
Sex trafficking rescues decline, social workers worried
Goa police recorded five rescues of sex trafficking victims across the state this year as of June, with police's nodal agency for such missions saying that efforts have been flagging over the years.
The agency, the Vasco-based Anyay Rahit Zindagi (Arz), said that proactive measures to help women trapped in the flesh trade have been missing.
Arz director Arun Pandey said, 'Over the past couple of years, the volume of rescues made by police has gone down. You cannot conduct raids and rescues from the police station.'
Pandey said, 'You need to put in the legwork and identify the areas where the trafficking business is taking place.'
He said that in 2024, police logged eight rescues across the state, fewer than in 2023, which saw 25 rescues. He said the rescues numbered 19 in 2022, sliding from 39 in 2021.
Twenty rescues occurred in 2020, falling from 51 in 2019, Pandey said.
He said that to combat sex trafficking, active measures are necessary to curb the demand and choke the supply. 'An intervention must be made focused on the traffickers,' he said.
Sponsored Links
Sponsored Links
Promoted Links
Promoted Links
You May Like
Beyond Text Generation: An AI Tool That Helps You Write Better
Grammarly
Install Now
by Taboola
by Taboola
'They induce the demand; hence there's supply.'
Citing a report published by the Goa State AIDS Control Society in 2024, Pandey said that at least 6,000 women of Goan origin and 3,000 women from outside Goa are currently involved in commercial sexual activities in the state.
He emphasised the need to re-ignite the discussion on the anti-trafficking bill so that a consolidated effort — involving the NGOs-govt collaboration — can be launched to tackle the menace.
'A new concerning threat is the emergence of Goa as a source state for trafficking for the purpose of labour exploitation,' Pandey had told
TOI
earlier. Agents spread across the state have developed a wide network through which they approach vulnerable girls and women looking for a better paying job.
'The agents usually seek targets who are technologically proficient and can navigate communications online,' Pandey had said.
'The targets mostly do not meet the agent and receive instructions and money online.'
The agent promises them good pay, mostly as domestic workers in countries such as Bahrain and the UAE. They ensure that the targets receive their visas and passports swiftly and facilitate their medical tests and other formalities required to enter another country. But there have been cases when the promised job turns out to be bonded labour in unforgiving conditions.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Indian Express
13 minutes ago
- Indian Express
Eight of gang that kept Gandhinagar doctor under ‘digital arrest' for 103 days, cheated her of Rs 19.24 crore, held: Police
A few weeks after they placed a Gandhinagar-based doctor under 'digital arrest' for 103 days, threatening her into handing over Rs 19.24 crore to them, eight members of a gang of alleged conmen have been arrested, the State Cyber Crime Cell of the CID said on Friday. The accused have been identified as Yashpalsinh Bharatsinh Chauhan (24), Naaz Ibrahim Razsumra (23), Nilesh Jaman Raank (32), Jaydev Bankesh Nirmal (20), Ameer Hussain Anwar Manek (21), Shabbir Hanif Samvat (23), Rashid Ramzan Pathan (21), and Ismail Bachu Khumbiya (29). They were arrested from Rajkot, Amreli and Jamnagar with the help of local police and brought over to Gandhinagar, police said. On how they cracked the case, a statement from the State Cyber Crime Cell said they followed the money trail to bank accounts into which the victims had been made to deposit the money. They had received alerts that more than Rs 50 lakh had been withdrawn from eight of the accounts through self-cheques, police said. Based on this banking information, three teams were formed by Detective Inspector ND Ingrodiya. These teams sought help from local police, tracked down the accused persons in the three cities, and placed them under arrest, said police. Police are yet to recover the money that the cybercriminals cheated out of the victim since they have spread it over a vast network through angadia (informal courier) firms, Superintendent of Police (SP) Dharmendra Sharma said. The search for other unknown accused persons is also underway. Case background On July 28, the State Cyber Crime Cell said it was investigating a case where at least five accused persons, identifying themselves as a telecommunications official, police sub inspector, two public prosecutors, and a notary officer, had contacted the complainant through different mobile numbers and accused her of money laundering. They cheated her of Rs 19.24 crore in the guise of verification of her properties, police had said. The accused told the woman that a case of money laundering had been registered against her. The accused then sent a fake letter in which the complainant had been named as accused in a purported case of violations of the Foreign Exchange Management Act (FEMA) as well as under the Prevention of Money Laundering Act (PMLA) by the Enforcement Directorate (ED). They warned the victim against talking to anyone about the matter, said police. According to a statement from the State Cyber Crime Cell, 'The accused persons then kept their hapless victim under digital arrest for 103 days, from March 15 to June 26, through WhatsApp video calls. (She) was told that a man in civilian dress was keeping an eye on her and if she wanted to get out of the case, she would have to provide information about all her properties.' It further said, 'After the complainant provided the information about the properties, the accused persons made her withdraw her Fixed Deposit (FD), sell the gold in her house and take a loan against the gold in her bank locker. They made her sell her house and shares in her stock market portfolio, and got her to transfer a total amount of over Rs 19 crore to different bank accounts on a fake receipt of 'Financial Supervisionary Freezing Certificate' on the false promise that the money would be returned to her after investigation.' Investigation in the case is underway.


