logo
Jagtial District Transport Officer, driver in Telangana ACB net

Jagtial District Transport Officer, driver in Telangana ACB net

The Hindu06-08-2025
Telangana Anti-Corruption Bureau (ACB) has arrested the district transport officer (DTO) and his personal driver in Jagtial district for demanding and accepting a bribe from a complainant in exchange for an official favour.
The accused officer, identified as Banoth Bhadru Naik, posted as the DTO in Jagtial, allegedly received a bribe of ₹22,000 through his personal driver, Banoth Aravind. The bribe was demanded to avoid booking a case against the complainant, to prevent the imposition of a fine on his earth mover, and to ensure the release of the complainant's mobile phones.
According to ACB officials, the tainted amount of ₹22,000 was recovered from the possession of the driver, Aravind. Investigation revealed that the officer had initially demanded a bribe of ₹40,000, later reducing it to ₹35,000. Out of this, ₹13,000 had already been paid on August 4 as an initial instalment. The remaining ₹22,000 was handed over on August 6 through the private driver, leading to the case.
Both the officer and the driver have been arrested and produced before the special court for SPE and ACB cases in Karimnagar. Further investigation is underway.
ACB's phone number to complaint about demand for bribes
The ACB has urged the public to report any demand for bribe by public servants by calling the toll-free number 1064. Citizens can also reach out through WhatsApp on 9440446106, or via the ACB's official handles on Facebook and X (formerly Twitter). The bureau has assured that the identity of the complainant will be protected.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

LSE graduate among three held in Delhi for extortion attempt from Thailand
LSE graduate among three held in Delhi for extortion attempt from Thailand

New Indian Express

time3 hours ago

  • New Indian Express

LSE graduate among three held in Delhi for extortion attempt from Thailand

NEW DELHI: Three men, including a London School of Economics (LSE) graduate, were arrested for allegedly attempting to extort Rs 2 crore from a Delhi-based businessman by impersonating a notorious gangster, police said on Saturday. The accused, identified as Sumit (42), Prince (35), and Nitish (31), had flown to Thailand to execute their plan but were nabbed upon their return to India. The case came to light after the victim filed a complaint at the DBG Road police station, stating that he had received a threatening WhatsApp call from an international number. The caller, posing as a well-known gangster, demanded Rs 2 crore through a cryptocurrency QR code and issued death threats against the complainant's children if the payment was not made. Deputy Commissioner of Police (Central) Nidhin Valsan said investigators used advanced techniques to trace the call and QR code to Thailand. 'Police analysed previous crypto transactions and monitored the suspects' movements. Once they landed in India, they were arrested,' Valsan said. Two mobile phones used to generate the crypto QR code and make the WhatsApp call were also recovered. During interrogation, the accused reportedly confessed to being heavily debt-ridden and hatching the extortion plan as a quick solution. Sumit, who works in the jewellery trade, was acquainted with the victim's family. To evade detection, the trio traveled to Thailand, procured an international SIM card, and made the calls via WhatsApp while abroad. Nitish, a master's graduate from LSE, was among those involved in the scheme. A case has been registered, and further investigations are underway.

Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info
Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info

Economic Times

time3 hours ago

  • Economic Times

Signalgate like blunder! ICE adds random stranger to top-secret manhunt chat, leaks sensitive info

