
Now police officers in UT to use E-Beat app on phones to boost community policing
The new upgraded android phones will allow the e-beat officers to work efficiently, by using the application to manage data in their field. The application will have all the information related from the important institutions in the area, to the profile of the criminals, who have been released from jail, and have moved back to their houses, SSP Kanwardeep Kaur said.
Developed by the National Informatics Centre (NIC), the E-Beat app aims to bring the police closer to citizens — both on the streets and on their phones. With real-time features designed to reduce response time, improve accountability, and streamline grievance redressal, the app empowers residents to locate their nearest police station, identify their designated beat officer, and lodge complaints or service requests directly — all routed in real time to the concerned Station House Officer (SHO).
The SHO, in turn, can assign duties digitally to individual beat officers, ensuring better oversight and faster follow-up. In emergencies, responders will receive alerts via the app alongside 112 calls, allowing beat officers to provide simultaneous, on-ground assistance — particularly vital in sensitive situations involving women, children, or urgent public safety incidents. 112 is integrated with the E-Beat app, ensuring the nearest beat officer gets immediate alerts, a police official said.
Beat and head constables will digitally record incident details and updates, while investigating officers will manage case progress within the platform. The centralised data — stored on a flagship server — enables senior police leadership to analyse crime trends, assess staff performance, and strategise resource deployment more effectively.
Previously, incident records were maintained manually, leading to duplication and delays. The earlier app only supported digital data entry, but lacked real-time updates and analytics. The E-Beat overhaul eliminates paperwork, distribution issues, and legacy inefficiencies, police said.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
3 hours ago
- Time of India
Techie's manager blackmails him into building website amid his mother's illness: ‘Suffered months of unpaid work'
What started as a dream job quickly became a nightmare when an employee was forced by his team leader to work on his personal project without any compensation. Taking to the Indian Workplace subreddit, the engineering graduate shared his ordeal. Initially, he wrote, things seemed to be going well until this team leader, who had a notorious reputation for laziness and scheming behavior, was transferred into his department. No one in the office appreciated this individual—neither colleagues nor subordinates had a good word to say about him. Unfortunately, the employee had to report directly to this man, and that marked the beginning of his situation deteriorated rapidly when the manager learned that the employee had web development skills. One day, he pulled the young professional aside and instructed him to create a website for his personal venture. At the time, the employee was working at a BPO, earning a modest Rs 26,000 a month, all while caring for his terminally ill mother. Financially dependent on every rupee, he had no option but to comply when his manager used veiled threats to make him take on the unpaid task. The manager purchased a domain name and left the entire responsibility of designing, building, and launching the website to his subordinate—without offering any form of his mother's health continued to worsen, the employee found it increasingly difficult to juggle both his job and the additional workload. He tried several times to explain that he could no longer continue building the website and even offered to return the money spent on the domain. Yet, his manager remained indifferent and demanded the task be completed, even as the employee was shuttling his mother between his mother—his only living family member—passed away. Devastated and caught up in dealing with grief and legal affairs, he resigned from his position. Still, his ex-manager persisted, calling regularly to pressure him about the website. Once the employee managed to sort out his personal life, he decided to honor the unfinished promise and completed the website—pulling an all-nighter at the manager's the requests didn't end there. Now the manager demanded mobile applications—both iOS and Android versions. The employee pointed out that such requirements should have been made known earlier so that he could have developed everything using a cross-platform approach. Instead of acknowledging the oversight, the manager dismissively responded that he'd 'figure it out.'Exhausted and frustrated, the employee finally asked to be paid for his labor. He quoted a modest Rs 12,500—Rs 7,000 for time spent and Rs 5,500 for continued support—an amount far below market value but one that would at least acknowledge his unpaid effort. In response, the manager offered a mere Rs 2,000."After months of mental harassment, threats, coercion, and unpaid work. When I told him he'd exploited me, he said he'd pay the full amount in 'installments' over two or three months. I know that's just another excuse to avoid paying anything..." he employee, however, wasn't helpless. He had collected more than 60 pieces of evidence, including recorded calls, WhatsApp chats, and screenshots of the work at a crossroads, the former employee is contemplating his next move. Options include escalating the matter to the company's senior leadership or HR, issuing a formal legal notice, or exposing the entire ordeal to the public. Although he has moved on and started rebuilding his life—now working as a full-stack developer after finishing his degree—the experience left emotional employee expressed feeling bitter and broken after such inhumane treatment, especially during a time when he was vulnerable and grieving. He now advises others in toxic work settings to document every interaction meticulously. In his view, exploitative managers seldom think twice before taking advantage of the Reddit community was shocked by the insensitivity the story revealed. One commenter expressed disbelief over how heartless some corporate employees could be—especially those who continue to pile on demands even after initial tasks are completed. Another user shared their own experience with a toxic director who had tried to sabotage their career. That user left quietly and eventually found a much better job with a kind boss. Ironically, the toxic manager from that story was recently fired.