Time of India
28 minutes ago
- Time of India
Copter bound for Pandharpur lands in Tuljapur, pilot claims location mix-up
Chhatrapati Sambhajinagar: A helicopter heading to Pandharpur from Hyderabad made an unexpected landing in Dharashiv district's Tuljapur on Wednesday afternoon, triggering alarm. The pilot reportedly landed without clearance after misjudging the location, near a govt construction site. The public works department (PWD) subsequently fined the operator Rs 10,000. Dharashiv collector Keerthi Kiran Pujar told TOI, "We have been informed that the helicopter was heading to Pandharpur, a prominent religious destination situated in another district, but the pilot got confused between the two names and landed in Tuljapur." PWD officials said the helicopter, operated by Mumbai-based firm, departed Hyderabad around noon and landed near the Tuljabhavani temple around 1.30pm. "The spot it landed on is close to the PWD helipad located at the department's construction site on Naldurg Road, where no prior permission had been granted for any such landing," an official said. The unexpected landing of the helicopter, especially in a high-security zone near the temple, created confusion. Police and revenue department officials rushed to the site to investigate. When questioned, the pilot reportedly showed documents indicating that the copter was scheduled to land in Pandharpur and claimed the landing in Tuljapur was "due to a location mix-up". Tuljapur police officers, including assistant inspector Annasaheb Manjare, and PWD executive engineer Vijay Awale inspected the site and reviewed the landing documents. Since the landing was carried out without prior clearance from the district administration or aviation authorities, PWD imposed a fine of Rs 10,000 on the helicopter firm. The fine was paid promptly, and the helicopter departed from Tuljapur around 5.30pm, officials said. "The location is sensitive due to the large number of devotees visiting the temple. Unauthorized landings pose serious security concerns. Immediate action was taken to ensure rules were enforced," a senior police officer said. The officials also reported the matter to the district collector and the superintendent of police for further review.


Time of India
28 minutes ago
- Time of India
Man loses 8L in city's first mobile malware cyber fraud
Lucknow: Lucknow recorded its first case of mobile malware cyber fraud on Friday when a Nishatganj resident alleged that he was duped of Rs 8.70 lakh. Though the crime took place on July 20, the case was lodged only on Friday. Cyber experts said mobile malware cyber fraud is often referred to as an APK (Android Package Kit) scam or remote access trojan (RAT) attack. According to a complaint filed with the Cyber Crime Police Station, the victim received a call on his mobile on July 20 from an unknown number regarding Aadhaar card upgradation. Subsequently, an APK file named " was sent on his WhatsApp, which he downloaded and installed. Shortly after, the victim alleged that his mobile phone was hacked, enabling unauthorised access to his private savings account. Using his debit card, five separate fraudulent transactions were carried out on the same day: Rs 1.99 lakh, Rs 1.99 lakh, Rs 1.98 lakh, Rs 1.50 lakh, and Rs 1.23 lakh. The total siphoned amount stands at Rs 8.70 lakh. The victim also lodged a complaint via the National Cyber Crime Helpline (1930). Former IPS and cyber expert Triveni Singh said: "Once the victim unknowingly installs the app, it silently grants the attacker remote access to the phone—allowing them to read SMS, intercept OTPs, monitor screen activity, and operate banking apps." by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like 5 Books Warren Buffett Wants You to Read In 2025 Blinkist: Warren Buffett's Reading List Undo Singh said these APKs look harmless but contain embedded code that compromises mobile devices. "They are capable of stealing debit/credit card data, reading SMS and OTPs, recording your screen activity, accessing internet banking apps, and sometimes even locking your phone," he said.