
No Durga Puja restrictions, clarifies Kolkata Police amid social media rumour
Kolkata Police debunks Durga Puja 2025 restriction rumours. Key details
'There is no directive to halt or restrict any Durga Puja celebrations,' Kolkata Police confirmed in an official statement on X (formerly Twitter).WHY ARE THESE CROWD PLANS BEING MADE THEN?What's actually happening is standard procedure. During Durga Puja, high footfall pandals, like those in North and South Kolkata, often draw thousands of visitors every hour. To ensure smooth movement and reduce overcrowding, the police chalk out crowd circulation plans.
These aren't new. Every year, Kolkata Police works with organisers to plan the flow of people, especially at top-billed pujas like Bagbazar, Ekdalia, Deshapriya Park, and Sreebhumi. These steps help in handling medical emergencies, preventing stampedes, and ensuring a better experience for everyone.'These measures are preventive in nature and should not be misconstrued as interference in traditional observances or community celebrations,' the advisory said.FAKE SOCIAL MEDIA POSTS CREATING PANICIn the past few days, screenshots and voice notes have been doing the rounds on WhatsApp and social media claiming that Kolkata Police plans to stop late-night entry into pandals or shut down big-budget pujas due to 'crowd risks.'NONE OF THESE CLAIMS ARE TRUEOfficials have clearly asked citizens to rely only on verified information and avoid forwarding unverified content. 'We request all citizens to stay informed through official channels and avoid sharing unverified or misleading content,' the statement added.PUJA SPIRIT REMAINS INTACT, WITH SAFETY IN PLACEKolkata's Durga Puja is a UNESCO-recognised cultural celebration, and the city takes great pride in hosting it every year. The police have reassured pandal organisers and the public that all festivities will go on as planned.Crowd control, traffic planning, emergency services, and civic partnerships are part of the blueprint that makes Durga Puja one of the most organised festivals in the country.So if you're planning to visit the pandals this year, you don't need to worry about any last-minute changes — but **keep an eye on official police handles** for any genuine updates.- Ends

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Hans India
37 minutes ago
- Hans India
Man loses Rs 1.72 lakh in fake RTA challan app scam
Hyderabad: A 34-year-old man in Hyderabad has fallen victim to a cyber fraud, losing Rs 1.72 lakh after downloading a deceptive mobile application disguised as an official transport department app. According to the Telangana Cyber Security Bureau (TGCSB), the incident unfolded on 16 July when the victim received a WhatsApp message containing an APK file named 'RTA Believing it to be a genuine application for checking traffic challans, he proceeded to download and install the file, unknowingly compromising his personal data. Two days later, on 18 July, the victim started receiving alerts of unauthorised debits from his HDFC bank account. He attempted to halt the transactions but soon realised his mobile phone had been remotely accessed. Furthermore, all incoming calls to his number had been secretly forwarded to an unknown number. Although he managed to disable the call forwarding and regain control of his device, a total of Rs 1,72,625 had already been withdrawn from his account. The incident was promptly reported to the Cyber Crime Helpline (1930). The Cyber Security Bureau has since issued a stern warning, urging citizens to exercise extreme caution regarding fake government-related APK files, particularly those disseminated via WhatsApp or SMS. Telangana Cyber Security Bureau explicitly advises citizens against installing APK files received through WhatsApp, SMS, or any unfamiliar sources. They strongly recommend downloading applications exclusively from trusted platforms such as the Google Play Store or Apple App Store. Additionally, the bureau advises individuals never to enter personal or banking details into unknown applications, to regularly check phone settings for unauthorised call forwarding, and to enable two-factor authentication for all banking and UPI applications. If a phone exhibits unusual behaviour or suspicious transactions are noticed, users should immediately switch off mobile data and contact their bank. Victims of cyber fraud are advised to meticulously preserve all relevant communication and transaction records and to report the incident by calling 1930 or visiting In emergencies, assistance is also available via WhatsApp or phone on 8712665171.


