Honey-trap: Girl runs away with Rs 1-cr; caught after going live on Facebook

[email protected] (India Today)
May 17, 2017

Mumbai, May 17: Technology is surely a man's best friend, but in this case, the technology turned out to be Rajasthan Police's 'Facebook' best friend.

Shikha4

Working as a DJ in a Mumbai hotel, 21-year-old Shikha Tiwari, aka DJ Adaa, was recently arrested by Special Operations Group (SOG) from Rajasthan after she ran away with a whopping Rs 1 crore to Mumbai.

The cops were able to nab the young DJ after she went live on her Facebook account making it easier for them to track her location.

The 21-year-old DJ was being tracked by SOG since December 2016 after her name cropped up for more honey-trapping cases.

Shikha was a part of a blackmailing gang, a gang which used to target high-profile real estate agents, doctors etc. Around 33 people have been arrested from the gang, which included five girl members as well. The racket was able to shell out around Rs 20 crore from people who fell into their traps.

Sunit Soni, a Jaipur-based doctor, met Shikha when she visited his clinic for a hair-transplant appointment. Shikha befriended Soni and got closer to him.

After sometime, the couple went to Pushkar for a trip where Shikha scared him off with a false rape allegation and demanded Rs 2 crore. She threatened him to go to the police after he denied giving her the money.

Shikha lodged an FIR against him after the doctor denied falling into her trap. The doctor was arrested and kept behind bars for 78 days after being acquitted. On December 24, 2016, the doctor filed an official complaint against Shikha.

The doctor then decided to settle the case with the 21-year-old DJ and gave her Rs 1 crore and Rs 5 lac. Shikha fled the scene and went to Mumbai thinking she won't be caught, but her addiction of social media took her down.

She went live on Facebook while she was DJ-ing at a Mumbai hotel and made it easier for Rajasthan police to nab the lady after five long months of search.

Shikha2

Shikha3

Shikha1

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 5,2025

Mangaluru: In a significant step to curb online hate and intimidation, Mangaluru City Police have registered a suo motu case against multiple Instagram accounts accused of circulating alleged provocative and threatening content.

While monitoring social media activity on Tuesday, Kankanady Town PSI Anitha Nikkam identified the Instagram handle ‘team_targetttt_900’ for posting a hate message alongside images of lethal weapons. Another account, ‘team_nagara_900’, allegedly shared a threatening post targeting activist Bharath Kumdelu, tagging additional pages such as KARAVALI-OFFICIAL.

Several other accounts — including ‘immu_bhai.fan’, ‘target_boy_900’, ‘kings_of_manglore’, ‘team_target_boys.900’, ‘arshad_mangalore’, ‘target_ka19_ullal’, ‘team_target__’, ‘troll_tigersz_900’, ‘tr_group_900’, and ‘team_target_900’ — are also under scrutiny for spreading similar inflammatory material, police said.

Authorities have urged citizens, especially young social media users, to report suspicious pages and avoid engaging with groups that glorify violence or threaten individuals. Online hate can quickly escalate into real-world harm, and police stress that sharing or promoting such content can attract legal consequences.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 2,2025

Mangaluru, Dec 2: Mangaluru International Airport responded to a medical emergency late on Monday night. Air India Express flight IX 522, travelling from Riyadh to Thiruvananthapuram, was diverted to Mangaluru Airport after a passenger in his late 30s experienced a medical emergency on board.

The Airport’s Operations Control Centre received an alert regarding the passenger’s health condition. The airport activated its emergency response protocol, mobilising the airport medical team and coordinating with stakeholders including CISF, immigration, and customs. 

Upon landing, airport medical personnel attended to the passenger, assessed his condition, and arranged to shift him to a local tertiary-care hospital for further treatment. The passenger’s relatives accompanied the passenger, who incidentally received necessary medical care on board, which helped stabilise the situation.

Following the handling of the emergency, the flight departed for Thiruvananthapuram at 2:05 am on Tuesday.

"We appreciate the cooperation of all parties involved, and this incident reaffirms our ongoing commitment to prioritising passenger safety and readiness to respond to unforeseen emergencies with professionalism and care," the Airport spokesperson said. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 7,2025

Mangaluru, Dec 7: A 34-year-old fruit and vegetable trader in Mangaluru has reportedly lost ₹33.1 lakh after falling victim to an online investment scam run through a fake mobile app.

Police said the scam began in September, when the victim received a link on Facebook. Clicking it connected him to a WhatsApp number, where an unidentified person introduced a high-return investment scheme and instructed him to download an app.

To build trust, the fraudster asked him to invest ₹30,000 on September 24. The trader soon received ₹34,000 as “profit,” convincing him the scheme was genuine. Over the next two months, he transferred money in multiple instalments via Google Pay and IMPS to different scanner codes and bank accounts shared by the scammers. Between September 24 and December 3, he ended up sending a total of ₹33.1 lakh.

When he later requested a refund of his investment and promised returns, the scammers demanded additional payments, claiming he needed to pay a “service tax” first. Even after he paid a small amount, no money was returned, and the scammers continued pressuring him for more.

A case has been registered at the CEN Crime Police Station.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.