Shah Latif police have caught two suspects involved in forcing victims to transfer cash from banking apps at gunpoint.
The suspects had robbed a citizen at gunpoint and snatched Rs20,000 cash and a mobile phone. They then forced him to unlock the phone and used the online banking application to transfer Rs300,000 before making good their escape.
The incident took place a few days ago in Shah Latif Town. The affected citizen immediately reported the incident to Shah Latif police, who took action and apprehended the two suspects.
Earlier, on October 30, four foreign nationals, including a woman, were allegedly robbed in the upscale Clifton area.
All four foreign nationals belonging to Poland have left the country without approaching the police for any legal proceeding, a senior police officer told The Express Tribune.
The incident came to light when a video of the brazen heist started doing rounds on the social media setting the police and the Sindh government into disaster control mode with the CM admonishing the police chief and home minister telling his department to pull up its socks.
A citizen recorded the video from his mobile phone while sitting in his car at a safe distance from the crime scene. It can be seen in the video that a car driver stopped four foreigners on pretext of asking for something.
The suspect snatches dollars and other valuables from the Polish nationals and also physically assaults one for putting up resistance, leaving him slightly injured.
SSP South Sajid Saduzai said that the Polish citizens have not contacted the police so far and per rep[orts they have already the country.
However, he said, after receiving the footage of the incident, the police started an investigation. The vehicle used in robbery is in the name of a private company and investigation is being carried out in this regard. He dispelled reports that the suspects were in police uniform, "they were in security guards' uniform."
COMMENTS
Comments are moderated and generally will be posted if they are on-topic and not abusive.
For more information, please see our Comments FAQ