2 army officers thrashed, female friend brutally gang-raped in Madhya Pradesh

News Network
September 12, 2024

Indore: Two Army officers were thrashed and one of their two women friends was allegedly gang-raped by armed miscreants when they were out on a picnic in Madhya Pradesh's Indore district in the wee hours of Wednesday.

Additional SP Rupesh Dwivedi said on Wednesday night that six suspects had been identified, two of whom have been detained from the jungles.
Both Army officers were injured in the mob attack. One of them managed to dial his senior officers but by the time police arrived from Mhow, 30km away, the woman had already been gang-raped.

The two Armymen are undergoing the Young Officers course at Infantry School, Mhow, SP Rural Hitika Vasal said.

According to the complaint filed by one of the lieutenants, the four of them had driven to Ahilya Gate near Jam Gate on Mhow-Mandleshwar road on Tuesday night. Built in 1791 by Rani Ahilyabai Holkar, Jam Gate is a popular picnic spot for its stunning views of the valley below, and the temple near Ahilya Gate draws a lot of devotees.

Around 2.30am, one of the officers and his female friend were in the car when 6-7 men attacked them. The other pair was atop a nearby hillock then and rushed down on hearing the confrontation.

The complaint says that the attackers held the pair they had attacked in the car hostage at gunpoint. They asked the other officer to bring Rs 10 lakh in ransom. This gave the officer - who was accompanied by the other woman - a chance to inform his seniors at Mhow, who in turn alerted police.

A large police force was dispatched to the spot but the attackers had escaped into the forest by then. All four of them were brought to Mhow Civil Hospital around 6.30am where a medical examination confirmed one of the women had been gang-raped. As per the duty doctor, there were injuries on both officers' bodies. "The complainant has alleged that the woman who was with him was raped, and they were looted as well," SP Vasal said.

Badgonda police registered a case under BNS sections 70 (gang-rape), 310-2 (dacoity), 308-2 (extortion) and 115-2 (voluntarily causing hurt), plus sections of Arms Act.

Forces from four police stations combed the jungles near Chhoti Jaam village and picked up two suspects.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 26,2025

Mangaluru, Nov 26: Mangaluru East police have registered a case following a sophisticated online fraud where a 57-year-old local resident was allegedly cheated out of ₹13.4 lakh after being targeted on Facebook.

The scam began in February when the complainant, while browsing Facebook reels, was contacted by a woman identifying herself as "Lillian Mary George" from London. After establishing a chat relationship, the woman claimed she would visit India in November and bring a significant sum of money.

The trap was sprung on November 15, when the victim received a call from a woman named "Sonali Gupta," who claimed Lillian had arrived at Mumbai International Airport but was detained by customs. The fraudsters convinced the man that Lillian was carrying £25,000 (about ₹26 lakh) in traveller’s cheques and 1 kg of gold (valued at around ₹30 lakh).

Under the pretense of clearing these items, the victim was asked to make numerous online transfers between November 15 and 18 for various bogus charges, including:

•    "Pounds exchange registration"
•    "Customs declaration issues"
•    "Discount charges"
•    "Money-laundering charges"

Believing the fictitious story, the complainant transferred the cumulative sum of ₹13.4 lakh to various bank accounts provided by the fraudsters. He realised he was cheated when the culprits later promised a refund within two days but stopped answering his calls. The Mangaluru East police are now investigating the case, which highlights the continuing threat of transnational cyber fraud using social engineering and promises of fictitious wealth.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 1,2025

hindutvaboy.jpg

Udupi, Dec 1: A horrific case of alleged rape has unfolded in Udupi, where a worker from a Hindutva organisation, previously arrested and released on bail for harassing a young woman, is now accused of waylaying and sexually assaulting her.

The arrested individual has been identified as Pradeep Poojary (26), a member of the Hindu Jagarana Vedike's Nairkode unit in Perdur.

Poojary had allegedly been relentlessly harassing the young woman, pressuring her to marry him. When she bravely stood up to him and refused his demands, she filed a formal complaint at the Hiriyadka police station. He was subsequently arrested in that initial harassment case but was later granted bail.

According to police reports, driven by the same malicious grudge, Poojary allegedly intercepted the woman again on November 29. While she was walking through a deserted area, the accused is claimed to have threatened her by grabbing her neck. When she again refused to marry him, he allegedly proceeded to rape her.

The survivor immediately informed her family about the traumatic assault. Following this, her parents lodged a complaint at the Udupi women’s police station.

Police arrested Poojary again and produced him before the court. He has since been remanded to judicial custody.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 21,2025

Tejas.jpg

An Indian Air Force (IAF) Tejas fighter jet crashed on Friday, November 21, afternoon during its aerial demonstration at the Dubai Air Show, plunging to the ground at around 2:10 pm local time while performing a manoeuvre before thousands of spectators.

The IAF confirmed the incident, stating that a Tejas aircraft participating in the show had crashed and that further details were being gathered. An Air Force spokesperson said more information would be shared after initial assessments.

The crash sent thick black smoke billowing into the sky near the airport, causing panic among visitors, including families and children who had gathered to watch the display. Authorities have not yet confirmed whether the pilot managed to eject before the aircraft went down. Emergency response teams rushed to the scene, and officials have not released information on casualties or damage so far.

The Tejas is a 4.5-generation, multi-role fighter aircraft developed indigenously by Hindustan Aeronautics Limited (HAL). Designed for versatility, it is capable of offensive air support, close combat, ground attack missions and maritime operations. The aircraft family includes single-seat fighters and twin-seat trainers for both the Air Force and Navy.

HAL describes the latest version, the LCA Mk1A, as the most advanced in the series, featuring an AESA radar, an upgraded electronic warfare suite with radar-warning and self-protection jamming, smart multifunction displays, a digital map generator, a combined interrogator–transponder system and a modern radio altimeter. These enhancements significantly improve the aircraft’s combat capability and survivability.

Further updates from IAF and UAE authorities are awaited.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.