3 held for attack on Amarnath pilgrims

Agencies
August 6, 2017

Anantnag, Aug 6: Jammu and Kashmir Police today said three people, alleged conspirators in the July 10 attack on Amarnath pilgrims, have been arrested by its Special Investigation Team (SIT).

The men provided logistical help to four Lashker-e-Taiba (LeT) militants who carried out the attack that left eight people dead, IGP Munir Khan told the media here.

The men, who had allegedly helped the four terrorists by providing them with vehicles and shelter, were arrested recently and taken into remand for further questioning, the police said.

The police said the four LeT militants, led by Abu Ismail, a Pakistani national, had attempted an attack on Amarnath pilgrims on July 9, but were frustrated by heavy security arrangements.

Another militant in the group of four had been identified as Yawar, a local recruiter for the LeT, the police said. Efforts are on to identify the other two, believed to be Pakistanis.

The police also released pictures of Abu Ismail and Yawar.

The the three "co-conspirators"-- Bilal Ahmed Reshi, Aizaj Wagey and Zahoor Ahmed --had carried out reconnaissance exercises and chosen Botengo near Khanbal as the spot where the attack could be carried out, the police added.

The trio had also provided shelter to the four militants in Khudwani and Sriguffwara of South Kashmir, Khan said.

Bilal's elder brother Adil, an alleged Lashker-e-Taiba terrorist, was killed by security forces earlier this year.

The Jammu and Kashmir Police had constituted an SIT led by Deputy Inspector General (South Kashmir) Swayam Prakash Pani to probe the attack on the pilgrims.

Eight people were killed when the militants fired at a bus carrying the pilgrims, returning from their Amarnath yatra.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
August 8,2020

Nagpur, Aug 8: "He was a great son and always the first one to help others in need. He sacrificed his life for the country," said Neela Sathe, the mother of late captain DV Sathe, who was flying the Air India flight that crash-landed at Kozhikode airport on Friday, claiming 18 lives.

Indian Army Retired Colonel Vasant Sathe and his wife Neela lost both their sons in line of duty. The couple is originally from Nagpur, Maharashtra.

Speaking to news agency, Neela broke into tears and said, "He was a great son and always the first one to help others in need. 

His teachers still appreciate him. During the Ahmedabad floods, he saved the children of the soldiers by lifting them in his arms. I wish God would have called us instead of him."

"Both our children sacrificed their lives for the country," she added.

Remembering DV Sathe's childhood, Neela talked about every that moment when he made his parents proud.

Neela told with great pride that Captain DV Sathe had received the Sword of Honor and had also won eight medals in the Air Force.

Neela last talked to DV Sathe over phone call a few days ago during which captain told her mother not to go out of the house amid COVID-19 crisis as if something happens to her, he won't be able to bear that.

Vasant, captain's father retired as a colonel after serving in the Army for 30 years, following the footsteps of their father, both his sons joined too the Army.

Their elder son Vikas, was in the Army, and at the age of 22, he was martyred in an accident in Ferozepur in 1981. Their younger son Deepak (DV Sathe), who served as a pilot in Air India after serving in the Indian Air Force, died in the plane crash on Friday.

An Air India Express plane carrying 190 passengers including 10 infants skidded while landing at Karipur Airport in Kozhikode on Friday evening.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 31,2020

New Delhi, May 31: The income tax department has notified forms for filing income tax returns for the financial year 2019-20.

The Central Board of Direct Taxes (CBDT) has notified Sahaj (ITR-1), Form ITR-2, Form ITR-3, Form Sugam (ITR-4), Form ITR-5, Form ITR-6, Form ITR-7 and Form ITR-V for the assessment year 2020-21.

The department has revised the I-T return forms for the financial year 2019-20 to allow assessees to avail benefits of various timeline extension granted by the government following the COVID-19 outbreak.

The government has extended various timelines under the Income Tax Act, 1961, through the Taxation and Other Laws (Relaxation of Certain Provisions) Ordinance, 2020.

Accordingly, the time for making investment or payments for claiming deduction under Chapter-VIA-B of IT Act that include Section 80C (LIC, PPF, NSC etc.), 80D (Mediclaim) and 80G (Donations) for the financial year 2019-20 had been extended to June 30, 2020.

ClearTax founder and CEO Archit Gupta said, "The new forms require a separate table to disclose tax saving investment made in the first quarter of 2020 for availing them in FY 2019-20. Taxpayers must assess their tax liability for FY 2019-20 and make sure they are maximising their Section 80C benefits if not already done so."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.