&w=3840&q=100)
Shock in Singapore: Immigration officer admits to sexually abusing 6 overstaying Indian nationals
An Indian-origin immigration officer in Singapore has pleaded guilty to collecting bribes in the form of sexual favours from six Indian nationals in exchange for allowing their short-term visit pass extensions, according to a media report on Tuesday.
Kannan Morice Rajagopal Jayaram, 55, a Singapore Immigration and Checkpoints Authority (ICA) inspector, committed the offences between 2022 and 2023, according to The Straits Times.
On Monday, he pleaded guilty to three corruption counts, all of which involved an Indian national.
STORY CONTINUES BELOW THIS AD
Another three similar accusations against three other Indian males aged 25 to 30 years would be reviewed during his sentencing, which is set for August 18, 2025, the article claimed.
Jayaram, as an ICA inspector, used to oversee a team responsible for processing visa extension requests.
According to court documents, while officers followed ICA guidelines, they had discretion to grant or deny extensions based on individual circumstances.
Jayaram allegedly exploited his position by targeting vulnerable applicants, including a 26-year-old Indian man, who sought to remain in Singapore for studies. He ensured the man's visa extension in exchange for sexual favours.
Jayaram allegedly committed similar acts with six other Indian nationals.
He was charged in 2023 and has been suspended from duty since April that year, according to ICA.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Hindu
15 minutes ago
- The Hindu
Army says no ceasefire violation along LoC
The Army on Tuesday (August 5, 2025) said there has been no ceasefire violation along the Line of Control (LoC) in Jammu and Kashmir. 'There have been some media and social media reports regarding ceasefire violation in Poonch region. It is clarified that there has been no ceasefire violation along the LoC. Please avoid spreading unverified information,' the Army said in a statement in New Delhi. Earlier, official sources in Jammu said the Pakistan Army had on Tuesday evening (August 5, 2025) indulged in 'unprovoked' firing on forward Indian posts along the LoC, prompting strong retaliation by the Indian Army. The exchange of small arms firing between the two sides continued for nearly 15 minutes in the Mankote sector but there was no immediate report of any casualties, the sources had said, adding it was the first instance of ceasefire violation since Operation Sindoor. Indian and Pakistani militaries engaged in intense clashes between May 7 and 10 after India launched missile strikes targeting terror infrastructure across the border under Operation Sindoor to avenge the Pahalgam terror attack.


India Today
15 minutes ago
- India Today
How Pahalgam terrorist's reliance on technology sealed their fate
After the April 22 Pahalgam massacre, in which 26 civilians were gunned down, the three Lashkar-e-Taiba terrorists responsible vanished into the unforgiving mountains of South Baisaran bloodbath triggered one of the biggest manhunts launched by security forces, with multiple teams spreading out from Baisaran, trekking deep into the wilderness — kilometre after kilometre — but to no avail. Given the challenging terrain, finding the three terrorists in the area was like looking for a needle in a haystack. The trio trekked for days, then weeks, and eventually months, disappearing deep into the Dachigam–Harwan forests — a remote stretch with almost no mobile network coverage, a dense canopy that blocks aerial sightlines, and a long history of providing refuge to security agencies, this was not just a manhunt — it was a race against terrain, technology, and time. Hopes began to fade despite multiple cordon-and-search operations launched to track down the perpetrators. But a glimmer of hope emerged from the satellite phone carried by the terrorists. The flickering signal was definitive proof that the trio was still in the Kashmir Valley and had not exfiltrated back to Pakistan-occupied Kashmir (PoK). From the outset, the terrorists — Suleman Shah, Abu Hamza, and Yasir Jibran — ensured they stayed beyond the reach of conventional surveillance. They carried no regular mobile phones that could be traced through telecom towers. Instead, they used a Huawei satellite phone connected to the Inmarsat4 F1 network, allowing them to send encrypted messages directly to handlers in Pakistan without ever touching an Indian to high-level sources, 'On the slain terrorists' bodies were found three Motorola Android devices with the Alpine Quest navigation app installed — an offline app that