ICE leak exposes major security flaw in manhunt communications after federal agents mistakenly added a private citizen to a live group chat meant for law enforcement. The civilian, stunned to receive real-time manhunt updates, unknowingly witnessed the kind of information that could compromise an investigation and endanger officers in the field. ICE leak exposes major security flaw in manhunt communications- The ICE leak is more than a bureaucratic slip-up—it's a flashing red warning light about how America's enforcement agencies handle sensitive operations. By relying on unsecured MMS group texts to coordinate a live manhunt, officials not only exposed private data but also undermined their own mission. A single mistaken phone number gave a civilian a front-row seat to a federal pursuit, complete with Social Security numbers and surveillance details that should never have left encrypted channels. In a moment when public trust in government data handling is already strained, this error shows that the real vulnerability isn't always hackers or foreign adversaries—it's the everyday shortcuts taken inside the system. On August 14, 2025, U.S. Immigration and Customs Enforcement (ICE) made a blunder that reads like a cybersecurity case study: officials accidentally added a private citizen to a sensitive group chat used during an active manhunt. The messages, sent through unencrypted MMS, contained information that should never have left secure law enforcement channels—Social Security numbers, DMV records, license plate reader hits, and even an internal ICE 'Field Operations Worksheet.' The civilian, who had no ties to law enforcement, initially assumed the texts were spam. That illusion shattered when an official document landed in their inbox. By then, the damage was done: private investigative details had been broadcast in real time to an unintended observer. Perhaps the most troubling detail is not the mistaken addition itself, but the platform. Instead of secure, agency-approved systems, ICE and its partners used a 'Mass Text' group chat via MMS—a technology widely regarded as insecure and outdated. Unlike encrypted platforms such as Signal or WhatsApp, MMS leaves data vulnerable to interception and, as this case shows, accidental exposure. This wasn't an isolated misstep. A 2023 Department of Homeland Security inspector general report flagged repeated use of 'informal digital workarounds' by federal officers, warning that reliance on consumer-grade messaging apps could lead to data breaches. The report predicted exactly this kind of incident. This mishap echoes the so-called 'Signalgate' scandal from March 2025, when a journalist was mistakenly added to a classified Signal chat involving national security officials. That breach revealed sensitive planning discussions, and congressional hearings soon followed. Both cases highlight a troubling pattern: even elite agencies often default to tools of convenience, not security. Former NSA cybersecurity analyst Susan Hennessey told The Daily Beast that these repeated lapses 'erode operational security and public trust in equal measure.' It's easy to dismiss the ICE group chat error as human clumsiness, but the implications are serious. A wrong recipient in a group chat can mean: Compromised investigations – revealing manhunt details risks tipping off suspects. – revealing manhunt details risks tipping off suspects. Data privacy violations – exposing Social Security numbers and DMV records violates federal data handling laws. – exposing Social Security numbers and DMV records violates federal data handling laws. Operational safety risks – even field agents could be endangered if details about tactics leak. When government agencies mishandle data, the public doesn't just see incompetence—it questions whether other investigations are equally vulnerable. For ordinary Americans, the incident raises a pressing question: If ICE can't safeguard its own communications, how secure is the personal data it collects from millions of immigrants and residents each year? ICE oversees vast databases of biometric and identity information. A slip in protocols, as this case proves, can expose sensitive records to unintended parties instantly. Legally, ICE may now face scrutiny under the Federal Information Security Management Act (FISMA), which mandates strict controls over government data. Lawmakers, already critical of ICE's surveillance practices, are expected to push for hearings. So far, ICE and the U.S. Marshals Service have declined public comment. Internally, sources say reviews are underway, but there's no indication of disciplinary action or whether the civilian recipient of the messages will be asked to testify. The central issue remains: why, in 2025, is one of America's most powerful enforcement agencies still leaning on unsecured group texts to coordinate manhunts? Until that is answered, every American has reason to wonder how many other 'wrong numbers' have already gone unnoticed. For now, a civilian with no security clearance has seen more of ICE's operational playbook than Congress itself—a sobering reminder that the weakest link in national security is often the simplest human mistake.Q1: What happened in the ICE group chat leak? ICE accidentally added a civilian to a sensitive manhunt group chat, exposing private data. Q2: Why is the ICE leak considered a major security flaw? Because sensitive information was shared over unsecured MMS instead of encrypted platforms.

