Al-Qaeda’s South Asia chief Asim Umar killed in Afghanistan

Agencies
October 8, 2019

Kabul, Oct 8: The leader of al-Qaeda’s South Asian branch was killed in a U.S.-Afghan joint raid in southern Afghanistan in September, Afghan officials confirmed on October 8.

Asim Umar, who led al-Qaeda in the Indian Subcontinent (AQIS) from its inception in 2014, was killed during a raid September 23 on a Taliban compound in the Musa Qala district of Helmand Province.

Afghanistan’s National Directorate of Security said Umar was a Pakistani citizen, though some reports claim he was born in India.

He “was #killed along with six other AQIS members, most of them Pakistani”, the NDS tweeted, adding that Umar had been “embedded” with the Taliban.

The raid was part of a lengthy and confusing overnight operation between September 22 and 23 for which the U.S. provided air support.

Authorities said they would investigate reports that 40 civilians, including children, were killed in an air strike during the operation.

The NDS said that among the six other AQIS members killed in the raid was a man identified as “Raihan”, a courier for al-Qaeda leader Ayman al-Zawahiri.

The middle-aged Umar was relatively unknown when he was picked to lead the newly created AQIS in 2014. The jihadist branch was established to try to rouse fighters in India, Bangladesh and Myanmar.

An Afghan Taliban source said in 2014 that Umar had worked with the Punjabi Taliban, the Tehreek-e-Taliban Pakistan (TTP) chapter in Pakistan's most populous Province, for some years before linking up with al-Qaeda.

Umar — an alias — was named by al-Zawahiri in a video message. A Pakistani intelligence official said Umar had travelled to Syria, though it was not possible to confirm this.

U.S. forces in Afghanistan declined to comment.

Under a stalled withdrawal plan negotiated between the U.S. and the Taliban, Washington agreed to pull troops from Afghanistan if the insurgents abide by security guarantees and cut all ties with al-Qaeda.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 19,2020

Beijing, Feb 19: The death count from China's new coronavirus epidemic jumped to 2,000 on Wednesday after 132 more people died in Hubei province, the hard-hit epicentre of the outbreak.

In its daily update, the province's health commission also reported 1,693 new cases of people infected with the virus.

This brings the total number of cases in mainland China past 74,000.

Most of the cases are in Hubei, where the virus first emerged in December before spiralling into a nationwide epidemic.

Wednesday's jump in the death count was an increase on Tuesday's figures, although the number of new cases reported in Hubei were the lowest for a week.

A study released by Chinese officials claimed most patients have mild cases of the illness.

Outside of hardest-hit Hubei, which has been effectively locked down to try to contain the virus, the number of new cases has been slowing and China's national health authority has said this is a sign the outbreak is under control.

President Xi Jinping, in a phone call with the British prime minister, said China's measures were achieving "visible progress", according to state media Tuesday.

However, the World Health Organization has cautioned that it was too early to tell if the decline would continue.

On Tuesday the director of a hospital in the central Hubei city of Wuhan became the seventh medical worker to succumb to the COVID-19 illness.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 3,2020

London, May 3: The British government had a contingency plan for prime minister Boris Johnson’s death as his condition deteriorated while he battled COVID-19 last month in intensive care, Johnson said in an interview with The Sun newspaper.

Johnson returned to work on Monday, a month after testing positive for COVID-19. Johnson, 55, spent 10 days in isolation in Downing Street from late March, but was then was taken to London’s St Thomas’ Hospital where he received oxygen treatment and spent three nights in intensive care.

“They had a strategy to deal with a ‘death of Stalin’-type scenario,” Johnson, 55, was quoted as saying by The Sun. “It was a tough old moment, I won’t deny it.”

After Johnson was discharged, St Thomas’ said it was glad to have cared for the prime minister, but the hospital has given no details about the gravity of his illness beyond stating that he was treated in intensive care.

Johnson and his fiancée, Carrie Symonds, on Saturday announced the name of their newly born son as Wilfred Lawrie Nicholas, partly as a tribute to two of the intensive care doctors who they said had saved Johnson’s life.

“The doctors had all sorts of arrangements for what to do if things went badly wrong,” Johnson said of his COVID-19 battle. “The bloody indicators kept going in the wrong direction.”

He said doctors discussed invasive ventilation.

“The bad moment came when it was 50-50 whether they were going to have to put a tube down my windpipe,” he said. “That was when it got a bit . . . they were starting to think about how to handle it presentationally.”

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.