A seemingly harmless ₹50 tip via UPI turned into a nightmare for a young man in Punjab, as it ultimately led to his arrest in connection with a high-profile grenade attack case. The incident, tied to a terror attack at the residence of former Punjab minister Manoranjan Kalia in Jalandhar, highlights how digital transactions can be swiftly traced and used in criminal investigations.
On the early morning of April 8, a grenade was reportedly hurled at the residence of BJP leader and former minister Manoranjan Kalia in Jalandhar, creating panic in the locality. Within just six hours of the attack, the Punjab Police managed to arrest two suspects by tracking a crucial UPI transaction, shedding light on how small digital footprints can lead to big breakthroughs.
According to a report by The Tribune, Satish Kumar Kaka, a resident of Bhargo Camp in Jalandhar and an e-rickshaw driver, had an unexpected passenger on the night of April 7. The passenger offered to pay via UPI and requested that the driver help withdraw cash from an ATM in exchange.
Satish, who does not use UPI or smartphones, contacted his cousin Harry through the passenger's mobile phone for assistance. Harry then agreed to receive the money in his account. The main accused transferred ₹3,500 to Harry's account via UPI. Harry subsequently withdrew the cash from an ATM in the Garra area and handed it over to the accused. For his help, Harry received ₹50 as a tip—a seemingly trivial amount that would later become a key piece of evidence.
The turning point in the investigation came when the police traced the UPI transaction used in the cash exchange. Using the mobile number and transaction trail, authorities tracked Harry and Satish within hours and arrested both from Jalandhar.
Police later revealed that the mobile phone used for the UPI payment was traced to Uttar Pradesh, indicating that the main conspirator fled to another state soon after the incident. Surveillance data further showed that the accused had arrived in Jalandhar three days before the attack, and had allegedly surveyed the area before executing the plan. Following the grenade blast, the suspect left the area within 20 minutes, heading toward the railway station.
Both Satish and Harry were presented before a local court, which ordered six days of police remand for further questioning. Authorities believe that the arrested duo may not have been aware of the broader plot, but their involvement—however indirect—played a role in facilitating the crime.
Meanwhile, the search for the prime accused continues, with officials expressing confidence that they are close to apprehending him. The use of digital payment tools, once hailed purely for their convenience, has proven to be a double-edged sword in this case, serving as both a tool for minor transactions and a means for law enforcement to swiftly crack a major case.
This case underscores how digital transactions, even as small as ₹50, leave behind a traceable footprint. In a world increasingly driven by UPI and mobile payments, individuals must be cautious about who they interact with digitally—especially in situations involving strangers or unverified sources.
What started as a simple favor involving an ATM withdrawal and a modest tip, has turned into a legal and criminal ordeal for two unsuspecting men. It’s a stark reminder of how cyber forensics and digital tracing have become crucial tools in modern law enforcement.