2-yr-old boy retrieved from 150-ft borewell after 110 hours dead

Agencies
June 11, 2019

Sangrur, Jun 11: The two-year-old boy who was pulled out on Tuesday from a 150-foot-deep abandoned borewell in a village in Punjab's Sangrur district after six days was declared dead.

The child, Fatehveer Singh, was brought to the PGI hospital in Chandigarh, some 130 km from the accident spot, soon after he was retrieved from the well, officials said.

However, there is no official confirmation from doctors about the health of the child.

Chief Minister Amarinder Singh expressed grief over his death.

"Very sad to hear about the tragic death of young Fatehveer. I pray that Waheguru grants his family the strength to bear this huge loss," he said in a tweet.

"Have sought reports from all DCs (Deputy Commissioners) regarding any open bore well so that such terrible accidents can be prevented in the future," he added.

As he was retrieved, the child's grandfather Rohi Singh told the media on the spot: "Why was he taken to the hospital when he is no more."

He claimed that the body of the child had grievous wounds. "He was pulled out (of the borewell) by using strings."

A health worker in the PGI's emergency ward told reporters the child's body was badly decomposed and smelly.

"It seems the child died two days ago," he added.

The boy, who had been trapped in the abandoned borewell since June 6, was retrieved by the rescuers of the National Disaster Response Force (NDRF).

Sangrur Deputy Commissioner Ghanshyam Thori said it was one of the toughest operations carried out by the NDRF.

Lack of expertise and technical snags one after another were blamed for the delay in the massive rescue operation.

Special teams had been working day and night in a tunnel that was dug parallel to the abandoned borewell.

Meanwhile, tension prevailed among villagers in Sangrur over the inability of the state government to timely retrieve the toddler.

Thousands of angry protesters blocked the road leading to Bhagwanpura village in Sunam sub-division, some 15 km from district headquarters at Sangrur, where the incident occurred.

On March 22, a one-and-a-half-year-old boy, who fell into a 70-foot narrow borewell in Haryana's Hisar district, was rescued after a 48-hour operation.

In July, 2006, Army engineers in Haryana's Kurukshetra town had rescued a little boy trapped in a 60-foot well for two days.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 7,2020

New Delhi, Jan 7: When a reign of terror was unleashed by "masked goons" in the Jawaharlal Nehru University (JNU) on Sunday, Delhi Police registered two cases against varsity students union president Aishe Ghosh, who was badly injured in the attack, within a span of five minutes.

The registration of cases on two separate complaints against Ghosh and other students filed by JNU security department on January 3 and January 4 were registered on Sunday night when the violence was on, triggering questions about the motive behind the timing.

While the FIRs against Ghosh and others were registered between 8.44 pm and 8.49 pm after the JNUSU president was admitted to AIIMS, an FIR on the Sunday violence was registered on Monday at 5.36 am against unknown persons. The Sunday violence case has been transferred to Crime Branch for further investigations.

Questions are being raised over the registration of FIRs on Sunday while the complaints were filed on the previous days. Students allege that it was an afterthought from the police and authorities, as a nationwide outrage erupted as soon as the violence was reported.

Delhi Police is under attack for not coming to the aid of students targeted by the mob of ABVP activists armed with iron rods and sticks who went on a rampage on the campus. While no single person in the Sunday violence was arrested, the police are also accused of being a "mute spectator" by allowing the rioters to leave the campus without being arrested.

In its complaints, the JNU Security Department has alleged that Ghosh and others entered into a verbal and physical scuffle with security guards, including women, when officials tried to open the Centre for Information System (CIS) that was blocked by students protesting against the fee hike and registration process.

While the January 3 complaint claims that the students switched off the power supply to the CIS and evicted staff forcefully, the January 4 complaint alleged that they damaged the information system.

They also claimed the students damaged the servers, made it dysfunctional, severely damaged optic fibre cables and broke the biometric system in the CIS. The complaint also cited a Supreme Court order that prevented any protest within 100 metres of Administration Block and claimed the students violated the direction.

The FIR filed on Sunday violence on the basis of the statement of Inspector Anand Yadav said that the first phase of violence was reported at 3.45 pm when "40-50 unidentified" people who had "covered their faces" attacked students in Periyar Hostel and the situation was brought under control.

However at around 7 pm, "50-60 people with rods in their hands" targeted students in Sabarmati Hostel in which students were attacked and public property destroyed.

The FIR said that students were injured but skipped the mention of the attack on teachers, who were injured. At least two faculty members Sucharita Sen and Ameet Parameswaran were taken to AIIMS while several other teachers suffered minor injuries.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 13,2020

New Delhi, Jan 13: The Delhi High Court on Monday sought response of the city police, Delhi government, WhatsApp Inc, Google Inc and Apple Inc on a plea of three JNU professors to preserve data, CCTV footage and other evidence relating to the January 5 violence on the varsity campus.

The Delhi Police informed the court that it has asked the JNU administration to preserve and hand over CCTV footage of the violence.

Justice Brijesh Sethi listed the matter for further hearing on Tuesday.

The court was told by Delhi government Standing Counsel (criminal) Rahul Mehra that the police has not yet received any response from the university administration.

The counsel said police has also written to WhatsApp to preserve data of two groups "Unity Against Left" and "Friends of RSS" including messages, pictures and videos and phone numbers of members, related to JNU violence incident.

The petition was filed by JNU professors Ameet Parameswaran, Atul Sood and Shukla Vinayak Sawant seeking necessary directions to the Delhi Police Commissioner and Delhi government.

The petition also sought direction to the Delhi Police to retrieve all CCTV footage of JNU campus.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.