Latest news with #STOI


Time of India
6 days ago
- Time of India
He robbed truck driver in Bengaluru, but didn't know his punches killed victim
Bengaluru: On May 11, police recovered the half-naked body of a man in a bush of a vacant land opposite a medical college at Attibele, Anekal, Bengaluru Urban district. Lying supine, it bore no injury marks. Nor were there weapons near the body. Suspecting a death due to cardiac arrest or suicide, police registered a case of unnatural death. Later in the day, the body was identified as that of one Gangadharaiah, 60, a resident of Yadavanahalli on Sarjapura Road. A truck driver by profession, he lived with his wife and two children. According to his family, Gangadharaiah went missing after he left home on May 10. That day, they filed a complaint. Gangadharaiah's wife told police that his mobile phone was switched off. Police launched a search in the area for the phone, but they could not find it. Meanwhile, the body was shifted to hospital for an autopsy. Also, police kept an eye on the IME number of the mobile device. If anyone switched on the device, there would be an alert. A few days later came the shocking news from the doctors who carried out the autopsy. The ribs of the man were fractured, and hence he died, the doctors told cops. Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Nueva oportunidad en Miami para inversionistas con $300,000 dólares Financiación Empresarial Más información Undo Asked how it could have happened as there were no apparent physical injuries on the body, the doctors opined that something hard hit Gangadharaiah's chest, resulting in breaking the ribs and killing him. However, his family members said they didn't suspect anyone behind the killing. Left with no further clues to continue the investigation, cops waited for the one possibility—Gangadharaiah's mobile phone becoming active. A special team led by police inspector S Raghavendra was formed to crack the mystery. Finally, Raghavendra received an alert showing that Gangadharaiah's mobile became active. "It was switched on for an hour or so; a new SIM card was inserted, and the location was Salem, Tamil Nadu," Superintendent of police (Bengaluru Rural) CK Baba told STOI. A team was dispatched to Salem. There, another shocker awaited cops. They traced the man using Gangadharaiah's mobile phone to the bed of Salem govt hospital. The man, identified as Naresh Kumar Raja, 24, of Salem, had received a bullet shot in the leg by Tamil Nadu police. According to Tamil Nadu police records, Raja is wanted in at least 22 criminal cases, including three murders and more than a dozen robberies. "We questioned Raja on the hospital bed. He spilled the beans, saying he was the one who attacked Gangadharaiah but little did he know that the latter had died. Raja hit Gangadharaiah after confronting him inside the bush, sat on his stomach when the victim fell, and repeatedly punched him on the chest. As Gangadharaiah lost consciousness, Raja robbed him of the mobile phone and around Rs 5,000 in cash," the police officer who took a statement from Raja explained. According to Baba, Raja had the habit of robbing victims at desolate places at night. "Though he (the accused) is a resident of Salem, he regularly visits Attibele, where his close relatives live. On the night of May 10, the accused alighted from a bus and was walking past the medical college ground when he noticed Gangadharaiah walking into the bush. Quickly, he followed the victim and attacked. The fatal blows by the accused killed the victim," he said. "Once he recovers from the bullet injury and Salem police complete their investigation, we will bring him here and continue our investigation," he said, adding that the case is now being treated as a murder for gain.


