Delhi CM Rekha Gupta Attacked; Granted Z-Category Security Cover

21 August, 2025

Delhi Chief Minister Rekha Gupta was attacked by a man from Gujarat during a public grievance meeting at her residence. The accused was immediately detained and later sent to police remand on an attempt to murder charge. Following the serious security breach, the Union Home Ministry accorded the Chief Minister Z-category security. A contingent of the Central Reserve Police Force (CRPF) has now taken charge of her protection, upgrading the security previously provided by the Delhi Police.

Unpacked:

What is Z-category security, and how does it differ from other security levels in India?

Z-category security is a high-level VIP protection detail in India, typically involving 22–25 armed commandos, round-the-clock protection, escort vehicles, and advanced surveillance. It is below Z-plus but above Y and X categories, each with decreasing numbers of personnel and resources.

Who was the attacker, and what is known about his background or motive?

The attacker was Rajesh Bhai Khimji Bhai Sakaria, a 41-year-old from Rajkot, Gujarat. He posed as a petitioner before assaulting the Chief Minister. Police describe him as a 'serial offender' with several past cases in Gujarat, many of which ended in acquittal. The motive is under investigation.

What new security measures have been implemented for Rekha Gupta after the attack?

Following the attack, CRPF commandos replaced Delhi Police for her close protection, deploying more personnel at her residence and public appearances. Access at public meetings is now tightly controlled, and advanced security gadgets have been introduced to prevent direct approach by individuals.

Has there been any political or public reaction to the security breach and subsequent changes?

The attack is widely regarded as a serious security lapse, prompting immediate action by the Union Home Ministry. Political leaders have called for accountability and enhanced protection for high-profile officials. The public discussion centers on the adequacy of existing security protocols for elected officials.