
Rochdale grooming gang leader ‘throws PARTIES at UK home on street full of kids' after Pakistan refused to take him back
Up to 47 girls, some as young as 12, were trafficked and raped by the grooming gang
FREE TO ROAM Rochdale grooming gang leader 'throws PARTIES at UK home on street full of kids' after Pakistan refused to take him back
Click to share on X/Twitter (Opens in new window)
Click to share on Facebook (Opens in new window)
A VILE Rochdale grooming gang ringleader has reportedly been throwing wild parties at his UK home near kids after Pakistan refused to take him back.
Qari Adil Rauf lost an appeal against deportation in 2018 but has never been sent back to Pakistan.
Sign up for Scottish Sun
newsletter
Sign up
4
Qari Adil Rauf now lives in the same area he committed his vile crimes
Credit: nb press ltd
4
He served just two and a half years of a six year prison sentence
Credit: PA
Rauf, 55, was among nine men jailed in 2012 for raping and trafficking young girls across the north of England.
Up to 47 girls as young as 12 were plied with alcohol and drugs and gang-raped across Rochdale during a two-year reign of terror.
Rauf was due to be deported to Pakistan in 2014 after serving just two years and six months of his six-year sentence.
He has avoided deportation by destroying his passport and claiming he is stateless, Pakistan has refused to accept the convicted paedophile without valid travel documents.
The fiend remains in Rochdale where his victims are forced to live alongside him.
It has now emerged the fiend has been throwing wild parties at his home with large numbers of people turning up.
Neighbours say they have been left terrified to let their kids play outside and remain constantly vigilant of their movements.
Rauf now lives in a terraced house under extra protection with neighbours claiming he has a panic button linked directly to Greater Manchester Police in his home.
Residents living on the same street have said the ringleader of the grooming gang throws parties with large numbers of people turning up.
Ethnicity of child sex abuse suspects will be logged after truth about Asian grooming gangs was 'dodged for YEARS'
Angie Harrison, 45, a mum of two girls aged seven and eight, told the Mail Online: "He has loads of people there, having parties and we don't like the look of the people who come.
"We are back-to-back with his house. I don't like letting the kids in the garden. I have told them all about him. It is disgusting.
"It is horrible. It is awful when you have to sit out watching your kids. We're the ones watching over our own kids like prison guards."
Rauf reportedly lives just two doors down from a childminder who said she would pay for travel documents if it meant he was removed.
Residents say they are constantly reminded of grooming gangs when they pass by the vile paedophile's home.
Rauf now lives in the same area he committed his crimes with victims forced to see him while he is out and about.
The paedophile has been spotted being chauffeured around by his son by angry locals who say there is nothing they can do to get rid of him.
4
Rauf was convicted alongside nine other men
Credit: PA:Press Association
4
He allegedly throws parties at his home with dozens of guests turning up
Credit: nb press ltd
Residents say they are surprised the paedophile hasn't been targeted by locals with one claiming he would smash the vile man's windows himself.
Neighbours have been told by cops not to say anything to Rauf as he has 'done his time' and are reportedly removed by police if they stray to close to his home.
One local claimed they shouted "paedo" at the vile man if their windows are open but Rauf just shrugs it off.
Lena Carter, 64, who has lived on the street for nearly 30 years, told the Mail Online that her daughters used to play in Rauf's back garden.
She added: "I understand he has been banned from the mosque. He walks around in Western clothing now unless his friends are around.
"What can we do to get him out if the law says he can stay? The police will turn up and remove you if you are near his house.
"They tell us to leave him alone. I don't think any of them work apart from the son who sometimes runs the father around in his car."
The news comes after it was revealed Pakistan is refusing to take Rauf and his joint ringleader Adil Khan back despite the UK ordering their deportation.
A Pakistani official claimed it would be "extremely difficult' to allow in such dangerous criminals.
The battle has been further complicated by Rauf and Khan renouncing their Pakistani citizenship.
They both exploited a loophole by ripping up their passports, becoming "stateless", which can block a deportation.
Rauf and fellow gang leader Khan, who got a 13-year-old girl pregnant, lost a lengthy fight in 2018 against deportation alongside a third member of the gang, Abdul Aziz.
They subsequently launched another appeal- insisting the order breaches their human rights as they both have wives and children in the UK.
Their appeals were rejected but both have remained in Britain ever since.
The subject of grooming gangs has been thrust back into the spotlight this week following a bombshell report by Baroness Casey.
The scathing review found councils, police and the Home Office repeatedly "shied away" from dealing with uncomfortable questions on the ethnicity of rapists who targeted young girls.
Rauf and Khan were ringleaders of a prolific grooming gang in Rochdale, which has been plagued by sexual exploitation.