Time of India
3 hours ago
- Time of India
Cybercrooks keep two Bengaluru women under digital arrest, make them strip
Bengaluru: In a chilling reminder of how far cybercriminals will go, two women were digitally held hostage and forced to strip by fake cops in a digital arrest scam . The criminals had ordered the women to disrobe as part of an online "physical examination" to identify birth marks and moles. The women, who are childhood friends, realised they were victims of online fraud and extortion only when they reached out to another friend after being held hostage by the cybercriminals for nearly nine hours, despite having transferred Rs 58,447 to them. A complaint has been lodged with the East CEN Crime police. While Anne (name changed) is a resident of the city, her friend Richa, who works in Thailand as an instructor, was on a visit to Bengaluru when the duo got trapped in a web of deception. Their ordeal started at 11am on July 17 when Richa received a call from the number 8856062795. The caller introduced himself as a police officer from Colaba police station in Mumbai and accused her of being involved in money laundering linked to Jet Airways founder Naresh Goyal. He also accused her of being involved in human trafficking and a murder case. You Can Also Check: Bengaluru AQI | Weather in Bengaluru | Bank Holidays in Bengaluru | Public Holidays in Bengaluru A shocked Richa tried to explain she was on a visit to India and had no connection to the case. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Dementia Has Been Linked To a Common Habit. Do You Do It? NeuroVita Global Learn More Undo The caller, however, shared details of a debit card she was using and managed to scare her of arrest. Spooked on being furnished with her personal debit card details and official-looking documents, including forged arrest warrants and Central Bureau of Investigation ID cards, Anne also was convinced and fell prey to the ruse. While more fraudsters joined in, the women were made to believe the call was being made from a police station. To further deceive the women, the fraudsters made a video call claiming to connect them to officers from CBI. The crooks told the women they had to be kept under digital arrest at home, and had to stay on a WhatsApp video call for 24 hours. They told the victims that according to Reserve Bank rules, the transactions done from their bank accounts needed to be verified. The women were told to transfer money to an account provided by the fraudsters, on the promise it would be returned after the verification process if the money wasn't found to be black. Richa transferred Rs 58,447 from her bank account. The fraudsters also impersonated officials from the Telecom Regulatory Authority of India and Delhi police. Online medical exam After receiving the money, the fraudsters told the victims they needed to get clearance, for which they had to undergo a medical examination online. This was to identify and ensure there were no "bullet marks, moles, or tattoos" on their bodies. The women were asked to strip naked and follow instructions, which they complied with, Anne told police, adding that she was also told that her entire house was under surveillance and an arrest warrant was issued against Richa. A senior police officer said the women had no idea that the fraudsters were recording them nude under the pretext of medical examination. When the women stripped, the miscreants also allegedly body shamed them. Helpful call to friend After suffering tremendous pressure and harassment, Richa decided to reach out to a friend for assistance. She made a WhatsApp call around 8pm, and after she explained the ordeal, the friend advised her to disconnect all the calls and not transfer any more money. After the call was disconnected, the fraudsters attempted to reach the women again and sent across their nude photos and videos, threatening to make them public. Anne told police that the photos and videos shared by the fraudsters to both their phones weren't downloaded or saved. They deleted them as they had been digitally and physically abused and under tremendous fear and shame for nine hours. A senior police officer said a case has been registered under various sections of the Information Technology Act and Section 318 (cheating) of Bharatiya Nyaya Sanhita.

The Hindu
4 hours ago
- The Hindu
Advanced street cameras, toll plaza alerts: How Patna murder accused were nabbed in Kolkata
Advanced automatic number plate recognition (ANPR) cameras, CCTV footage, alerts from toll plazas and human intelligence helped Kolkata Police and West Bengal Police nab the four accused behind the murder of Bihar-based gangster Chandan Mishra, officials of the police forces said on Tuesday (July 22, 2025). 'The four accused including the main hit man Tauseef Khan, his associate Harsh, Khan's maternal cousin Nishu Khan, and Nishu's medical assistant Bhim drove into Kolkata through the Vidyasagar Setu toll plaza at around 10.30 p.m. on July 17. Their phones were switched off, so we could only track them through the car's number plate,' an officer of the West Bengal Police's Special Task Force (STF) said. The officer added that through advanced ANPR cameras, the accused's vehicle was tracked to Sukhobrishti, a housing complex in New Town in the Kolkata-adjacent Bidhannagar. Tausif and the three other accused had reached Sukhobrishti around 11.25pm on July 17, and left from there around half an hour later. 'Bihar Police had alerted us that their local contact Ehsaan is expected to assist them at Sukhobrishti. However, Ehsaan and his friends at the housing complex did not respond to Tauseef's calls when the vehicle reached the housing. Tauseef and the others had left from there the same night, and we detained Ehsaan and four others from Sukhobrishti for interrogation,' the officer of West Bengal Police STF said. During interrogation, Ehsaan allegedly confessed to the police that Tauseef's accomplice from Patna, Sahil, had messaged him on July 17 notifying him that Tausif and his team had reached Kolkata, and that they were ready to be received at Sukhobrishti. However, Ehsaan reportedly did not respond to Tauseef's calls. The officer further added that after the vehicle left Sukhobrishti in the wee hours of July 18, its movement was again spotted at Kolkata's Park Street area at around 3:53 a.m., and was later seen near the Eastern Metropolitan Bypass. 'We thought they would make an attempt to flee from Kolkata because by the morning of July 18, media had started sharing that five people had been detained over the Patna murder. We alerted all toll plazas to secure the city's exit points, and scanned the city's hotels in the meantime,' the official said, adding that by then the Kolkata Police STF had also been alerted. A high-ranking official of the Kolkata Police STF said on Tuesday that through analysis of intelligence, traffic cameras, and by interrogating locals of the area, the accused's vehicle had been tracked to Anandapur near the Eastern Metropolitan Bypass on the evening of July 18. 'There was a guesthouse at Anandapur where a group of four men and one woman had checked in around half an hour after the vehicle had been parked in the area. We checked hotel CCTVs and identified Nishu Khan, who we knew was paralysed waist down from an earlier bullet injury,' the Kolkata Police STF officer said. He added that the prime accused, Tauseef, was difficult to identify because he had allegedly undergone a complete change in appearance by then, with the help of a barber booked through an online service. The woman accompanying them was Nishu's local contact, he said. 'We sent in teams and secured the area around the guesthouse, and shortly after, raided two rooms from where we arrested the five people. They were unarmed, and nothing significant was seized from them. Subsequently, they were arrested by Bihar Police,' the officer from Kolkata Police STF said. Bihar-based gangster Chandan Mishra was out on parole and was shot dead in an open firing inside Paras Hospital in Patna in the morning on July 17. The 'leader' of the hit team, Tauseef, and three others were arrested in Kolkata on July 18 in joint operations of the Bihar Police, West Bengal Police, and Kolkata Police.