Police get better three AK-49 rifles in Delta felony hideout

<!– tmc_ads_send({ “data-tmc-application”: “240527QJBmDrni”, “data-tmc-seat”: “240527FGR657jX” }) –>

Operatives of the Delta State Police Command have burst a felony hideout in Agbarho, Ughelli North Local Government Area, in its relentless struggle in opposition to crime and criminality within the locality.

The command mentioned it obtained an intelligence report from a involved vigilante member in Agbarho (title withheld) on the hideouts of some suspected kidnappers who’ve been terrorizing Ughelli, Agbarho, Warri, Sapele, and environs within the bush at Uwurghelli village by the rail tracks.

Sequel to the intelligence, the Divisional Police Officer of Agbarho Police Division, Josephine Ekebuike, swiftly detailed and led police operatives to the bush, cordoned off your entire space and carried out a search throughout which sack baggage have been discovered hidden within the bush.

Upon search of the sack baggage, three AK-49 rifles, two AK-47 rifles, and 207 rounds of seven.62mm stay ammunition have been recovered.

Related News

Consequently, the command has launched a manhunt for the fleeing suspected kidnappers.

Meanwhile, the Commissioner of Police, Olufemi Abaniwonda, counseled the DPO and males of Agbarho Division for his or her immediate response to the intelligence.

“Police-community partnership is the best for optimal results,” the police boss mentioned.

All rights reserved. This materials, and different digital content material on this web site, might not be reproduced, revealed, broadcast, rewritten or redistributed in complete or partially with out prior categorical written permission from PUNCH.

Contact: [email protected]



About Author

You may also like


Protesting Zamfara neighborhood barricades Govt House, faults troops withdrawal

There was tension in Gusau, the Zamfara State capital on Sunday, as residents of Bini village in the Maru Local

How to spice up your checking account, cellular pockets safety

Cybercriminals are constantly devising new ways to exploit vulnerabilities and steal sensitive information. DANIEL ADAJI outlines ways to safeguard your