logo
Accused of honey trapping, extortion by Surat builder, absconding social media influencer held in Ahmedabad

Accused of honey trapping, extortion by Surat builder, absconding social media influencer held in Ahmedabad

Indian Express4 hours ago

Evading Surat police for over a year, a social media influencer, Kirti Patel, was arrested in Ahmedabad earlier this week for her alleged involvement in a case of honey trapping, extortion, and defamation filed by a builder, officers said. The woman was arrested from the Sarkhej area of the city on Tuesday. Police are looking for two more suspects involved in the racket.
Patel, 34, has around 13 lakh followers on social media.
On Wednesday, she was produced before a court by Kapodara police, which sought three days' police remand. Rejecting the same, the court sent her to judicial custody at Surat Central Jail.
Sources said there was a property dispute between the complainant and one Vijay Savani, who also deals in real estate in Surat city, and the matter is pending in Surat court.
To sort the dispute outside court, Savani took the help of Patel and others, said police. The complainant said Patel and others had called him to a farm house in Surat's Kosadi village last year for a meeting with Savani. During the meeting, they offered the complainant a cold drink spiked with a chemical substance and later took his objectionable photos, said the FIR.
After a few days, Patel demanded Rs 2 crore from the complainant, threatening that she would make the photos go viral on social media, the FIR added. She also made different reels on social media against the builder and defamed him, the FIR alleged.
The complaint was lodged in June 2024 under Indian Penal Code's sections 386 (extortion by putting a person in fear of death or grievous hurt), 389 (putting a person in fear of accusation of offence in order to commit extortion), 504 (intentional insult with intent to provoke breach of peace), 506 (criminal intimidation), 328 (causing hurt by means of poison etc,. with intent to commit an offence), 507 (criminal intimidation by anonymous communication), 120(b) (criminal conspiracy), Information Technology Act section 66(e) and 67. Besides Patel and Savani, a woman called Manisha Goswami and another man, Jehangir Khan, were named in the FIR.
Savani was arrested last year followed by Goswami and Khan while Patel remained absconding.
Kapodara police station inspector M R Solanki said, 'Earlier, we had arrested three accused and submitted chargesheet in the court. Patel was absconding and our teams were looking for her. After receiving tip-offs, we sent our teams to the Sarkhej area in Ahmedabad and caught her with the help of local police. We have seized her mobile phone and have sent it to the Forensic Science laboratory to retrieve the data. Two more accused named in the complaint are yet to be arrested and our teams are looking for them.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Pakistan used unsuspecting customers to route funds to CRPF officer: Probe
Pakistan used unsuspecting customers to route funds to CRPF officer: Probe

Indian Express

time26 minutes ago

  • Indian Express

Pakistan used unsuspecting customers to route funds to CRPF officer: Probe

Days after the arrest of CRPF Assistant Sub-Inspector Moti Ram Jat for allegedly leaking sensitive information to Pakistani intelligence officials, Central intelligence agencies have uncovered a new layer to the espionage network — a covert funding mechanism that exploited ordinary Indian citizens. According to investigators, Pakistani officials used an unusual modus operandi to send money to Jat: instead of transferring funds directly or through their Indian handlers, they instructed unrelated individuals — mostly unsuspecting customers in business transactions — to deposit money into Jat's account, under the impression that it was part of a legitimate commercial deal. 'These were unsuspecting individuals who either struck small business deals with someone or were asked by their clients to transfer money via QR codes for services like travel bookings or currency exchange. But the account details they were given actually belonged to Moti Ram Jat,' a source with a central intelligence agency told The Indian Express. 'They had no knowledge of who Jat was or what his real role was.' This layering of transactions has made the financial trail harder to trace and added complexity to the investigation, the source said. Jat was arrested last month by the National Investigation Agency (NIA) in Delhi for allegedly sharing classified information with Pakistani agents posing as TV journalists. He had been posted with a CRPF battalion in Pahalgam, Jammu and Kashmir, and was transferred to Delhi just five days before the April 22 terror attack in which 26 civilians were killed. The probe has revealed that over the past two years, Jat allegedly sent multiple sensitive documents to his handlers in Pakistan in exchange for regular payments — Rs 3,500 per month and occasional lump sums of up to Rs 12,000 for high-value intelligence. The funds were deposited into his and his wife's bank accounts. Following the money trail, the NIA found that deposits came from various states, including Delhi, Maharashtra, Haryana, Uttar Pradesh, Rajasthan, Chhattisgarh, Assam and West Bengal. 'The pattern was clear — multiple transfers from unrelated bank accounts in different regions,' the source said. This discovery prompted simultaneous searches by NIA teams at several locations, including a shop in Alipore, a travel agency in Khidderpore, and a hotel in Park Circus in Kolkata. In one case, the owner of a travel agency was summoned for questioning over suspicious transactions. Earlier this month, the NIA confirmed the espionage links. 'The suspects had connections with Pakistani operatives, and acted as financial conduits for carrying out espionage activities in India. NIA teams have seized several electronic gadgets and sensitive financial documents, along with other incriminating materials during the searches,' the agency said in a statement. It added that several electronic devices and sensitive financial documents were seized and are being examined. According to sources, Jat has claimed that he was initially contacted by a woman who posed as a journalist from a Chandigarh-based TV channel. After regular exchanges over phone and video calls, he began sharing documents with her. A few months later, a man — allegedly a Pakistani official — took over the conversation, continuing the ruse as a fellow journalist. Payments reportedly began two to three months after initial contact and were transferred on the fourth day of every month. Investigators believe this indicates a structured and well-funded espionage operation, run from across the border but embedded within Indian financial systems using innocent intermediaries. The NIA has briefed the Ministry of Home Affairs, the CRPF, and other central agencies about the evolving methods being used by Pakistani operatives to fund and mask their activities within India.