Khan got a 13-year-old girl pregnant and trafficked another girl, 15, to others - using violence when she complained.
He was sentenced to eight years in 2012 and released on licence four years later.
Dad-of-five Rauf trafficked a 15-year-old girl and raped her in a secluded area before taking her to a flat in Rochdale where others had sex with her.
He was caged for six years and released in November 2014 after serving two years and six months of his sentence.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Scottish Sun
44 minutes ago
- Scottish Sun
Why your pics, texts and money are in danger after major ‘data leak' even if your info wasn't exposed
Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) DON'T fall foul of a common scam after reports of a major online leak – even if you haven't had any private info exposed. Just last week, security experts said they'd uncovered as many as 16 billion leaked nuggets of personal info linked to popular apps and websites. Sign up for Scottish Sun newsletter Sign up 3 Cyber-criminals will hope to take advantage of the news around a 'data leak' Credit: Alamy These reportedly included leaked logins – private usernames and passwords belonging to unsuspecting users. Security experts have debated over how "new" the info in the databases is – but one thing is certain: there's plenty of personal data circulating online. Chances are, at least some of your info will have been exposed over the years through a combination of breaches and leaks. But even if your data hasn't been exposed, this latest "database leak" still spells trouble for your online security, experts have told The Sun. That's because when there's news of a big "leak" like this, cybercriminals often target web users with related scams. Rik Ferguson, the VP of security intelligence at Forescout, told The Sun that this "opens the floodgates for scammers". "Honestly, it doesn't even matter that the data itself is mostly old, recycled, or even completely made up," Rik told The Sun. "The headline grabs attention, it spreads fast, and that's all the cybercriminals really need. "What we'll see now, almost guaranteed, is a wave of social engineering, things like fake tech support calls, emails claiming your accounts are compromised, texts that urge you to click a link "right now" to secure or update something." He added: "Cybercriminals don't need fresh data; they just need fresh worry. This kind of news gives them a credible excuse to contact people out of the blue, sounding plausible and urgent. Deepfakes more 'sophisticated' and dangerous than ever as AI expert warns of six upgrades that let them trick your eyes "So, the best advice is to slow down, take a breath. Treat unsolicited contact (or scare stories from well-meaning friends on Facebook) with a solid dose of cynicism. "Your first response might be to react quickly, especially if the message is laced with urgency or fear. But that urgency is the oldest trick in the book. Scammers rely on pressure. "They want you anxious, flustered, or off balance. They want you to be doing, not thinking. If someone's telling you to act immediately, that's your cue to pause." For instance, you might see tech support scams or "infected computer" warnings. Criminals will be hoping that you're worried enough about the news of a leak that you might act without thinking – clicking on a dodgy link or calling a number because you're worried about your cybersecurity. For instance, after the Marks & Spencer cybersecurity incident, experts warned of the danger of crooks taking advantage of the confusion around the attack. "Stay vigilant for phishing messages pretending to be from M&S or other companies you've dealt with," said NCC Group threat intelligence head Matt Hull. A similar warning came from Check Point's Charlotte Wilson, who said: "We often see a spike in phishing emails, fake delivery texts and scam calls after breaches like this, particularly when order history or usernames are involved." 3 Crooks often use tech support scams to install dangerous apps on your device Credit: Alamy And the same advice is true for this latest news: it's a prime chance for crooks to trick concerned users into making a mistake. "Discoveries like this breach are a pertinent reminder of just how easy it is for sensitive data to be unintentionally exposed online," said Keeper Security chief Darren Guccione. He added: "When login data is left unprotected, it can provide fuel for phishing attacks, account takeovers and identity fraud." But some experts suggested there wasn't any major reason to panic. Brian Higgins, of Comparitech, told The Sun: 'The data referenced in the media is an amalgamation of several previously reported incidents. 'So it's reasonable to expect that any users affected should have been aware of the problem and taken action when the individual threats were first identified "The knee-jerk headlines may well fuel a slight uptick in activity from unscrupulous vendors or cyber criminal organisations. 