logo
#

Latest news with #AutomatedTellerMachine

Dharmasthala whistleblower's lawyer claims red blouse, ATM cards found, SIT denies
Dharmasthala whistleblower's lawyer claims red blouse, ATM cards found, SIT denies

India Today

time30-07-2025

  • India Today

Dharmasthala whistleblower's lawyer claims red blouse, ATM cards found, SIT denies

Advocate N Manjunath, who represents the whistleblower in the Dharmasthala mass burial case, has issued two detailed press releases claiming the recovery of key items — including a torn red blouse, a PAN card, and two ATM cards — from one of the excavation sites, even as the Special Investigation Team (SIT) continues the exhumation process in the temple town. advertisementHowever, SIT sources have denied any such recovery so a statement released on Wednesday, Manjunath said they had taken note of sources confirming the recovery of a torn red blouse, a Permanent Account Number (PAN) card, and an Automated Teller Machine (ATM) card from a depth of approximately 2.5 feet at Site No. 1. 'Immediately after this development, the SIT's subsequent actions deserve commendation,' the statement read. He further praised the SIT's decision to excavate the site down to a depth of 10 feet, calling it a sign of 'professional commitment' and evidence of their resolve to ensure no piece of evidence, however small, is release also noted that the recovered items — one PAN card and two ATM cards, with one bearing a male name and another bearing the female name Lakshmi — presented potential leads. 'The seriousness and rigour demonstrated by the SIT have given us renewed hope. We continue to place our full faith in their work as they proceed to the remaining sites,' he a second release, Manjunath, who also represents Sujatha Bhat, mother of medical student Ananya Bhat who went missing in Dharmasthala in 2003, shared specific details allegedly given by the complainant-witness regarding the number of bodies buried at various locations identified for excavation. According to him, the information suggests: Site No. 1 has 2 bodies, Site No. 2 has 2, Site No. 3 has 2, Sites No. 4 and 5 together have 6, Sites No. 6, 7 and 8 have 8 bodies in total, Site No. 9 has between 6 to 7, Site No. 10 has 3, Site No. 11 has 9, and Site No. 12 has between 4 to 5. Site No. 13 is said to contain the highest number of further claimed that, according to the complainant-witness, the site with the most bodies is not among the currently marked 13 locations. It is believed to be situated further away and will be taken up once the present round of exhumations is complete.'For Sujatha Bhat, this process is not merely an investigation; it is a profound journey towards truth and closure for her beloved daughter and for countless other missing persons,' the release stated.'I will watch out for each and every exhumation. My heart aches for answers, and I have full faith that the SIT's painstaking work will unearth the truth, no matter how long it takes or how deep they must dig,' Sujatha Bhat police sources confirmed that the three sites identified in the alleged mass burial case in Dharmasthala, Karnataka, have yielded no evidence of human remains. The Special Investigation Team (SIT) probing the case has now begun digging at a fourth location.- Ends IN THIS STORY#Karnataka

Police probe 93 people for involvement in unlicensed moneylending
Police probe 93 people for involvement in unlicensed moneylending