Online scammers dupe Panchkula resident of Rs 18L in stock trading fraud
Online scammers dupe Panchkula resident of Rs 18L in stock trading fraud

Time of India

time29 minutes ago

  • Time of India

Online scammers dupe Panchkula resident of Rs 18L in stock trading fraud

1 2 3 Panchkula: The cybercrime police have registered a case against unknown individuals for allegedly duping a resident of Rs 18 lakh under the guise of offering high returns through online stock trading. No arrests have been made so far. Jagmendra Singh, 56, a resident of Sector 12A, filed a complaint stating that he was defrauded after responding to a Facebook advertisement promoting online trading. Upon engaging with the ad, he was introduced to a scheme called block trading, which promised daily profits of 10–20%. After sharing his contact details, Singh received a WhatsApp message from a woman named Aarti Bhalla, who claimed to be an assistant to Shripal Shah from Kotak Securities. She shared a profit plan for 2025, including stock details and company credentials such as Sebi registration and CIN numbers. Singh was then sent a form link and added to a WhatsApp group with around 150 members. Between May 10 and May 16, he observed daily stock recommendations and selling guidance within the group. Aarti Bhalla later guided him to install the Kotak QIB application, and a block trading specialist persuaded him to invest. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like 40세 미만이라면 이 매혹적인 게임을 하지 마세요 경복의 바다 게임 플레이 Undo On May 16, Singh invested Rs 50,000 in Vivanta Industries shares, transferring the amount to an account claimed to be Sebi-certified. The app displayed his balance, encouraging more investments. He then invested Rs 1 lakh more on May 18 and sold shares on May 19, noting a profit balance of Rs 58,727.25 on the app. Encouraged by the apparent gains, Singh made additional transfers of Rs 60,000, Rs 1,99,000, Rs 1,00,000, Rs 2,00,000, and Rs 70,000 to various accounts. On June 4, he invested Rs 11 lakh in the IPO of Scoda Tube Ltd, bringing his total investment to Rs 18,79,000. The app showed a balance of Rs 1,10,80,241. However, when Singh attempted to withdraw Rs 1,20,000 on June 10, for his son's wedding, the transaction failed. He was informed that his funds were locked in an IPO and that he needed to deposit an additional Rs 8,02,414 to unlock them. Realising he had been scammed, Singh filed a complaint with the cyber police. After verifying the facts, the police registered a case against unknown persons and are scrutinising the accounts to which the money was transferred.

Two Arrested In Rs 183 Crore Fake Bank Guarantee Scam
Two Arrested In Rs 183 Crore Fake Bank Guarantee Scam

NDTV

timean hour ago

  • NDTV

Two Arrested In Rs 183 Crore Fake Bank Guarantee Scam

New Delhi: The Central Bureau of Investigation (CBI) initiated three distinct cases on May 9, in accordance with directives issued by the High Court of Madhya Pradesh, the agency said in a release on Thursday. According to the release, these cases involve a significant financial fraud involving an Indore-based company that submitted forged bank guarantees totalling Rs. 183.21 crores to the Madhya Pradesh Jol Nigam Limited (MPJNL). In 2023, the company secured three immigration projects in Madhya Pradesh worth a staggering Rs. 974 crores from MPJNL. To support these contracts, eight fake bank guarantees valued at Rs. 183.21 crores were submitted. During initial verification, MPJNL received fraudulent email responses impersonating the official domain of Punjab National Bank (PNB), falsely confirming the authenticity of the bank guarantees. Relying on these confirmations, MPJNL awarded the firm three contracts valued at over Rs. 974 crores in this matter. The CBI launched a large-scale operation on June 19 and June 20, conducting searches at 23 locations across five states: New Delhi, West Bengal, Gujarat, Jharkhand, and Madhya Pradesh. This operation led to the arrest of two individuals from Kolkata, including a senior manager from Punjab National Bank, the CBI said. Both individuals were produced today before the local jurisdictional court in Kolkata and will be brought to Indore on transit remand, it said. The investigation so far has revealed that a Kolkata-based syndicate has been systematically fabricating and circulating fake bank guarantees to secure government contracts across multiple states. Further investigation is still on, it added.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store