'There's a possibility some may exploit the fact that the data has been collected in a single repository, for example. Still, since it's not a new breach and the facts are slowly becoming clearer, it's doubtful any major impact will ensue." HOW TO SPOT THE SIGNS OF A TECH SUPPORT SCAM Tech support scams can work in several different ways. But they all have the same end goal: to scoop up your info, put dangerous "malware" on your devices, or steal your money. You might receive a message over text or email – or even a phone call – saying that your device has been compromised. DON'T PANIC – BUT ACT FAST Here's advice from The Sun's tech editor Sean Keach... This is a massive breach of privacy – it's not the first, and it won't be the last. There's no surefire way for you to avoid being caught up in an attack like this, and you can't take back the info now it's out there. But what you can do is safeguard yourself against sinister crooks using this info against you. Step 1 The main fear here is that criminals have bagged a load of passwords. That's why you need to switch on two-factor authentication on every account that you have. Normally that's a login code that is sent to you via SMS text. They prevent crooks from logging into your account even if they know your password. Step 2 Even better, don't bother with SMS and use a proper authenticator – like the Google Authenticator, a free app that you can download right now. This generates the same kind of log-in code, but it's safer than SMS, which is an old and more easily-hacked system. Step 3 Also, make absolutely sure that you're not re-using passwords anywhere. If crooks have one password and you've re-used it, they now have access to several of your accounts. Use a password manager like your iPhone's iCloud Keychain or the Google Password Manager. They will generate strong and unique passwords for all of your accounts – and then remember them so you don't have to. Picture Credit: Sean Keach And you'll be asked to hand over a log in, install some kind of security software, or making a tech support payment. Depending on what you hand over, you could find your online accounts broken into, your bank balance wiped out, or your computer spied on. Once a crook breaks into your accounts or device, they can potentially spy on your texts or photos, make purchases, and so much more – so not falling for scams is extremely important. Never hand over any info or money to someone who has contacted you out of the blue. If they're claiming that they're from a reputable organisation – like Microsoft or Apple – then you'll want to contact the company directly using the number on their official website. Don't use any contact info that you've been sent by a stranger, as it's easily faked. "Whether it's an email that looks like it's from your bank, a text pretending to be your delivery service, or a call claiming to be tech support, the smart move is always the same, don't respond directly, go to the source," Rik told The Sun. "Log in via the official website, not a link you received out of the blue. Call the company back on a number you already know or can find on their website. "Or just check in with someone you trust, a quick gut-check with a colleague or friend can save you a whole world of pain." If someone is rushing you into making a decision, especially when private info or money is involved, then that's a major red flag that something is amiss. Reputable cybersecurity and tech companies won't just text you out of the blue to tell you that you've been hacked and need to pay a fee. And if they're asking you to click a link to install an app on your machine, that's a clear warning sign that they're trying to compromise your device. If you ever install any cybersecurity software, do so by going to the official website of a reputable company. Don't install anything sent to you by a stranger – it's dangerous. HOW TO SEE IF YOU'VE BEEN CAUGHT UP IN A LEAK If you're worried that you've been caught up in a breach, there's an easy way to check. Go to the website HaveIBeenPwned here. This website tracks lists of leaks and breaches over the years. 3 The HaveIBeenPwned website can reveal if your email address has been caught up in a data leak Credit: HaveIBeenPwned / The Sun And you can enter your email address to see if it's been caught up in any. You'll be able to see the exact leak that your email was exposed in, as well as any linked data – like an address, phone number, or password. The website will also send you alerts when your email address is found in another leak or breach. That way, you can quickly react and change your password, add two-factor authentication (like a text code) for logging in, and locking down your accounts.


Scottish Sun
an hour ago
- Scottish Sun
Notorious Iranian prison is BLITZED as ‘Israel blows up gate to Evin jail in bid to free Ayatollah's fiercest critics'
Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) TEHRAN'S notorious Evin Prison has been blitzed by an Israeli airstrike, according to officials A drone is thought to have blown up the jail's gates in an apparent effort free the regime's fiercest critics. Sign up for Scottish Sun newsletter Sign up 4 Evin Prison is notorious for holing up political prisoners Credit: Twitter 4 Footage shows a major explosion at its gates, and the IDF announced it had struck Credit: Twitter 4 A dingy workshop inside the walls of Evin Prison Credit: AP The prison is notorious for shackling political prisoners, journalists and even Brits on bogus charges. Isareli PM Benjamin Netanyahu has repeatedly called for Iran's people to rise up against the regime. Busting out its ardent critics could be an attempt fan the flames of rebellion, by returning anti-Ayatollah activists to the streets. The IDF acknowledged the strike: "Following orders from PM Netanyahu and Defense Minister Katz, the IDF is striking regime and security targets in central Tehran — including the Basij HQ, Evin Prison, the 'Israel destruction clock,' IRGC internal security HQs, and more." Some political prisoners have been banged up in the hellhole for decades. Reports on the horrific conditions have come from those who manage to make it out. Marziyeh Amirizadeh, 43, spent 259 days in Evin, Iran's most notorious prison, where British mother Nazanin Zaghari-Ratcliffe was also held. Here, Marziyeh reveals the horror she endured – and how she rebuilt her life after her release as told to Kate Graham. More to follow... For the latest news on this story, keep checking back at The U.S. Sun, your go-to destination for the best celebrity news, sports news, real-life stories, jaw-dropping pictures, and must-see videos. Like us on Facebook at TheSunUS and follow us on X at @TheUSSun


