Attempt to attack Special Public Prosecutor in Jhansi: 7 days ago played a role in getting 8 convicts to life imprisonment, suspect ran behind car


Jhansi25 minutes ago

  • copy link

The suspect ran behind Vijay Kushwaha’s car.

A person has tried to attack Special Public Prosecutor Vijay Kushwaha, who played a key role in getting 8 accused life imprisonment in Jhansi polytechnic gangrape case. On Friday night, he went out for a walk with his family. In the Nawabad police station area, a person grabbed the swivel of the car’s gate and ran after a long distance. Somehow he managed to escape and immediately informed the police. The police is scrutinizing the CCTV footage to identify the accused.

Wife and children were also in the car

On October 3, the eight convicts of the gangrape at the Polytechnic College were sentenced to life imprisonment. In this case, Vijay Kushwaha appeared on behalf of the prosecution. He is the son of BJP leader and Vice President of International Buddhist Research Institute Hargovind Kushwaha. He was going to Sadar Bazar with wife and two children by car at around 8 pm on Friday night.

The suspect was carrying a red bag

Vijay Kushwaha told that “I filled petrol in the car from a pump located on Elite-Sipri Road. As soon as the car moved forward, a suspicious person grabbed the handle of the driver’s gate. I immediately locked the car and threatened him by opening a little glass. But he grabbed the handle and started running with the car.

When asked to call the police, he left the handle and kept running behind the car for some distance. He was staring, but said nothing. A red colored bag was also taken. On reaching the red light immediately called the CO City. CO City Rajesh Rai said that the footage of CCTV cameras is being scrutinized to identify the accused.

There is more news…



Source link

https://sluicebigheartedpeevish.com/u4j5ka2p?key=f9b1fb0aab078545b23fc443bdb5baad

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: