
7-day remand for trio linked to Cyberjaya varsity student's murder
Published on: Friday, June 27, 2025
Published on: Fri, Jun 27, 2025
By: FMT Reporters Text Size: The three suspects were remanded at the Sepang sessions court this morning. (Facebook pic) PETALING JAYA: The three suspects arrested in connection with the murder of a 20-year-old university student in Cyberjaya have been remanded for seven days until July 3. The remand order was issued by sessions court judge Azaraorani Abdul Rahman this morning, Berita Harian reported. Police arrested the trio – a man and two women aged 19 and 20 – around Johor Bahru, Johor, and Gemencheh, Negeri Sembilan, between 9am yesterday and 2am today. Sepang police chief Norhizam Bahaman said all three suspects were known to the victim, University of Cyberjaya student Maniishapriet Kaur Akhara, who was found dead in her condominium unit by a friend at about 10am on June 24. She was staying in the room with five other students, but her housemates had reportedly returned to their hometowns for the holidays on June 21. An autopsy identified her cause of death as blunt force trauma to the head. Police said there were no signs that her residence had been broken into, and that she had not suffered injuries consistent with rape. * Follow us on our official WhatsApp channel and Telegram for breaking news alerts and key updates! * Do you have access to the Daily Express e-paper and online exclusive news? Check out subscription plans available.
Stay up-to-date by following Daily Express's Telegram channel. Daily Express Malaysia

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Star
21 minutes ago
- The Star
Ukraine says it hits four warplanes in Russia's Volgograd region
(Reuters) -Ukraine's military said on Friday it had struck four warplanes at an airbase in central Russia's Volgograd Region as part of a drive to hit Russian war assets. In a post on the Telegram messaging app, the military said it had hit four Su-34 aircraft at the Marinovka base outside the city of Volgograd, some 900 km (550 miles) from the Ukrainian border. The post said the operation was conducted by the military's special operations branch, together with the SBU security service and other services of the military. "According to preliminary information, four aircraft were hit, specifically SU-34 planes, as well as technical-operational facilities where different warplanes are serviced and repaired," the statement said. There was no immediate comment from the Russian military. Ukraine has engaged in a number of long-range operations against military targets in recent months -- industrial, energy and other sites. Earlier this month, the Ukrainian military carried out a major strike, dubbed "Operation Spider's Web," in which large numbers of long-range Russian bombers were hit at several Russian airbases far from Ukrainian territory. The latest statement said the damage caused by the strike on Marinovka was being assessed. It described the Su-34 as Russia's main aircraft used in bombing raids on Ukrainian territory, deployed in particular for launching guided bombs, used increasingly in attacks on Ukrainian cities. (Reporting by Ron Popeski; editing by Diane Craft)


