
Bengal duo helped ISI set up honey trap
The ISI agents used the WhatsApp numbers and OTPs, shared by Rajak and Gupta, to pose as women and then trap men from defence and other crucial fields.
While the two denied direct links with ISI, they confessed to transmitting information through SIM and OTPs to contacts in Delhi and Mumbai. Investigators found substantial financial transactions in both personal and organisational accounts, now under scrutiny. Both their mobiles provided leads, said police.
"Rajak and Gupta have been involved in these activities for about three years, establishing their base in East Burdwan early this year," said a senior STF officer.
"We are examining their phone records, bank accounts and organisational documents to uncover the full extent of their operations."
You Can Also Check:
Kolkata AQI
|
Weather in Kolkata
|
Bank Holidays in Kolkata
|
Public Holidays in Kolkata
Kolkata: Two men, Mukesh Rajak and Rakesh Kumar Gupta, arrested by the Bengal STF from East Burdwan for reportedly helping Pakistan-backed ISI operatives, played an important role in setting up honey traps.
by Taboola
by Taboola
Sponsored Links
Sponsored Links
Promoted Links
Promoted Links
You May Like
Why seniors are rushing to get this Internet box – here's why!
Techno Mag
Learn More
Undo
The ISI agents used the WhatsApp numbers and OTPs, shared by Rajak and Gupta, to pose as women and then trap men from defence and other crucial fields.
While the two denied direct links with ISI, they confessed to transmitting information through SIM and OTPs to contacts in Delhi and Mumbai. Investigators found substantial financial transactions in both personal and organisational accounts, now under scrutiny. Both their mobiles provided leads, said police. "Rajak and Gupta have been involved in these activities for about three years, establishing their base in East Burdwan early this year," said a senior STF officer.
"We are examining their phone records, bank accounts and organisational documents to uncover the full extent of their operations."

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Hindu
16 minutes ago
- The Hindu
Digital trail under scanner after Dharmavaram man's arrest for extremist links, says SP
Confirming Saturday's arrest in Dharmavaram town of Sri Sathya Sai district, Superintendent of Police V. Ratna on Sunday (August 17) briefed the media here, attesting that 42-year-old Kotwal Noor Mohammad, residing in the town for 15 years, was actively connected to the Pakistan-backed social media groups, circulating jihadi propaganda. The SP, along with Deputy SP (Dharmavaram) U. Narasingappa, disclosed that Noor Mohammad was initially thought to be a passive member, but he turned out to be an active participant in discussions intended to glorify extremist ideology. She said that the police seized the accused's mobile phone and some literature linked to the jihadi campaign in Saturday's predawn raid. 'This Dharmavaram incident is a clear proof as to how social media platforms are being mishandled and misused to negatively impact youth and gullible minds at the local level by the terrorist groups,' the SP said. Although Noor Mohammad was held on Saturday (August 16), the real investigation 'has begun now,' Ms. Ratna said, adding that the seized mobile had been sent to forensic laboratories to unravel his 'digital footprint' to map his network. She did not rule out the possibility that the accused might have acted as a recruiter or sympathiser beyond the Sri Sathya Sai district. The SP said that the case was booked under the stringent sections of the Bharatiya Nyaya Sanhita and the Unlawful Activities (Prevention) Act. Immediately after the arrest, Noor Mohammad was produced before the Kadiri court in the district and was shifted to the Kadapa Central Prison on a 14-day remand. 'We are waiting for the forensic revelations which will expose the depth of his involvement in the cross-border terrorism activities,' the SP said.


Time of India
an hour ago
- Time of India
Ex-Intel engineer sentenced and fined $34,472 for stealing trade secrets and sharing with Microsoft; Judge says: Used those materials during negotiations ...
Representative image A former Intel engineer who illegally shared the company's trade secrets with his new employer, Microsoft, has been sentenced to two years of probation and ordered to pay a fine of over $34,000, a report has said. The sentence was handed down last week to Varun Gupta, who worked as a product marketing engineer for Intel for nearly a decade. He was fired from his senior position at Microsoft after his actions came to light. According to Assistant US Attorney William Narus, Gupta copied thousands of confidential files from his Intel computer onto a portable hard drive before leaving the company in 2020, as per a report in Oregon Live. He then 'repeatedly accessed those documents' and used them to represent Microsoft in contract negotiations with his former employer, specifically on a deal related to computer processors, the report added. 'Not only did the defendant take proprietary materials with him, he also used those materials during negotiations against his prior employer,' Narus said in a sentencing memo. One of the documents shared was a PowerPoint presentation outlining Intel's pricing strategy with another major customer. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Could This NEW Collagen Blend Finally Reduce Your Cellulite? Vitauthority Learn More Undo What the sentencing memo on the former Intel engineer said In a sentencing memo, Narus argued for an eight-month prison term, emphasising the need to deter such behavior in an industry with high employee turnover. 'Not only did the defendant take proprietary materials with him, he also used those materials during negotiations against his prior employer,' Narus wrote. Gupta's defense attorney, David Angeli, countered that Gupta had already suffered a significant and lasting punishment. Angeli noted that his client had already lost the high-level position he worked years to achieve, settled a civil lawsuit with Intel for $40,000, and experienced a permanently damaged reputation that effectively ended his career in the tech sector. In a prepared statement to the court, Gupta apologised to both Intel and Microsoft, as well as the government, for the resources spent 'because of my bad decision.' He spoke of his daily struggle with questions about his future and his "legacy" as he works to rebuild his life in a new country. After leaving the tech industry, Gupta relocated his family to France and is now studying vineyard management, with aspirations of working in the wine industry. Samsung Galaxy Z Fold7 Review: Changing The Game AI Masterclass for Students. Upskill Young Ones Today!– Join Now


New Indian Express
3 hours ago
- New Indian Express
Suspected JeM member arrested in Andhra Pradesh's Dharmavaram
'He is attracted by terrorist literature' During their observation, Noor was found to be indulging in anti-social activities and promoting terrorism through his preachings, infusing the same into young Muslim youths in the region by creating WhatsApp groups. The NIA and local police had been keeping a close watch on the movements of several suspects following the recent arrest of two militants from Rayachoti town in Annamayya district, which led them to Noor Mohammed. The accused was later shifted to an undisclosed location where the police are collecting details such as his social media postings, WhatsApp groups belonging to the banned terrorist organization Jaish-e-Mohammed, and internal groups with local Muslim youths. 'Noor is attracted to and influenced by terrorist literature,' the DSP said. 'We have found that he is actively participating in a WhatsApp group run by Jaish-e-Mohammed. In addition, we have found that he is a member of WhatsApp groups related to some other banned terrorist groups. He arranged phone calls and classes for Muslim youths from Pakistani terrorist organizations through WhatsApp calls.' The DSP added that the investigation is ongoing to trace the admins of WhatsApp groups and others involved.