Maximum Lokayukta raids on officials of Urban Development Department
Maximum Lokayukta raids on officials of Urban Development Department

The Hindu

time7 hours ago

  • The Hindu

Maximum Lokayukta raids on officials of Urban Development Department

Lokayukta Police, who regained powers to probe cases under the Prevention of Corruption Act, 1988 after the abolition of the Anti Corruption Bureau (ACB) in September 2022, have registered 218 Disproportionate Assets (DA) cases and raided 219 State Government officials in Karnataka since 2023. Raids in DA cases between January 1, 2023 and July 31, 2025 218 cases against 219 State Government officials 150 cases Recommended further action to competent authorities 113 cases Under investigation 67 cases High Court has stayed proceedings 34 cases High Court has quashed FIRs 4 cases Got sanction for prosecution in 2 cases, 2 more pending before govt 82 officials Suspended However, nearly half of these cases are stuck in legal challenges, according to data tabled by Chief Minister Siddaramaiah in the Karnataka Legislative Council in response to two questions raised by MLCs C. T. Ravi and D. S. Arun. Of the 218 DA cases registered by the Lokayukta Police during this period, 101 cases (46.3%) have been stuck in legal challenges while the High Court of Karnataka has stayed proceedings in 67 cases and quashed FIRs in 34 cases. A senior Lokayukta Police official said that most of the 101 cases have either been stayed or quashed on 'technical grounds'. 'A Superintendent of Police (SP) rank officer needs to give an order under Section 17 of PC Act, 1988 to investigate the DA case against a particular officer. The court has, in many cases, found fault in an SP giving an order to lodge an FIR and investigate in a single order, and not sequentially. In some cases, they have also said that the SP has to record in detail in the order as to why a particular case is being assigned to a particular officer,' a senior official said. The Lokayukta Police have challenged all these orders in the Supreme Court of India. 'We have already got favourable orders in a few cases, but many cases are yet to come up for hearing before the apex court. We are confident of clearing these legal challenges, but it will take time,' the officer said. Delay in investigation The data shows that of the 218 cases registered since 2023, the Lokayukta Police have completed investigation in only four cases and sought Sanction for Prosecution in them, of which the government has granted the same in two cases and the request is pending in the remaining two. Explaining the delay in investigation, a senior Lokayukta Police official said that they inherited 1,300-plus cases from the ACB in 2022. Investigation into those cases, and the new cases were being done simultaneously, leading to delay. Lack of action by competent authorities Lokayukta Police have submitted preliminary reports to the competent authorities concerned for further action in 150 cases. But of them, only 82 officials have been suspended. 'In many departments, even after raids and our reports, officials are not even suspended. This has been the case for many years,' a senior official said. UDD and RDPR has most number of cases Data shows that over the last two-and-a-half years, most raids have targeted officials from Urban Development Department (39 officials) and Rural Development and Panchayat Raj Department (36 officials), followed by Revenue Department (20 officials) and Energy Departments (17 officials). Departments Raids Urban Development Department 39 Rural Development and Panchayat Raj 36 Revenue Department 20 Energy Department 17 Public Works Department 12 No official from the Muzrai Department and the Municipal Administration Department has been raided during this period while one official from Women and Child Development Department and two each from Education Department, Horticulture Department and Labour Department have been raided. This is no indication of the prevalence or the lack of corruption in these respective departments, a senior Lokayukta Police official said. Districts with most number of DA raids Bengaluru City 45 Belagavi 11 Tumakuru 10 Mysuru 10 Kalaburagi 10 'Our field units, based on the information they receive, carry out preliminary investigations and submit reports on particular officers, based on which DA cases are booked and raids conducted. More raids being conducted on officials of a particular department is a function of focus on a particular department by our field officers. We have been nudging them to diversify their focus and also work on senior officials, as presently the focus is mainly on mid-ranking officials. For instance, in the 218 cases, only one All India Services officer has been raided,' the official said. The data shows that most number of DA cases were booked in Bengaluru city, the administrative capital of Karnataka. This was followed by Belagavi, Tumakuru, Mysuru and Kalaburagi districts.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store