&w=3840&q=100)

Business Standard
4 hours ago
- Business Standard
CCI widens antitrust probe against Google in online ad tech segment
Search giant Google's run-in with India's competition watchdog appears to be intensifying. The Competition Commission of India (CCI) has expanded its investigation into the company's alleged anti-competitive practices in online advertising, based on a complaint filed by the Alliance of Digital India Foundation (ADIF). In an order passed on 1 August, the CCI said it would club the present matter with the ongoing investigation in similar cases. 'The DG is directed to investigate the various alleged practices of Google in online advertising services and/or AdTech intermediation services and submit a consolidated investigation report in the matter accordingly,' the order stated. Google, in a statement, said: 'We are reviewing the CCI's orders. We welcome the CCI's decision to dismiss one part of the complaint. We remain confident that our ongoing work with the CCI will affirm that Google's advertising practices have consistently benefited advertisers, publishers, and users, and are fully compliant with competition law.' The complaint outlined Google's dominant position and alleged abusive conduct in both the online search advertisement and online display advertisement markets. ADIF contends that Google's control over major online platforms, coupled with the fact that it derives 97 per cent of its revenue from advertising, has led to practices that 'stifle competition and adversely affect Indian businesses.' The CCI has been investigating Google since 2021, following cases filed by the Digital News Publishers Association. Two additional cases were subsequently filed. Google's tussles with Indian authorities have increased in recent years. In 2022, the CCI fined Google ₹936 crore for abusing its dominant position through its Play Store policy. The company was also fined ₹1,337.76 crore for its conduct in the Android mobile device ecosystem.


NDTV
5 hours ago
- NDTV
After Pahalgam Attack, 21 Terrorists Killed In 6 Separate J&K Encounters
New Delhi: Following the Pahalgam terror attack on April 22, counter-terror operations by security forces have led to the killing of 21 terrorists in six separate encounters across Jammu and Kashmir. The operations, carried out jointly by the Indian Army, Central Reserve Police Force (CRPF), Border Security Force (BSF), and Jammu and Kashmir Police, targeted both foreign and local terrorists. Twelve of the terrorists were Pakistani nationals, while nine were local recruits. According to intelligence sources, the overall number of active local terrorists in Jammu and Kashmir has dropped following these operations. Breakdown Of Operations And Terrorists Operation Akhal: Kulgam Encounter The most recent operation, codenamed Operation Akhal, was conducted in Kulgam nearly 70 km from Srinagar. It resulted in the elimination of three Lashkar-e-Taiba (LeT) terrorists: 1. Zakir Ahmed Gani - Resident of Kulgam. Joined Lashkar-e-Taiba on September 29, 2023. 2. Adil Rehman Dentu - Resident of Sopore. Joined LeT on March 5, 2021. Classified as a Category-A terrorist. 3. Harish Dar - Resident of Pulwama. Joined LeT in June 2024. Listed as Category-C terrorist. Security forces said that this group had recently been reactivated for local recruitment and planning logistical support for cross-border infiltrators. Encounter 1: Sambha Sector - Jaish-e-Mohammed Module In an encounter in the Samba district, BSF troops eliminated seven Jaish-e-Mohammed (JeM) terrorists, all Pakistani nationals. This encounter was one of the most lethal for the JeM network in recent months. Their identities have not yet been disclosed by officials pending further verification through forensic and biometric analysis. Encounter 2: Shopian's Kellar Forest - Lashkar-e-Taiba Cell Neutralised Three key LeT terrorists were killed in a dense forested area of Shopian district: 1. Shahid Kutte - Resident of Chotipora Heerpora, Shopian. A Category-A terrorist who joined LeT on March 8, 2023. Kutte is accused in the 2024 resort shooting case in Shopian that injured two German tourists and a local driver. He is also an accused in the 2024 assassination of a BJP sarpanch in Herapora and the killing of a Territorial Army jawan in Kulgam this February. 