
Bangladeshi criminal hiding under guise of sadhu in Bengal held
Kolkata, Aug 3 (PTI) A Bangladeshi criminal, who had entered India and had been hiding in West Bengal under the guise of a monk, was arrested from Nadia district, police said on Sunday.
Acting on a tip-off, sleuths of the West Bengal STF, along with the local police, conducted a raid in the Tehatta area on Saturday night and apprehended 60-year-old Mohammed Hashem Mallik, also known as Hashem Ali Mallik, who was wanted in several cases in Bangladesh, an officer said.
Based on a complaint lodged by Sub-Inspector Mohammed Abdun Noor Chowdhury of the West Bengal Special Task Force, an investigation was started, he said.
'Hashem was allegedly involved in heinous crimes in Bangladesh. He created a fake Indian identity and had been hiding in Baliura Purba Para in Tehatta. We had information about him. With the help of local police, we conducted a raid and arrested him on Saturday evening," the officer said.
The accused was apprehended after he failed to produce valid identity documents to prove himself as an Indian, the police said.
'During preliminary interrogation, the Bangladeshi criminal admitted that he had crossed the border to escape legal proceedings in Bangladesh for the crimes he committed there," the officer said, adding that he also confessed to having forged Indian identity documents. PTI SCH BDC
(This story has not been edited by News18 staff and is published from a syndicated news agency feed - PTI) view comments
First Published:
August 03, 2025, 20:45 IST
Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Hindu
7 minutes ago
- The Hindu
ED attaches assets worth ₹42.8 crore in cyber fraud accused arrested in U.S.
The Enforcement Directorate has provisionally attached assets worth ₹42.8 crore linked to a person arrested in the United States for alleged involvement in a cyber fraud by spoofing the website of cryptocurrency exchange 'Coinbase'. The 18 properties belonging to the accused Chirag Tomar, his family members, and associated entities are located in Delhi and include credits in bank accounts. The agency launched investigations based on news reports about Chirag Tomar, an Indian national, who was arrested in the U.S. for allegedly stealing over $20 million through the use of fake or spoofed websites mimicking the cryptocurrency exchange website Coinbase. 'The ED investigation revealed that the trusted websites were spoofed in such a way by search engine optimisation that when the website would be searched, the spoofed website would appear at the top. The spoofed website appeared exactly similar to the trusted website except the contact details. When the users would enter the login credentials, the spoofed website would show it wrong,' the agency said. 'Therefore, the users would contact the number given in the spoofed website which would eventually connect them to the designated call centre managed by Chirag Tomar. Once the fraudsters gained access to the victim's accounts, the fraudsters quickly transferred the victim's cryptocurrency holdings to e-wallets under their control,' it said. According to the ED, the stolen cryptocurrency would then be sold on various P2P crypto platforms and converted to Indian currency. Subsequently, the funds were transferred to the bank accounts of Mr. Tomar and his family members and used to buy immovable properties, as alleged.


Hindustan Times
7 minutes ago
- Hindustan Times
Pakistan violates ceasefire in J&K's Poonch sector, Indian Army responds
Pakistan on Tuesday violated ceasefire along the Line of Control (LoC) in Jammu and Kashmir, indulging in unprovoked firing in Poonch sector, official sources said. File photo: Security personnel conducting a search operation in Poonch(PTI) Indian Army retaliated to Pakistan ceasefire violation, with the firing exchange having continued for 15 minutes, the above-mentioned sources said, adding that there were no report of any casualty. More details are awaited. This marks the first ceasefire violation since Operation Sindoor was launched by the Indian armed forces on May 7. The previous breach of ceasefire happened in May amid military conflict between India and Pakistan. Pakistan Rangers initiated unprovoked firing on Border Security Force (BSF) posts on May 9 along the International Border in the Jammu sector late Friday night. The May 10 incident prompted a swift and firm response from the BSF, India's border guarding force mandated to guard the 3,323 km India-Pakistan border. In a statement, the BSF's Jammu division had confirmed that Indian forces responded in a "commensurate manner", causing significant damage to Pakistani posts and assets across the border. "On 09 May 2025, from about 2100 hrs, Pakistan opened fire on BSF posts in the Jammu sector without any provocation. BSF is responding in commensurate manner causing widespread damage to posts and assets of Pakistan Rangers along the International Boundary. Our resolve to protect India's sovereignty is unshaken," BSF said in a statement.


Hindustan Times
7 minutes ago
- Hindustan Times
Infopark honey trap case: IT company owner, three others booked
Kochi, The Infopark honey trap case, in which a couple was recently arrested over allegations of attempting to extort crores of rupees from the owner of an IT company, has taken a twist, with police registering a sexual harassment case against the owner based on the complaint of the accused woman. Infopark honey trap case: IT company owner, three others booked Police registered the case on Tuesday against Venu Gopalakrishnan, the owner of the IT company in Kochi's Infopark, and three others after recording the woman's statement, which took several hours and continued until midnight on Monday. Investigators said various non-bailable sections of the BNS have been invoked, including Section 74 , Section 75 , Section 79 , Section 3 and Section 351 . A section of the Information Technology Act has also been applied against the accused, they said, adding that the alleged incidents occurred between February last year and July this year. "We are yet to summon the accused. An investigation is under way and we need to verify the details of the complaint," a senior police officer told PTI. Later in the day, the complainant, while speaking to a TV channel, made serious allegations against Gopalakrishnan, her former employer. She accused him of "implicating her and her husband in the honey trap case after she warned him that she would report the harassment she had suffered at the workplace to the company's internal grievance redressal cell". Neither Gopalakrishnan nor the other accused have responded to the allegations so far. Police, last week, had arrested the woman and her husband of trying to extort ₹30 crore from Gopalakrishnan by threatening to tarnish his reputation and implicate him in a false rape case. According to police, she and her husband, Krishna Raj, had spread rumours that she had an illicit relationship with the IT company owner. They then allegedly warned they would lodge a rape complaint against him unless he paid them. A team led by Central ACP Siby Tom arrested the couple and recovered the ₹20 crore cheque leaf and agreement papers from them, police had said. This article was generated from an automated news agency feed without modifications to text.