The Star
5 hours ago
- The Star
Jail for Singaporean man, the ‘second in command' of illegal operation of cross-border crypto transactions
SINGAPORE (The Straits Times/ANN): From its premises in Geylang, a team operated an illegal business buying and selling large amounts of foreign currency and cryptocurrency. Between Feb 1 and 23, 2023, the team provided cross-border money transfer services involving Singapore and foreign currencies of at least $35 million in value over no fewer than 430 transactions. Following a police raid on the premises on Feb 23, 2023, the mastermind behind the operation, Singaporean Low Han Chuan, 44, fled the country. On June 26, Javiour Chia Kit Hou, 34, whom the prosecution described as the second in command, was sentenced to 10 months' jail. He had pleaded guilty earlier to one charge of abetment of the provision of an unlicensed payment service. Deputy public prosecutors Shamini Joseph and Kiera Yu said that at some point, before June 2021, Low was introduced to a director of Sir Money Changer, a family-run company. Low expressed an interest in starting his own money-changing and remittance business, and, after a discussion, the director agreed to let Low operate his business autonomously under Sir Money Changer's name from its premises at 12 Lorong 1 Geylang in exchange for $14,000 monthly. Low would hire his own staff and pay their salaries, and while the contributions to the staff's Central Provident Fund accounts would be paid by Sir Money Changer, Low would have to reimburse it. He was also required to record and submit the money-changing and remittance transactions performed at the Geylang premises to Sir Money Changer so that annual accounting returns could be filed together. Low began business operations on the premises in September 2021. While he used Sir Money Changer's name, he conducted his own business involving illegal cross-border money transfer services from the Geylang premises independently and without oversight from Sir Money Changer. He did not have a licence from the Monetary Authority of Singapore (MAS) that allowed him to carry on such a business, and he was not an exempt payment service provider. Low, who masterminded the operation and procured customers, was generally not physically present at the premises. To run his business daily, he employed Chia; Malaysian Ho Jia Yi, 26; Singaporeans Peh Kian Tat, 46, Jacky Lim Teck Leng, 27, and Ng Yang Kai Don, 24, who is his nephew; as well as an unidentified person known as Vera. Between September 2021 and February 2023, the crew operated the business of buying and selling large amounts of foreign currency and the USDT cryptocurrency. Chia, who had a monthly salary of about $3,500, led the team and executed the daily operations of the business. He would assign roles and responsibilities to the team, relay Low's instructions, procure customers for the business, execute the transfer of USDT, and supervise the recording of the transactions. When a customer engaged the team's services, a group chat would be set up on WhatsApp or Telegram to facilitate communication between the team and the customer. The team members were given work phones with a Cambodian number, which they used to communicate on the group chat. Using the chat, customers would indicate the amount they wished to remit and the currency to be sent to the receiving bank account or intended recipient. The team would then provide the buying or selling rate, and the amount that would be transferred to the recipient in the intended currency. The customer would then agree to the deal or not. After a deal was confirmed, the team would coordinate between its network of overseas and local agents to perform the remittance transaction by either transferring or receiving cash, or processing transfers to the recipients' bank accounts. Once the transaction was completed, members of the team would record the details of the transaction in a spreadsheet, including the customer alias, the date of transaction, the amount and currency involved, and the conversion rate. The prosecutors said the team did not carry out any know-your-customer or proof of funds checks or file cash movement reports despite being aware of the regulatory requirements to do so. On Feb 21, 2023, a 58-year-old woman made a police report stating that she was a victim of a police impersonation scam and had been deceived into transferring at least $200,000 to two bank accounts. Investigations revealed that $90,000 of the money was withdrawn by a 23-year-old Singaporean man who traded in cryptocurrency and was a member of a Telegram group chat along with Chia. It was found that Chia had advertised cryptocurrency services on the group chat and the 23-year-old man had reached out to him to buy USDT. The man was instructed to deliver the $90,000 in cash to the premises in Geylang, and received the USDT in his cryptocurrency wallet. As a result of this transaction, investigators discovered the operations on the premises and arrested Chia, Peh and Ho. Ng left Singapore on the same day to meet his uncle, and they both travelled to Cambodia. Ng eventually returned to Singapore some time around June 1, 2023, while Low remains at large. The prosecution asked the court to sentence Chia to between 10 and 12 months' jail. They said there was a high level of sophistication in the operation, that Chia knew a licence was required by MAS and that he had obtained personal financial gain from the offence. Chia's lawyers, Jeremy Pereira and Matin Razak of Withers KhattarWong, asked for a sentence of between seven and eight months' jail. They said their client had been given an active role by Low in managing the operations as he was the only employee with a diploma working there, and he was good with numbers. They said: 'It is clear that (Low), Javiour's employer, was the mastermind behind the entire scheme, not Javiour. 'Although Javiour oversaw the daily operations of the business, he acted purely on (Low)'s instructions.' Chia could have been fined up to S$125,000, jailed for up to three years, or both. - The Straits Times/ANN


New Straits Times
6 hours ago
- New Straits Times
Factory manager loses RM300,000 to love scam
GEORGE TOWN: An analysis manager at a factory in Bayan Baru, here, lost RM300,000 after falling victim to a love scam through social media. Penang Police deputy chief Datuk Mohd Alwi Zainal Abidin said the incident began when the 45-year-old woman became acquainted with a man claiming to be an American citizen via Facebook in November last year. He said not long after, they started communicating via WhatsApp after the man allegedly expressed a desire to pursue a serious relationship with the victim. "The suspect introduced himself as a businessman in the field of information technology (IT), claiming to be operating a business in a foreign country. "After a month of getting to know one another, the suspect told the victim that his bank account had been frozen in that country and asked for her help to make payments for the delivery of important stock related to his business," he said in a statement today. Mohd Alwi said the suspect promised to repay the money and even offered additional payment as a token of appreciation to convince the victim. Lured by the online romance and trusting the suspect, the woman then made 16 transactions to five different bank accounts between Dec 12 and 14, 2024. However, the victim realised that she had been scammed when the suspect asked for more money, allegedly to cover his travel expenses to visit her in Malaysia. He also sent her a tampered photo of a passport. Mohd Alwi said the woman lodged a police report at the Barat Daya police headquarters yesterday. The case is being investigated under Section 420 of the Penal Code for cheating. – Bernama