Time of India
25-05-2025
- Time of India
Jurisdiction flaw in 1930 helpline costs cyber fraud victim crucial response time
In the fast-moving digital battlefield where cybercriminals strike with speed and precision, time becomes a victim's most critical resource — especially during the first 60 minutes after a scam. Investigators refer to this as the 'golden hour', a crucial period that can determine whether a fraudulent transaction is frozen in time or vanishes through a maze of mule accounts and offshore wallets. India's much-publicised 1930 cybercrime helpline, part of the Citizen Financial Cyber Fraud Reporting and Management System (CFCFRMS), was launched as a centralised emergency response to address such situations. But in practice, the system is plagued by geographical limitations that undermine its core purpose. A recent case involving Sainath, a private employee from Hyderabad, highlights a critical flaw in how the helpline functions — a flaw that cost him his golden hour, and potentially, his money. While on a short trip to Vijayawada in Andhra Pradesh, Sainath received a distressing SMS notification: Rs 18,000 had been debited from his account without his knowledge or consent. "I was shocked. I didn't make any transactions," Sainath told STOI. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Trade Bitcoin & Ethereum – No Wallet Needed! IC Markets Start Now Undo Reacting swiftly, he dialled 1930, expecting to block the transaction and alert authorities. However, the system routed his call to the Andhra Pradesh cybercrime team based on his physical location — not the origin of the fraud, his bank's location, or his home state. Sainath explained the situation to the officer, only to be told that he needed to report the fraud in Telangana, where both he and his bank account were registered. "The officer said since I am from Hyderabad, and my bank account is also registered there, I must report the fraud from Telangana itself. They said there's little they can do from here," he recounted. By the time Sainath returned to Hyderabad and lodged a formal complaint the next day, the golden hour had passed. Cybercrime experts and law enforcement officials repeatedly stress the importance of rapid response immediately after financial fraud is detected. During this brief window, coordination between police, banks, and payment platforms can freeze transactions, trace IP addresses, and block fraudulent accounts. "This is when money can still be in intermediary wallets or waiting to be transferred. If alerted in time, payment gateways can act fast. After that, it becomes increasingly hard to trace or recover the amount," said a senior cybercrime police official. Despite the known urgency of this window, cases like Sainath's are becoming increasingly common. Instead of receiving swift and centralised support, victims are being caught in a bureaucratic maze complicated by state boundaries. The root of the issue lies in how the 1930 helpline is configured — calls are automatically directed to the cybercrime cell in the state where the call originates, rather than where the fraud occurred or the victim resides. This flaw poses a significant challenge in today's mobile India, where people routinely travel across state lines for work, tourism, or family visits. "What's the point of having a national number if it's tethered to your GPS coordinates?" asks Sainath, adding, "Cybercrime doesn't respect state borders. Our response mechanism shouldn't either." Officials in various state cybercrime units admit to operational constraints. Jurisdictional limitations, poor inter-state coordination, and lack of centralised real-time access to victims' banking data often delay timely intervention. "Unless the victim's home state police or the nodal bank's branch acts, it becomes hard for an out-of-state unit to freeze or investigate," a senior Andhra Pradesh cybercrime officer said, speaking on condition of anonymity. While authorities have successfully saved over Rs 4,386 crore across 13.36 lakh complaints since the system's inception, Sainath's story reflects how gaps in execution still hinder the system's real-world impact. Meanwhile, cybercrime complaint numbers continue to rise. For victims like Sainath, these system flaws translate into more than just policy setbacks — they are deeply personal losses. "I did everything right. I called immediately. But I still lost my money, simply because I was in the wrong place at the wrong time," he said. Until India's cybercrime response evolves into a truly national and borderless network, the golden hour will remain elusive for countless victims — slipping away one lost rupee at a time. Stay informed with the latest business news, updates on bank holidays and public holidays . AI Masterclass for Students. Upskill Young Ones Today!– Join Now


Time of India
25-05-2025
- Politics
- Time of India
TDP leadership set for a generational shift
Vijayawada: The 2025 Mahanadu, TDP's annual conclave scheduled to be held in Kadapa between May 27 and 29, is likely to witness a leadership transformation in terms of party affairs. Tired of too many ads? go ad free now According to sources, the party's national general secretary, IT and HRD minister Nara Lokesh, is all set to step into the shoes of his father, chief minister Nara Chandrababu Naidu, in looking after party affairs. Though the position he is going to take up is not revealed yet, the entire rank and file of the party is expecting him to play a bigger role. Irrespective of the name and designation of the post in the party, Lokesh is likely to control all party affairs after the Mahanadu, signalling the beginning of the third generation of leadership in the four-decade-old party that was founded by his late grandfather, N T Ramarao. Lokesh is already being considered as number two in the party, and the announcement during the Mahanadu will further cement his position. Sources close to Lokesh told STOI that he was working on key reforms with an aim to reshape the party's direction in line with evolving public expectations, but without compromising on the spirit of its founding ideals. He will present his thoughts, and give direction to the cadre during the annual conclave. The key focus areas he is working on are Telugu identity, women empowerment, social re-engineering, youth, and farmers. Lokesh is said planning to introduce a concept, titled 'My Telugu Family', to unite Telugu communities across regions and sectors globally. The idea is to invoke Telugu pride and identity. He will also announce 'Stree Shakti' initiative to elevate women in leadership roles and expand opportunities for them, including within the party. Tired of too many ads? go ad free now Another key proposal to be presented during the Mahanadu will be a new social engineering formula with targeted welfare programs and caste-based equity, aligned with the principles of inclusion and dignity. Lokesh has been advocating for inclusion of young blood into the party, and he will present his ideas to initiate the youth into leadership roles. He is also focused on creating employment opportunities and entrepreneurship among youth. For the agriculture sector, Lokesh is working on a concept called 'Annadataku Anda' (Support to the Farmer) to ensure sustainability and prosperity for farmers. Finally, acknowledging the strength of party workers, Lokesh will announce special measures for the welfare of cadres at ground zero with the slogan, 'Worker is the Leader..