Scottish Sun
3 hours ago
- Scottish Sun
Brit, 22, arrested at Disneyland Paris after ‘trying to marry girl, 9, in bizarre ceremony at Sleeping Beauty castle'
Guests were even given bracelets with the names of the 'bride and groom' DISNEY CREEP Brit, 22, arrested at Disneyland Paris after 'trying to marry girl, 9, in bizarre ceremony at Sleeping Beauty castle' Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) A BRIT has been arrested at Disneyland Paris after allegedly trying to stage a mock wedding with a nine-year-old girl. The suspect, 22, was reportedly the "groom" in the twisted ceremony which played out before 100 horrified guests at the iconic Sleeping Beauty castle. Sign up for Scottish Sun newsletter Sign up 4 Disneyland Paris rented out the iconic castle grounds to the organisers under the belief it was a genuine wedding Credit: Alamy 4 French cops arrested the Brit 'groom' and the girl's mum Credit: Alamy 4 Guests, recruited online through ads, thought they would be attending a genuine wedding rehearsal Credit: Getty Disney staff immediately called police upon spotting the child, of Ukrainian nationality, in a bridal dress with four-inch heels taped to her feet. The lifelike ceremony - complete with white chairs, a giant cake, musicians and the castle - was reportedly attended by the girl's family and a large crowd at dawn on Sunday. Police arrested the man, along with the girl's 41-year-old mum, who is believed to be Ukrainian. The "groom" told cops the ceremony was meant to create a video for social media. Organisers had booked the space for $130,000 (£111,000), claiming it was for a genuine wedding ceremony, according to French network BFM TV. Footage obtained by the network showed around 100 seated guests awaiting the ceremony, as a female violin trio played before a flower-strewn stage. A statement was issued by the prosecutor's office in the town of Meaux, saying: "Four people were arrested and questioned: the groom, who was believed to be the organiser of the event and is presumed to be British and aged 22; the mother of the child, a 41-year-old Ukrainian woman; and two Latvian nationals aged 55 and 24." A 55-year-old man claimed he was hired to play the role of the bride's dad for 12,000 euros (£10,266) - and only discovered her age at the event, local news reports. Meanwhile, the "guests" were recruited online through ads looking for 200 adults and 100 children - aged five to 15 - to take part in a wedding "rehearsal" at Disneyland. The extras said they had been driven from central Paris on buses at 5am and had been handed pink bracelets bearing the names of the "bride and groom". Huge fire in Paris sends black smoke across city of light as fire crews scramble to extinguish blaze They were told the filming was strictly confidential, BFM TV reports. The prosecutor's statement added "police custody of the British suspect and a Latvian national was also extended on charges of fraud and money laundering". Disneyland Paris was reportedly deceived about the nature of the event. The organiser is said to have assumed the "identity of a Latvian national", using "false documents to secure the conclusion of the contract for privatising the park", BFM TV reports. Disneyland Paris told French newspaper Le Parisien that the event was immediately shut down by its team and that guests were stopped from entering the premises. A criminal investigation has opened, according to the prosecutor's office. It added the young girl has not suffered any violence, as per a medical examination. Officials say they are unsure about the nature of the event, including whether this was a prank. The Brit "groom" claimed that he was the director of a production company and they were shooting a video, a police source told Le Parisien. A witness who claimed to have been a wedding guest told the newspaper: "We all thought we were going to attend a wedding... "Everyone was stunned, no one expected it. Disneyland did things very well. "They cancelled everything as soon as they realized the bride was a child. We were shocked to see that." Another witness, named Yeleen, who attended the ceremony as a guest with her daughter, said: "I saw a little girl dressed in white. I saw her hair prepared with curls and a lady picking her up in her arms. "At that moment, I was shocked. I realised when I saw the child. It was atrocious." The prosecutor's office said: "So it wasn't a wedding, but a staged wedding filmed with around a hundred extras. "They privatized Disneyland Paris, pretending it was a real wedding." The two suspects are being questioned over "fraud and breach of trust" against Disneyland Paris, the prosecutor's office said. They are set to appear before a judge at Meaux judicial court on Monday as part of a formal judicial investigation. In 2019, Michael Jackson reportedly exchanged rings with a nine-year-old child "bride" in a creepy mock wedding ceremony at the Neverland Ranch, court documents claim. A lawsuit filed on behalf of accuser James Safechuck claims his father was then paid $1million hush money after the secret union at his Californian mansion.