance. Training could have radicalised him...,' Dharmavaram in-charge sub-divisional police officer U Narsingappa told a news agency. According to the police, Noor is an Indian citizen and a native of Dharmavaram and his forefathers also belong to the same place, ruling out foreign origin concerns. Officials stated that the operation is part of ongoing efforts to dismantle terror sleeper cells and prevent extremist activities in Andhra Pradesh. Further arrests have not been ruled out. Police have booked Sheikh Noor Mohammad under provisions relating to sedition and charged him under sections of the Unlawful Activities (Prevention) Act (UAPA) for his alleged ties to terror outfits. Preliminary investigations revealed that Noor was an active member of numerous WhatsApp and Facebook groups associated with terrorist organisations, including Jaish-e-Mohammed. He is accused of posting on his social media handles provocative messages intended to radicalise and lure youth into extremist activities. Authorities confirmed that Noor's actions posed a serious threat to national security. He was to be produced before the Kadiri court later on Saturday. Further investigations are underway to trace Noor's network and determine the full extent of his involvement with terror groups.

Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info
Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info

Economic Times

time19 hours ago

  • Economic Times

Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info

ICE leak exposes major security flaw in manhunt communications after federal agents mistakenly added a private citizen to a live group chat meant for law enforcement. The civilian, stunned to receive real-time manhunt updates, unknowingly witnessed the kind of information that could compromise an investigation and endanger officers in the field. ICE leak exposes major security flaw in manhunt communications- The ICE leak is more than a bureaucratic slip-up—it's a flashing red warning light about how America's enforcement agencies handle sensitive operations. By relying on unsecured MMS group texts to coordinate a live manhunt, officials not only exposed private data but also undermined their own mission. A single mistaken phone number gave a civilian a front-row seat to a federal pursuit, complete with Social Security numbers and surveillance details that should never have left encrypted channels. In a moment when public trust in government data handling is already strained, this error shows that the real vulnerability isn't always hackers or foreign adversaries—it's the everyday shortcuts taken inside the system. On August 14, 2025, U.S. Immigration and Customs Enforcement (ICE) made a blunder that reads like a cybersecurity case study: officials accidentally added a private citizen to a sensitive group chat used during an active manhunt. The messages, sent through unencrypted MMS, contained information that should never have left secure law enforcement channels—Social Security numbers, DMV records, license plate reader hits, and even an internal ICE 'Field Operations Worksheet.' The civilian, who had no ties to law enforcement, initially assumed the texts were spam. That illusion shattered when an official document landed in their inbox. By then, the damage was done: private investigative details had been broadcast in real time to an unintended observer. Perhaps the most troubling detail is not the mistaken addition itself, but the platform. Instead of secure, agency-approved systems, ICE and its partners used a 'Mass Text' group chat via MMS—a technology widely regarded as insecure and outdated. Unlike encrypted platforms such as Signal or WhatsApp, MMS leaves data vulnerable to interception and, as this case shows, accidental exposure. This wasn't an isolated misstep. A 2023 Department of Homeland Security inspector general report flagged repeated use of 'informal digital workarounds' by federal officers, warning that reliance on consumer-grade messaging apps could lead to data breaches. The report predicted exactly this kind of incident. This mishap echoes the so-called 'Signalgate' scandal from March 2025, when a journalist was mistakenly added to a classified Signal chat involving national security officials. That breach revealed sensitive planning discussions, and congressional hearings soon followed. Both cases highlight a troubling pattern: even elite agencies often default to tools of convenience, not security. Former NSA cybersecurity analyst Susan Hennessey told The Daily Beast that these repeated lapses 'erode operational security and public trust in equal measure.' It's easy to dismiss the ICE group chat error as human clumsiness, but the implications are serious. A wrong recipient in a group chat can mean: Compromised investigations – revealing manhunt details risks tipping off suspects. – revealing manhunt details risks tipping off suspects. Data privacy violations – exposing Social Security numbers and DMV records violates federal data handling laws. – exposing Social Security numbers and DMV records violates federal data handling laws. Operational safety risks – even field agents could be endangered if details about tactics leak. When government agencies mishandle data, the public doesn't just see incompetence—it questions whether other investigations are equally vulnerable. For ordinary Americans, the incident raises a pressing question: If ICE can't safeguard its own communications, how secure is the personal data it collects from millions of immigrants and residents each year? ICE oversees vast databases of biometric and identity information. A slip in protocols, as this case proves, can expose sensitive records to unintended parties instantly. Legally, ICE may now face scrutiny under the Federal Information Security Management Act (FISMA), which mandates strict controls over government data. Lawmakers, already critical of ICE's surveillance practices, are expected to push for hearings. So far, ICE and the U.S. Marshals Service have declined public comment. Internally, sources say reviews are underway, but there's no indication of disciplinary action or whether the civilian recipient of the messages will be asked to testify. The central issue remains: why, in 2025, is one of America's most powerful enforcement agencies still leaning on unsecured group texts to coordinate manhunts? Until that is answered, every American has reason to wonder how many other 'wrong numbers' have already gone unnoticed. For now, a civilian with no security clearance has seen more of ICE's operational playbook than Congress itself—a sobering reminder that the weakest link in national security is often the simplest human mistake.Q1: What happened in the ICE group chat leak? ICE accidentally added a civilian to a sensitive manhunt group chat, exposing private data. Q2: Why is the ICE leak considered a major security flaw? Because sensitive information was shared over unsecured MMS instead of encrypted platforms.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store