Time of India
24-05-2025
- Time of India
National helpline, local roadblock: How 1930 cyber fraud hotline misses the mark during ‘golden hour'
Vijayawada: In the digital battlefield where cybercriminals strike with speed and precision, time is the most critical resource for victims — especially in the first 60 minutes after a scam. Investigators call this the 'golden hour', the urgent period that can make the difference between freezing a fraudulent transaction and watching the money disappear across a maze of mule accounts and offshore wallets. India's much-touted 1930 cybercrime helpline, launched as part of the Citizen Financial Cyber Fraud Reporting and Management System (CFCFRMS), was designed as a centralised first-response mechanism for such situations. But in reality, it's riddled with geographical roadblocks, defeating the very purpose for which it was created. A recent incident involving Sainath, a private employee from Hyderabad, exposes a serious flaw in the functioning of this helpline — a flaw that cost him his golden hour, and possibly, his money. On a short trip to Vijayawada in Andhra Pradesh, Sainath received a distressing text message: Rs 18,000 was debited from his account without his knowledge or authorisation. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like You won't believe what your old car is worth today Cars24 Book Now Undo "I was shocked. I didn't make any transactions," Sainath told STOI. Reacting quickly, he dialled 1930, hoping to block the transaction and alert authorities. The call connected him to the Andhra Pradesh cybercrime team, as the system automatically routes calls based on the physical location of the caller — not where the bank account is held, or where the victim is registered. Sainath explained the situation. But to his surprise, the response he received was far from helpful. "The officer said since I am from Hyderabad, and my bank account is also registered there, I must report the fraud from Telangana itself. They said there's little they can do from here," he recounted. By the time Sainath returned to Hyderabad the next day and filed a formal complaint, precious hours had passed — the golden hour was long gone. Law enforcement officials and cybercrime specialists emphasise the importance of immediate action after a financial cybercrime is discovered. The golden hour is when coordination between police, banks, and digital payment platforms can potentially freeze the transaction, trace IP addresses, and flag or block fraudulent accounts. "This is when money can still be in intermediary wallets or waiting to be transferred. If alerted in time, payment gateways can act fast. After that, it becomes increasingly hard to trace or recover the amount," said a senior cybercrime police official. Yet, despite this critical window being publicly acknowledged, cases like Sainath's are becoming increasingly common. Instead of swift, centralised action, victims are being bounced around in a bureaucratic maze shaped by state borders. The root of the issue lies in how the 1930 helpline operates. Though positioned as a national emergency line, the system is configured to connect the caller to the cybercrime cell in the state where the call is made, not necessarily where the fraud originated or where the victim resides. This becomes a serious problem in an increasingly mobile India, where people often travel across states for work, tourism, or family visits. "What's the point of having a national number if it's tethered to your GPS coordinates?" asks Sainath, adding, "Cybercrime doesn't respect state borders. Our response mechanism shouldn't either." Officers in the cybercrime wings across states admit their hands are tied. Jurisdictional protocols, limited cross-state coordination, and absence of centralised real-time access to victim banking data often delay or derail initial response. "Unless the victim's home state police or the nodal bank's branch acts, it becomes hard for an out-of-state unit to freeze or investigate," a senior cybercrime official from Andhra Pradesh said, speaking on condition of anonymity. While a financial amount of over Rs 4,386 crore has been saved in nearly 13.36 lakh complaints since its inception, stories like Sainath's indicate that the system's promise is still a long way from full implementation on the ground. In fact, cybercrime complaint volumes have continued to soar. For victims like Sainath, the system's shortcomings are more than policy failures — they are personal losses. "I did everything right. I called immediately. But I still lost my money, simply because I was in the wrong place at the wrong time," he said. Until India's cybercrime response system evolves into a seamless national grid, the golden hour will continue slipping away for many victims — one lost rupee at a time.