Straits Times

time17-07-2025

  • Straits Times

Police probe 93 people for involvement in unlicensed moneylending

Seven among the 93 had allegedly harassed debtors at their residence. SINGAPORE - A total of 93 people, aged between 13 and 67, are being investigated by the police for their suspected involvement in unlicensed moneylending activities. Their alleged involvement in such activities was uncovered by the police during a week-long operation from July 9 to July 15 by officers from the Criminal Investigation Department (CID) and the seven Police Land Divisions, the police said in a statement on July 17. Preliminary investigations revealed that one person had operated as an unlicensed moneylender and seven people had allegedly harassed debtors at their residence. Forty-three people are believed to be runners who had assisted in unlicensed moneylending activities by carrying out Automated Teller Machine (ATM) transfers. The remaining 42 individuals are believed to have opened bank accounts and provided their ATM cards and personal identification numbers or internet banking tokens to unlicensed money lenders. Investigations are ongoing. Under the Moneylenders Act 2008, a person whose bank account, ATM card or internet banking token is used to facilitate moneylending by an unlicensed moneylender is presumed to have assisted in carrying on the business of unlicensed moneylending. Top stories Swipe. Select. Stay informed. Singapore Fatal abuse of Myanmar maid in Bishan: Traffic Police officer sentenced to 10 years' jail Singapore Man charged over manufacturing DIY Kpods at Yishun home; first such case in Singapore Singapore HSA launches anti-vaping checks near 5 institutes of higher learning Singapore $7,000 fine for eatery chain involved in ByteDance food poisoning case Singapore Bicycle wheel-inspired care model used to improve trauma outcomes in central S'pore Life 11 new entries on Singapore's Bib Gourmand list, including three re-entries at Old Airport Road Singapore NEA monitoring E. coli at Sentosa beaches after elevated bacteria levels delay World Aquatics events Singapore 15 under police probe for sharing Singpass credentials used in scams First time offenders may face a jail term of up to four years, a fine of at least $30,000 and a maximum sum of $300,000 and up to six strokes of the cane. First-time offenders found guilty of acting on behalf of unlicensed moneylenders to commit or attempt to commit any acts of harassment may face a jail term of up to five years, a fine of between $5,000 and $50,000, and between three and six strokes of the cane. Unlicensed moneylenders will to hesitate to carry out dangerous acts of harassment on borrowers and their families, said the police. This includes setting fire to or splashing paint on their residences and locking the gates using chains or bicycle locks to confine the occupants. The police advised the public to steer clear from unlicensed moneylenders and to not work with or assist them in any way. Foreigners found to have borrowed from or convicted for aiding unlicensed moneylenders will have additionally have their student or work passes cancelled and will be deported from Singapore, they added.

Pune Crime Files: how 2 alert cops foiled an ATM robbery midway, caught accused red-handed with gas cutters
Pune Crime Files: how 2 alert cops foiled an ATM robbery midway, caught accused red-handed with gas cutters

Indian Express

time30-06-2025

  • Indian Express

Pune Crime Files: how 2 alert cops foiled an ATM robbery midway, caught accused red-handed with gas cutters

On March 23 this year, a gang of robbers targeted the ATM kiosk of a public sector bank on the Dehu-Alandi Road in Pune. Using gas cutters to breach the cash dispenser machine at around 2.20 am, they fled with cash amounting to Rs 16.8 lakh. A coordinated probe launched subsequently looked into multiple angles, but the police could not achieve any breakthrough. Patrolling was intensified in areas closer to the Pune-Mumbai highway and meticulous efforts were taken to cultivate ground-level intelligence on such gangs. The breakthrough Around 1.50 am on May 26, a patrolling team from the Dehu Road police station zeroed in on a vehicle which was suspiciously parked close to some Automated Teller Machine (ATM) kiosks in the area, the police said. When beat marshals Samadhan Patavkar and Kiran Patil approached the car, the driver started the vehicle in haste and sped towards Alandi. The officers saw that two men were sitting in the car's front seats and a woman was in the back seat. The next moment, the two officers heard a metallic thud from inside an ATM kiosk. They immediately called for back-up and waited for an opportunity to enter the kiosk. They saw that there were two men inside the kiosk who were about to breach the cash dispenser machine with a gas cutter. As they spotted the cops, the two men started pelting stones and came charging. Fortunately, within moments, Joheb Shaikh, Assistant Inspector, and constable Sopan Valekar reached the spot. After a fistfight, the four police officers finally managed to overpower the two robbers. The suspects were identified as Mustafa Mobin Khan, 30, and Mustakim Mobin Khan, 25, residents of Pinangwan village in Haryana's Nuh district. The investigation revealed that they were members of a notorious gang of armed robbers led by one Yusuf Khan of Pinangwan. According to the police, preliminary probe revealed that the officers had caught the two just moments before they were about to breach the cash dispenser which had over Rs 15 lakh in it. Detailed investigation later revealed that the three accomplices who had fled in the car were Yusuf Khan's partner Seema Khan, 40, his brother Azad Khan, 45, and one Waris Khan, 20. The same gang was behind the robbery on the Dehu-Alandi road in March, the questioning of the suspects has revealed. A team of Dehu Road police is currently conducting a search to arrest the remaining gang members and their leader, who are said to have fled to their village in Haryana. Investigators detect pattern Multiple incidents have been reported previously in Pune, Pimpri Chinchwad and surrounding areas where burglars have used gas cutters or explosives to breach ATM cash dispensers. Probe has revealed these incidents took place at kiosks with inadequate security measures. The series of such heists at ATMs, especially those located in the industrial areas in and around Pune, have revealed a pattern. Most of these heists have taken place in deserted areas during the night or early hours. Despite very clear guidelines from the Reserve Bank of India (RBI) and repeated communications from the police, banks and non-banking entities which manage ATMs kiosks fail to put adequate security cover in place, officers have observed. Taking note of aspects like inadequate security cover at the kiosks, the police have also charged bank officials concerned for 'abetting' these crimes by failing to take necessary measures to secure the ATMs, in some of the cases. Officers added that directives issued to banks and ATM managing entities are very elaborate. They pertain to alarm systems linked to cell phones of the bank officials, security cameras and their specifications, armed security guard deployment, lighting arrangements, location of the kiosk, monitoring of CCTV footage, construction of the kiosks and so on. In the ATMs that have been targeted, these directives were blatantly flouted, probe into recent cases has revealed. Sushant Kulkarni is a Special Correspondent with The Indian Express in Pune with 12+ years of experience covering issues related to Crime, Defence, Internal Security and Courts. He has been associated with the Indian Express since July 2010. Sushant has extensively reported on law and order issues of Pune and surrounding area, Cyber crime, narcotics trade and terrorism. His coverage in the Defence beat includes operational aspects of the three services, the defence research and development and issues related to key defence establishments. He has covered several sensitive cases in the courts at Pune. Sushant is an avid photographer, plays harmonica and loves cooking. ... Read More

