
Representative image of 'Crime'
Credit: iStock Photo
Bengaluru: The accused spent 3 months mapping, shadowing and rehearsing the movement of the CMS Info Systems . They chose Wednesday (Nov 19) as the day to strike — when cash replenishment in multiple ATMs is typically at its peak.
The police told DH that the suspects even did a 2-week recce of the area.
The gang conducted multiple dry runs, trailing the cash-van along its daily replenishment circuit across south Bengaluru. The suspects allegedly noted exact halt points, crew’s break timings, blind spots and low-surveillance stretches, eventually identifying junctions most vulnerable.
They refrained from using mobile phones during the heist to avoid detection. They used an internet calling App and switched languages mid-conversation to confuse potential witnesses and delay profiling.
More than two vehicles were used and their number plates changed frequently to throw cops off their trail. Non-serialised currency was stolen, making post-crime tracing nearly impossible. The accused also relied on real-time media updates, which briefly risked exposing early police leads. Constable Naik is said to have played a key role in supervising the entire operation.