Time of India
21-05-2025
- Time of India
Karnataka CET engineering seat scam brokers claim college managements not involved
Bengaluru: The brokers arrested for blocking engineering seats in CET-2024 testified that the college managements were not involved in the arrangement, states the chargesheet. A 5,000-page chargesheet was submitted to the court recently. It concluded that students were not admitted to the blocked seats for 2024, though option entries for 54 seats were made. Neither the students whose credentials were used nor the colleges knew about the scam, according to the brokers. However, police said they have not given a clean chit to the three colleges and their management as of now. "We have seized 17 mobile phones from the arrested persons. They have been sent to the forensic science laboratory for data retrieval. The reports are expected soon. If we come across clues on the communications made between the accused persons and the college staff, we will relaunch investigation in a new direction. The colleges have to answer us why there was communication between them and the accused persons," DCP-North Saidulu Adavat told STOI. The arrested are: Sri Harsha TM, 42, of JP Nagar III Phase; Prakash SR, 42, of Kadur in Chikkamagaluru; Ravishankar SC, 56, of Satanur in Kanakapura; Puneeth SL, 27, of Kadur in Chikkamagaluru; Shashikumar SK, 34; Purushottam R, 24, of Kadur in Chikkamagaluru; Avinash BS, 36, of Yeshwanthapur; Tilak R, 60, of Sheshadripuram; M Naushad Alam, 42, and his brother M Dilshad Alam, 33, of BTM Layout; Mohan Kumar VS, 38, of Vaddanahalli in Tumakuru; and Lavakesh Kumar B, 32, of Yelahanka Satellite Town. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Giao dịch vàng với sàn môi giới tin cậy IC Markets Đăng ký Undo According to police, Harsha is the kingpin and masterminded the scam by roping in Avinash BS, a staffer from KEA. The Alam brothers and Lavakesh Kumar worked as brokers. The remaining individuals carried out the task of finding students who could pay for the seats. They were assigned by Harsha and Avinash. Probe revealed that Harsha allegedly was involved in similar seat blocking in other states. The key to seat blocking lies in the fact that the consensual agreement between the state govt and Karnataka Unaided Private Engineering Colleges' Association (KUPECA) allows seats that are left vacant at the end of the CET counselling to be converted to management seats. Those seats are filled by the managements without considering merit. The modus operandi is to keep these seats blocked until the last round by making a student opt for them and then not turn up for admissions in the colleges. Harsha would identify students who secured high ranks in national-level entrances like Joint Entrance Examination (JEE) Mains, JEE Advanced, and NEET. KEA staffer Avinash procured their CET registration numbers. Certain that these students would not participate in CET counselling, the brokers used their credentials for option entry and blocking seats in these colleges. According to the chargesheet, Avinash sourced at least 30 students' credentials. The brokers took rooms in hotels in various places in and around Karnataka, including Goa, Davanagere, Chikkamagaluru, Hoskote, and Majestic, among others. They entered the option entries from these lodges, which they vacated in a day. The Karnataka Examination Authority soon discovered anomalies in the option entry. The mobile numbers and email IDs of the registered candidates were different from those used for the option-entry process. Some of the IP addresses used in entering these option entries were the same. When news spread about seat blocking, the accused burnt laptops and mobiles used for option entry. The accused were taken to the respective lodges where the remains of the gadgets were sourced and sent to FSL for further investigation. The students whose names and credentials were misused were also ignorant about this. Around 83 students were questioned by the team regarding this, all of whom said they were unaware of the incident. Twenty students made voluntary statements before the court saying that their names and credentials were misused by the brokers.