provides access to detailed topographic maps.' This allowed them to navigate confidently through unfamiliar jungle terrain without relying on mobile data or GPS sources revealed that the app was used not just for navigation, but also to monitor the locations of security force installations — helping the terrorists maintain a safe distance from patrol zones. Radio communication was kept to a minimum, limited to short bursts, typically late at night, making early interception nearly first major breakthrough came in the third week of May, when the Intelligence Bureau and the Army's signal units managed to partially fix the location of the 'ultra set' — the satellite phone. Even this was a significant challenge. The dense forest canopy, high ridgelines, and deep valleys of Dachigam created natural blind spots that absorbed and deflected signals. Recognising the limitations, the Ministry of Home Affairs deployed three advanced RF surveillance devices capable of detecting faint radio frequencies in signal-shadow human intelligence inputs began to flow. The intelligence grid received credible tip-offs about the terrorists' movement inside Dachigam — information later confirmed by Union Home Minister Amit Shah in a briefing to Parliament. Security personnel, equipped with indigenous RF scanners, began tracking fleeting pings from the satellite phone. With upgraded equipment on the ground, the signal hunt intensified. Triangulation from multiple elevated positions gradually narrowed the suspected hideout area to just six square kilometres — still dense forest, but now a manageable search this intelligence in hand, 24 Rashtriya Rifles, responsible for the region, assessed the need for enhanced firepower given the operational complexity. In consultation with the General Officer Commanding, 4 PARA was brought in to lead the strike. Concurrently, the intelligence unit activated one of its most trusted human assets to penetrate the jungle. The operative returned with vital last-mile intelligence, including specific details of the terrorists' movements and temporary this information reached the operations room, it took just 36 hours to close the July 25, the last satellite phone activity was logged. The cordon-and-search operation began shortly afterward. On July 28, deep inside the Dachigam–Harwan belt, contact was made. The firefight that ensued was brief but decisive. All three terrorists — Suleman Shah, Abu Hamza, and Yasir Jibran — were neutralised. According to sources, each was eliminated with precise headshots, with no more than five to six bullets used in the recoveries were the Huawei satellite phone, the Motorola devices with Alpine Quest, ropes, steel cups, wire cutters, and a camphor-like inflammable substance — all pointing to meticulous long-term jungle survival planning. The weapons seized — two AK47 rifles and one M4 carbine — were later forensically matched to shell casings recovered from the Baisaran massacre site, conclusively confirming that the men killed in Operation Mahadev were indeed the perpetrators of one of the year's most horrific terror attacks.- EndsTune InMust Watch


Indian Express
15 minutes ago
- Indian Express
NIA conducts searches at 19 locations in Punjab in Amritsar temple grenade attack case
The National Investigation Agency (NIA) on Tuesday carried out searches at 19 locations across Punjab in connection with the March 2025 grenade attack on Thakur Dwara Sanatan Temple in Amritsar. The agency said the searches were conducted in the border districts of Amritsar, Gurdaspur, and Batala. Several digital devices and other 'incriminating materials' were seized during the raids, which are part of the ongoing probe into the terror conspiracy. The case, registered under RC-08/2025/NIA/DLI, pertains to a grenade attack on the temple located on Sher Shah Road in Amritsar on the night of March 14. The NIA said the attack was one among a spate of recent grenade attacks in Punjab carried out on the directions of handlers based abroad. According to the NIA, the temple attack was executed by Gursidak Singh, who is now deceased, and Vishal Gill. Investigators have found that Gursidak was in direct contact with foreign handlers who recruited and radicalised vulnerable Indian youth using money and drugs, and provided them with grenades, explosives, and funds to carry out terror strikes. The agency said both Gursidak and Gill were also involved in multiple instances of transporting grenades and weapons as part of the wider terror network. The NIA said further investigations were underway as it continues its crackdown on terror modules targeting national security and sovereignty.