Android users must check one phone setting now - ignoring new alert may be costly
Android users must check one phone setting now - ignoring new alert may be costly

Daily Mirror

time22-04-2025

  • Daily Mirror

Android users must check one phone setting now - ignoring new alert may be costly

There's a worrying new Android scam doing the rounds but a simple settings check will stop you from becoming its next victim. Android users need to watch out for a scary new scam that could see their bank accounts raided and money stolen. The latest alert has been issued after security experts at Cleafy spotted a worrying trend that uses a bug called Supercard X to try and steal cash from unsuspecting users. This new attack is more complicated than most, but those who are fooled could see their accounts drained without them ever knowing anything is wrong. ‌ According to Cleafy, the threat begins via a simple text message which is sent out to Android phones. The note, which appears to have come from the user's bank, explains that there has been some suspicious activity on their account. A number is included with the recipient of the text, then urged to call for help without delay. Once dialled, scammers then answer the phone and attempt to trick the user into handing over account details and PIN numbers. If that wasn't bad enough, they are also told to download a new "security" app (called Reader) and then tap their bank card on their phone to verify that things are working. Sadly, the application isn't going to stop any banking threats and actually contains the harmful Supercard X bug, which then transmits data from the debit card to the scammer's phone. ‌ Once completed, hackers then have everything they need to pay for goods using the victim's card. During the call, they even try and get the user to turn off any spending limits, which means even more money can be taken. "The Cleafy Threat Intelligence team has identified a new and sophisticated Android malware campaign, dubbed 'SuperCard X'," Cleafy explained. "This campaign employs a novel NFC-relay technique, enabling Threat Actors to fraudulently authorise Point-of-Sale payments and Automated Teller Machine (ATM) withdrawals by intercepting and relaying NFC communications from compromised devices. The malware is distributed through Social Engineering tactics, deceiving victims into installing the malicious application and subsequently 'tapping' their payment cards on their infected phones." It's unclear how many people have been targeted so far but reports suggest the majority of attacks are currently located in Italy. Although the UK appears unaffected for now, it's always good to know about these types of attacks and to stay alert. Now is also a good time to check your Android phone and make sure Google 's Play Protect setting is turned on as this should block any dangerous apps from being installed. Google is also keen to point out that no apps on its Play Store have yet to infected with the Supercard X bug. Expalining more about this service, Google said: "Based on our current detection, no apps containing this malware are found on Google Play. Android users are automatically protected by Google Play Protect, which is on by default on Android devices with Google Play Services. Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play."

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store