2. Adnan Shafi Dar - Resident of Vanduna Melhora, Shopian. Joined LeT on October 18, 2024 and a Category-C terrorist. He was responsible for the murder of a migrant labourer on the day of his induction. 3. Aamir Bashir - From Shopian. A member of The Resistance Front (TRF), a front outfit of LeT, and a Category-C terrorist. TRF had claimed responsibility for the Pahalgam attack. Encounter 3: Tral Forest - Jaish-e-Mohammed Module Another operation took place in the Tral forest area, eliminating three militants of Jaish-e-Mohammed, all from Tral: 1. Asif Ahmed Sheikh - District Commander of Awantipora. Category-C. Active from April 18, 2022. 2. Aamir Nazir Wani - Active since April 26, 2024. Category-C. 3. Yawar Ahmed Bhatt - Active since August 26, 2024. Category-C. These terrorists were reportedly involved in reactivating sleeper cells in southern Kashmir. Encounter 4: Mulnar Village - Operation Mahadev Three Pakistani LeT terrorists were killed in Mulnar village under Operation Mahadev: Sulaiman, Afghan and Jibran. Home Minister Amit Shah, addressing the Rajya Sabha on Wednesday during a debate on Operation Sindoor, confirmed that the three terrorists eliminated in Operation Mahadev were the same individuals who carried out the Pahalgam massacre. Encounter 5: Poonch - Operation Shivshakti Under Operation Shivshakti, two Pakistani LeT terrorists were killed in the Poonch region. While their names have not been publicly disclosed, officials confirmed they were infiltrators who recently crossed over from Pakistan-occupied Kashmir (PoK). Current Active Local Terrorists According to intelligence sources, a handful of remaining local operatives still active: 1. Ahsan Ahmed Shaikh - Pulwama. LeT affiliate. Active from June 24, 2023. Category-C. 2. Asif Ahmed Khande - Shopian. Joined Hizbul Mujahideen in July 2015. Category-A. 3. Naseer Ahmad Wani - Shopian. LeT. Active from November 30, 2019. Category-C. 4. Zubair Ahmed Wani alias Abu Ubaida alias Usman - Anantnag. Hizbul Mujahideen Chief Operational Commander in Anantnag. Active since April 19 2018. Category A+. 5. Aaron Rashid Ganai - Anantnag. Travelled to PoK in 2018, returned to South Kashmir in June 2021. Affiliation unclear. 6. Adil Hussain - Anantnag. LeT member. Further details awaited. UN Security Council Mentions TRF The United Nations Security Council (UNSC), for the first time, officially identified The Resistance Front (TRF) in a sanctions monitoring report as responsible for the terror attack in Pahalgam. The report explicitly cited TRF's claim of responsibility for the attack that left 26 people dead. This is the first time TRF, a proxy group linked to the Pakistan-based LeT, has been named in any formal United Nations document. The report's inclusion of TRF happened despite strong diplomatic resistance from Pakistan. According to the Monitoring Team report, five terrorists launched the attack in Pahalgam on April 22. On the same day, TRF claimed responsibility and also published a photograph of the attack site. The group repeated its claim on April 23 but retracted it on April 26. No other group stepped forward to claim the attack. Despite this retraction, the report notes that at least two member states informed the UN sanctions team that the attack could not have occurred without the support of Lashkar-e-Taiba. One member state explicitly said TRF and LeT were synonymous. A third member state, however, disagreed, claiming that LeT was now defunct. In the aftermath of the Pahalgam attack, India launched Operation Sindoor, targeting terror infrastructure in Pakistan and Pakistan-occupied Kashmir (PoK). The inclusion of TRF in the UN report comes against the backdrop of Pakistan's attempts to manipulate language in official UNSC documents. Pakistan's Foreign Minister had boasted in the Pakistan National Assembly about achieving this retraction. The Monitoring Team's report now directly contradicts that claim and restores the reference to TRF in the official UN record.